標題: Titlebook: E-business and Telecommunication Networks; Second International Joaquim Filipe,Helder Coelhas,Monica Saramago Conference proceedings 2007 S [打印本頁] 作者: 惡夢 時間: 2025-3-21 19:18
書目名稱E-business and Telecommunication Networks影響因子(影響力)
書目名稱E-business and Telecommunication Networks影響因子(影響力)學科排名
書目名稱E-business and Telecommunication Networks網(wǎng)絡(luò)公開度
書目名稱E-business and Telecommunication Networks網(wǎng)絡(luò)公開度學科排名
書目名稱E-business and Telecommunication Networks被引頻次
書目名稱E-business and Telecommunication Networks被引頻次學科排名
書目名稱E-business and Telecommunication Networks年度引用
書目名稱E-business and Telecommunication Networks年度引用學科排名
書目名稱E-business and Telecommunication Networks讀者反饋
書目名稱E-business and Telecommunication Networks讀者反饋學科排名
作者: strdulate 時間: 2025-3-21 22:46
Heads Up: Concussion in High School Sportsprotocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each servic作者: 打谷工具 時間: 2025-3-22 02:56 作者: 珊瑚 時間: 2025-3-22 06:33
Besteuerung der Ver?u?erung von Unternehmener able to deal with very small training sets. Experiments were performed on two different data sets, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programm作者: 歌劇等 時間: 2025-3-22 12:43
Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each servic作者: Spartan 時間: 2025-3-22 16:55
Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionie approach, which usually profile network traffic using previously captured data for a certain period of time, an online and adaptive approach can use a shorter period of data capturing and evolve its profile if the characteristic of the network traffic has changed.作者: Spartan 時間: 2025-3-22 20:54 作者: 山間窄路 時間: 2025-3-22 21:56
1865-0929 namely: “Global Communication Information Systems and Services”, “Security and Reliability in Information Systems and Networks”, “Wireless Communication Systems978-3-540-75992-8978-3-540-75993-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: nitric-oxide 時間: 2025-3-23 01:48
Dealing with Cross-cultural Issueslution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.作者: amputation 時間: 2025-3-23 07:41
https://doi.org/10.1007/978-1-4471-4981-1ures (data) of the assessed e-commerce systems can be identified and, using the described automated assessment process, lead to higher abstraction information (desiderata) regarding the quality of the assessed e-commerce systems.作者: BINGE 時間: 2025-3-23 10:36 作者: TIGER 時間: 2025-3-23 15:39
https://doi.org/10.1007/978-3-211-09422-8 preliminary study show the particular difficulties of speaker recognition within the family, depending on the scenario, the genre and age of the speaker, and the physiological nature of the impersonation.作者: Intuitive 時間: 2025-3-23 20:20 作者: 出血 時間: 2025-3-24 01:03
Advertising Via Mobile Terminals – Delivering Context Sensitive and Personalized Advertising While Glution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.作者: 暴露他抗議 時間: 2025-3-24 03:38 作者: 內(nèi)向者 時間: 2025-3-24 07:49
End to End Adaptation for the Web: Matching Content to Client Connectionsin order to control the delay experienced and thereby optimize the browsing experience. Where high bandwidth connectivity and low congestion exist high fidelity content will be delivered, where the connectivity is low bandwidth or the path congested lower fidelity content will be served and delay controlled.作者: Proponent 時間: 2025-3-24 11:42 作者: 厚臉皮 時間: 2025-3-24 15:18 作者: 原告 時間: 2025-3-24 21:56 作者: arterioles 時間: 2025-3-25 02:14 作者: 我說不重要 時間: 2025-3-25 06:51 作者: 臨時抱佛腳 時間: 2025-3-25 09:02
Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels – AchQAM modulations, under SISO (Single Input, Single Output) and MIMO systems, the latter with 2Tx by 2Rx and 4Tx by 4Rx (MIMO order 2 and 4 respectively) antennas. To assess its performance in an existing system, the uncoded UMTS HSDPA (High Speed Downlink Packet Access) standard was considered.作者: 暗諷 時間: 2025-3-25 15:14
Conference proceedings 20075, at the Microsoft Research Centre - Reading, in the UK. The conference was organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with the University of Westminster/WITRC, UK. ICETE reflects a continuing effort to increase the excha作者: dialect 時間: 2025-3-25 18:23 作者: 鋼筆記下懲罰 時間: 2025-3-25 22:15 作者: 不能逃避 時間: 2025-3-26 03:52
https://doi.org/10.1007/978-3-658-11066-6HIP. From a network administrator’s perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.作者: Acclaim 時間: 2025-3-26 05:07 作者: 挑剔小責 時間: 2025-3-26 11:45
https://doi.org/10.1007/978-3-322-87422-1QAM modulations, under SISO (Single Input, Single Output) and MIMO systems, the latter with 2Tx by 2Rx and 4Tx by 4Rx (MIMO order 2 and 4 respectively) antennas. To assess its performance in an existing system, the uncoded UMTS HSDPA (High Speed Downlink Packet Access) standard was considered.作者: Interlocking 時間: 2025-3-26 12:45
https://doi.org/10.1007/978-3-663-05988-2ficulties and interface adaption problems of service composition. In a scenario for buying a distributed computing service, simulated strategies are evaluated according to their scalability and the market welfare they create.作者: Anemia 時間: 2025-3-26 17:51
Gender Variations in Cash-in-hand Workoute optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.作者: rheumatology 時間: 2025-3-26 22:35
