標(biāo)題: Titlebook: E-business and Telecommunications; 4th International Co Joaquim Filipe,Mohammad S. Obaidat Conference proceedings 2009 Springer-Verlag Berl [打印本頁(yè)] 作者: 相似 時(shí)間: 2025-3-21 16:16
書目名稱E-business and Telecommunications影響因子(影響力)
書目名稱E-business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-business and Telecommunications網(wǎng)絡(luò)公開(kāi)度
書目名稱E-business and Telecommunications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱E-business and Telecommunications被引頻次
書目名稱E-business and Telecommunications被引頻次學(xué)科排名
書目名稱E-business and Telecommunications年度引用
書目名稱E-business and Telecommunications年度引用學(xué)科排名
書目名稱E-business and Telecommunications讀者反饋
書目名稱E-business and Telecommunications讀者反饋學(xué)科排名
作者: 幻影 時(shí)間: 2025-3-21 22:03 作者: OREX 時(shí)間: 2025-3-22 03:14
Bidding Agents That Perpetrate Auction Fraudo as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill biddi作者: electrolyte 時(shí)間: 2025-3-22 06:41
A Platform for Mobile Service Provisioning Based on SOA-Integration has to offer a variety of different features. Some of these features have to be provided by external parties, e.g. billing or content syndication. The integration of all these features while considering mobile-specific challenges is a demanding task. In the article at hand we thus describe a middle作者: 確認(rèn) 時(shí)間: 2025-3-22 11:59 作者: Sedative 時(shí)間: 2025-3-22 16:10 作者: Sedative 時(shí)間: 2025-3-22 19:48
An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains of the existing rule-based fraud detection systems consist of fixed and inflexible decision-making rules which limit significantly the effectiveness of such systems. In this paper we present a fraud detection approach which combines the technologies of knowledge-based systems and adaptive systems i作者: artless 時(shí)間: 2025-3-22 23:26
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model prevent such scanning malware from spreading within an enterprise network. It is especially important to suppress scanning malware infection to less than a few infected hosts. We estimated the timing of containment software to block “scanning malware” in a homogeneous enterprise network. The “combi作者: Exhilarate 時(shí)間: 2025-3-23 04:57 作者: Cougar 時(shí)間: 2025-3-23 07:19 作者: 存心 時(shí)間: 2025-3-23 10:15 作者: BUMP 時(shí)間: 2025-3-23 13:59 作者: 災(zāi)禍 時(shí)間: 2025-3-23 19:26
IPSec Database Query Acceleration the Security Policy Database (SPD) and the Security Association Database (SAD). The ability to query the SPD quickly is fundamental as this operation needs to be done for each incoming or outgoing IP packet, even if no IPSec processing needs to be applied on it. This may easily result in millions o作者: SPECT 時(shí)間: 2025-3-24 01:51 作者: 預(yù)防注射 時(shí)間: 2025-3-24 04:48
K2 Stream Cipherithms with an irregular clocking mechanism have been proposed. This paper proposes a new design of irregular clocking for word-oriented stream ciphers that is dynamic feedback control and show analysis results of its security and performance. The stream cipher K2 v2.0 is a secure and high-performanc作者: 掃興 時(shí)間: 2025-3-24 06:33 作者: Jogging 時(shí)間: 2025-3-24 12:34 作者: 失誤 時(shí)間: 2025-3-24 18:28
A Platform for Mobile Service Provisioning Based on SOA-Integrationware platform for mobile services which follows the idea of a so called Enterprise Service Bus (ESB). We explain the concept of ESB and argue why an ESB is an appropriate fundament for a platform for mobile service provisioning.作者: 對(duì)手 時(shí)間: 2025-3-24 19:07 作者: irreparable 時(shí)間: 2025-3-24 23:46 作者: CRUE 時(shí)間: 2025-3-25 04:33
Lessons from the Gold Standard Experience, a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.作者: Cardiac-Output 時(shí)間: 2025-3-25 09:17 作者: muster 時(shí)間: 2025-3-25 14:54
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.作者: 悠然 時(shí)間: 2025-3-25 16:34
struct usage behavior rules of interesting customer groups. Finally, these rules are used to analysis the behavior changes between time periods t and t+1. An implementation case using a practical credit card database provided by a commercial bank in Taiwan is illustrated to show the benefits of the proposed framework.作者: 造反,叛亂 時(shí)間: 2025-3-25 20:26
It is supported also by a generic ontological framework based on which different domain specific fraud knowledge models can be built and through which the generic character and adaptability of our approach is ensured.作者: deceive 時(shí)間: 2025-3-26 03:18
,Warfare in the Old Regime 1648–1789, used normalization technique in SVM fusion systems. The prosodic and speech spectrum scores have been provided by speech experts using records of the Switchboard I database and the face scores have been obtained by a face recognition system upon XM2VTS database.作者: PHAG 時(shí)間: 2025-3-26 05:49 作者: savage 時(shí)間: 2025-3-26 08:55
