default search action
ICETE 2013: Reykjavík, Iceland
- Mohammad S. Obaidat, Joaquim Filipe:
E-Business and Telecommunications - International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers. Communications in Computer and Information Science 456, Springer 2014, ISBN 978-3-662-44787-1
Invited Speakers
- Pascal Lorenz:
QoS and QoE in the Next Generation Networks and Wireless Networks. 3-16 - Roman Korkikian, David Naccache, Guilherme Ozari de Almeida, Rodrigo Portella do Canto:
Practical Instantaneous Frequency Analysis Experiments. 17-34
Data Communication Networking
- Anne Bouillard, Claude Jard, Aurore Junier:
The Impact of Initial Delays in OSPF Routing. 37-57 - Laura Ricci, Luca Genovali, Barbara Guidi:
Managing Virtual Entities in MMOGs: A Voronoi-Based Approach. 58-73 - Libor Polcak, Martin Holkovic, Petr Matousek:
Host Identity Detection in IPv6 Networks. 74-89
e-Business
- Tiago Picão, Fiona McMahon, Valerie Purchase, Maurice D. Mulvenna:
The Use of Twitter by Local Government in Northern Ireland. 93-106 - Florian Nottorf:
Multi-channel Attribution Modeling on User Journeys. 107-125 - Uschi Buchinger, Heritiana Ranaivoson, Pieter Ballon:
When Loyalty Points Become Virtual Currencies: Transforming Business Models for Online Platforms. 126-141 - Elena Bellio, Luca Buccoliero:
Digital Cities Web Marketing Strategies in Italy: The Path Towards Citizen Empowerment. 142-159 - Milena Casagranda, Luigi Colazzo, Andrea Molinari:
Estimating the Effort in the Development of Distance Learning Paths. 160-179
Optical Communication Systems
- Andreas Ahrens, Steffen Schröder, Steffen Lochmann:
Modal and Chromatic Dispersion Analysis Within a Measured 1, 4 km MIMO Multimode Channel. 183-196 - Tiago M. F. Alves, Adolfo V. T. Cartaxo:
Long-Reach PONs Employing Directly Modulated Lasers for Provisioning of OFDM-UWB Radio Signals in Sparse Geographical Areas. 197-206
Security and Cryptography
- Luis Campo-Giralte, Isaac Martín de Diego, Cristina Conde, Enrique Cabello:
InCC: Evading Interception and Inspection by Mimicking Traffic in Network Flows. 209-225 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control. 226-251 - Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack:
IPv6 Network Attack Detection with HoneydV6. 252-269 - Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Youtube User and Usage Profiling: Stories of Political Horror and Security Success. 270-289 - Petr Svenda, Martin Ukrop, Vashek Matyás:
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. 290-305 - Bo Lang, Runhua Xu, Yawei Duan:
Self-contained Data Protection Scheme Based on CP-ABE. 306-321 - Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. 322-340
Signal Processing and Multimedia Applications
- Patrik Goorts, Steven Maesen, Maarten Dumont, Sammy Rogmans, Philippe Bekaert:
Optimal Distribution of Computational Power in Free Viewpoint Interpolation by Depth Hypothesis Density Adaptation in Plane Sweeping. 343-358 - Nassim Asbai, Messaoud Bengherabi, Farid Harizi, Abderrahmane Amrouche:
Effect of the Front-End Processing on Speaker Verification Performance Using PCA and Scores Level Fusion. 359-368 - Steven Verstockt, Viktor Slavkovikj, Pieterjan De Potter, Olivier Janssens, Jürgen Slowack, Rik Van de Walle:
Automatic Geographic Enrichment by Multi-modal Bike Sensing. 369-384
Wireless Information Networks and Systems
- Unai Hernández-Jayo, Idoia De-la-Iglesia:
Reliability of Cooperative Vehicular Applications on Real Scenarios Over an IEEE 802.11p Communications Architecture. 387-401 - Andreas Ahrens, Francisco Cano-Broncano, César Benavente-Peces:
Transmitter-Side Antennas Correlation in SVD-assisted MIMO Systems. 402-417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.