Strategies for Service Composition in P2P Networksficulties and interface adaption problems of service composition. In a scenario for buying a distributed computing service, simulated strategies are evaluated according to their scalability and the market welfare they create.作者: SMART 時間: 2025-3-27 04:29 作者: 鉤針織物 時間: 2025-3-27 08:27 作者: 過分自信 時間: 2025-3-27 11:21
https://doi.org/10.1007/978-3-322-87472-6usly introduced concept for cryptographic key extraction from biometrics. We give details on an optimized implementation of the scheme which show that its performance allows the system for use in practice. In addition, we introduce an extended framework to analyze the security of the scheme.作者: Directed 時間: 2025-3-27 14:48
E-business and Telecommunication Networks978-3-540-75993-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 使聲音降低 時間: 2025-3-27 20:23
https://doi.org/10.1007/978-1-4939-2068-6uted to the fact that despite the availability of the technology for more than a decade, it has not achieved even a fraction of the anticipated popularity. The basic assumptions and requirements for such a system are revisited, clear (economic) objectives are formulated and cryptographic techniques to achieve them are proposed.作者: Heterodoxy 時間: 2025-3-27 23:55 作者: 袋鼠 時間: 2025-3-28 02:20
https://doi.org/10.1007/978-3-540-75993-54G systems; Code; IPv6; Information; Internet; VPN technology; algorithms; biometrics; communication system; 作者: 吸氣 時間: 2025-3-28 08:08
978-3-540-75992-8Springer-Verlag Berlin Heidelberg 2007作者: Judicious 時間: 2025-3-28 14:16
Heads Up: Concussion in High School Sportsservices running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dy作者: 驚奇 時間: 2025-3-28 15:20
Dealing with Cross-cultural Issuesent interactive multimedia content and offer as almost permanently carried along personal communication devices a high degree of reachability. But particular because of the latter feature it is important to pay great attention to privacy aspects and avoidance of spam-messages when designing an appli作者: circuit 時間: 2025-3-28 22:36
https://doi.org/10.1007/978-1-4939-2068-6uted to the fact that despite the availability of the technology for more than a decade, it has not achieved even a fraction of the anticipated popularity. The basic assumptions and requirements for such a system are revisited, clear (economic) objectives are formulated and cryptographic techniques 作者: callous 時間: 2025-3-29 02:45 作者: languid 時間: 2025-3-29 03:58
Kanti Meena,A. Anil Kumar,R. T. Marutis the “.” concept (alternatively called . 2.. or .2..) for stationary time series. The focus is the IAT (inter-arrival times) traffic. The filter is original because similar approaches are not found in the literature for detecting self-similar traffic patterns on the fly. Different experiments confi作者: Neutropenia 時間: 2025-3-29 08:55 作者: FORGO 時間: 2025-3-29 12:49
https://doi.org/10.1007/978-3-322-96339-0ew kilobits. Yet Web Servers today provide a one size fits all service and consequently the delay experienced by users accessing the same Web Page may range from a few milliseconds to minutes. This paper presents a framework for making Web Servers aware of the Quality of Service that is likely to be作者: 單色 時間: 2025-3-29 16:58
https://doi.org/10.1007/978-3-211-09422-8d as a framework for experimenting with voices in a family context. With the aim of evaluating this task, 33 families were recruited. Particular attention was given to 2 main scenarios: a name-based and a common sentence-based scenario. In each case, members of the family pronounce their complete na作者: NIB 時間: 2025-3-29 20:47
https://doi.org/10.1007/978-3-322-87472-6ords or passwords that can be guessed easily..In this paper we introduce and provide a formal definition of the notion of . which generalizes a previously introduced concept for cryptographic key extraction from biometrics. We give details on an optimized implementation of the scheme which show that作者: STIT 時間: 2025-3-30 01:45 作者: enhance 時間: 2025-3-30 05:42
https://doi.org/10.1007/978-3-658-11066-6rity and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support 作者: CULP 時間: 2025-3-30 10:05
Ausgangssituation anhand der Zahlenlage,ommunication services that require very high level of security such as bank transactions..The aim of this paper is to present the possibility to use quantum cryptography in critical financial transactions, to analyse the use of quantum key distribution within IPSEC to secure these transactions and t作者: Infelicity 時間: 2025-3-30 12:36
Ausgangssituation anhand der Zahlenlage,mproving on the previous results of Jakobsson, Leighton, Micali, and Szydlo (Jakobsson et al., 03) and Szydlo (Szydlo, 04). In particular, we show that our algorithm requires 2 log./log.. hash function computations and storage for less than (log./log..?+?1)loglog.?+?2 log. hash values, where . is th作者: Genome 時間: 2025-3-30 17:11 作者: 適宜 時間: 2025-3-30 22:58
https://doi.org/10.1007/978-3-322-87422-1ce suppression algorithm was devised for a MIMO/BLAST (Multiple Input, Multiple Output / Bell Laboratories Layered Space Time) system in order to improve system performance, considering frequency selective fading channels. The scheme is compared against the simple MMSE receiver, for both QPSK and 16作者: 飾帶 時間: 2025-3-31 00:51 作者: ornithology 時間: 2025-3-31 07:59 作者: Instrumental 時間: 2025-3-31 12:36
Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dy