propose different query methods for the two databases, and we compare them through simulation. Two different versions of the architecture are presented: the first is a serial architecture that is able to perform up to 7.5 million queries per second; the second is a multithreaded architecture that can perform up to 11 million queries per second.作者: Mitigate 時(shí)間: 2025-3-26 13:19 作者: poliosis 時(shí)間: 2025-3-26 17:43
An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains It is supported also by a generic ontological framework based on which different domain specific fraud knowledge models can be built and through which the generic character and adaptability of our approach is ensured.作者: 箴言 時(shí)間: 2025-3-26 23:12 作者: 搏斗 時(shí)間: 2025-3-27 04:34
Remote Algorithmic Complexity Attacks against Randomized Hash Tableswork against any hash — although a poorly chosen hash function, that produces many collisions, can make the attack more efficient. We present a mathematical modeling of the attack, simulate the attack on different network topologies and finally describe a real-life attack against a weakened version of the Linux Netfilter.作者: PET-scan 時(shí)間: 2025-3-27 06:57 作者: 托人看管 時(shí)間: 2025-3-27 12:44 作者: 混亂生活 時(shí)間: 2025-3-27 13:50
Securing Biometric Templates Where Similarity Is Measured with Set Intersectionhe applicability of the new scheme is compared with that of the existing principal schemes, and it is shown that the new scheme has definite advantages over the existing approaches. The proposed scheme is analyzed both in terms of security and performance.作者: Indolent 時(shí)間: 2025-3-27 18:51
ware platform for mobile services which follows the idea of a so called Enterprise Service Bus (ESB). We explain the concept of ESB and argue why an ESB is an appropriate fundament for a platform for mobile service provisioning.作者: BLAZE 時(shí)間: 2025-3-27 23:35
Wellbeing in Politics and Policye stream cipher using the dynamic feedback control, which is applicable for several applications. We believe that the dynamic feedback control mechanism is potentially effective against several different types of attacks, not only existing attacks but also novel attacks.作者: 上流社會(huì) 時(shí)間: 2025-3-28 06:06
1865-0929 cance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view ha978-3-540-88652-5978-3-540-88653-2Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Measured 時(shí)間: 2025-3-28 07:31 作者: LUT 時(shí)間: 2025-3-28 13:06 作者: animated 時(shí)間: 2025-3-28 17:19
Utility Computing: Reality and Beyondre online applications, Utility Computing would facilitate “agility-integration” of IT resources and services within and between virtual companies. With the application of Utility Computing there could be concealment of the complexity of IT, reduction of operational expenses, and converting of IT co作者: inferno 時(shí)間: 2025-3-28 21:28
Bidding Agents That Perpetrate Auction Fraudetermine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent’s ability to inflate the price has been tested in a simulated marketplace and experimental results 作者: prick-test 時(shí)間: 2025-3-28 23:29
Critical Success Factors of Internet Shopping: The Case of Japantual use of Internet shopping. The implication also shows that Japanese online customers do not worry about the quality of service of Internet shopping, a factor in the website-centric viewpoint, as significantly as offline customers do.作者: patriarch 時(shí)間: 2025-3-29 05:47 作者: Pander 時(shí)間: 2025-3-29 10:00 作者: 不可救藥 時(shí)間: 2025-3-29 13:16
Religion in the Theory of Ethnicity,re online applications, Utility Computing would facilitate “agility-integration” of IT resources and services within and between virtual companies. With the application of Utility Computing there could be concealment of the complexity of IT, reduction of operational expenses, and converting of IT co作者: Gentry 時(shí)間: 2025-3-29 17:40 作者: Saline 時(shí)間: 2025-3-29 23:07
https://doi.org/10.1007/978-94-009-7371-8tual use of Internet shopping. The implication also shows that Japanese online customers do not worry about the quality of service of Internet shopping, a factor in the website-centric viewpoint, as significantly as offline customers do.作者: Vldl379 時(shí)間: 2025-3-30 03:52
Die Wissenschaft von der Politiktimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic c作者: Working-Memory 時(shí)間: 2025-3-30 05:18 作者: 一起平行 時(shí)間: 2025-3-30 09:47 作者: MENT 時(shí)間: 2025-3-30 13:30
E-business and Telecommunications978-3-540-88653-2Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Cubicle 時(shí)間: 2025-3-30 20:19 作者: 環(huán)形 時(shí)間: 2025-3-30 20:50
scale resource sharing and pioneering distributed applications. The design and deployment of a service in a 4G Grid platform can be performed in real time without a prior knowledge of any contributing node. It can be used resourcefully to realize complicated applications while offering a full contro作者: detach 時(shí)間: 2025-3-31 04:11 作者: 取之不竭 時(shí)間: 2025-3-31 07:45