標題: Titlebook: e-Business and Telecommunications; 6th International Jo Mohammad S. Obaidat,Joaquim Filipe Conference proceedings 2011 Springer Berlin Heid [打印本頁] 作者: frustrate 時間: 2025-3-21 16:20
書目名稱e-Business and Telecommunications影響因子(影響力)
書目名稱e-Business and Telecommunications影響因子(影響力)學科排名
書目名稱e-Business and Telecommunications網(wǎng)絡公開度
書目名稱e-Business and Telecommunications網(wǎng)絡公開度學科排名
書目名稱e-Business and Telecommunications被引頻次
書目名稱e-Business and Telecommunications被引頻次學科排名
書目名稱e-Business and Telecommunications年度引用
書目名稱e-Business and Telecommunications年度引用學科排名
書目名稱e-Business and Telecommunications讀者反饋
書目名稱e-Business and Telecommunications讀者反饋學科排名
作者: 駭人 時間: 2025-3-21 22:39
Protecting Information Privacy in the Electronic Societythat might be released publicly or semi-publicly for various purposes, are essential requirements for the today’s Electronic Society. In this chapter, we discuss the main privacy concerns that arise when releasing information to third parties. In particular, we focus on the data publication and data作者: 形容詞 時間: 2025-3-22 02:52
The Three Fundamental e-Business Modelsd, because they over-prioritize control. Balance is achieved when one basic pattern is the top priority, while the other two patterns are not ignored. This paper explains how to use these patterns to create a balanced e-Business model: e-Commerce, e-Broker or e-Barter. Market forces are now occurrin作者: 幻想 時間: 2025-3-22 08:17
Web 2.0: From a Buzzword to Mainstream Web Reality.0, Entertainment 2.0, Business 2.0, Music 2.0, Enterprise 2.0, Marketing 2.0, Law 2.0, Education 2.0, etc. All of this is a consequence of the term “Web 2.0” which was created at O’Reilly Media. But what is behind this shorthand: Is it just a buzzword, does it stand for a serious development, is it作者: 人造 時間: 2025-3-22 09:59 作者: reflection 時間: 2025-3-22 14:14
Designing Digital Marketplaces for Competitiveness of SMEs in Developing Countriestplace and business models we argue that the features of the context shape the type of the business models applicable for digital marketplaces. We suggest that before designing a digital marketplace initiative it is necessary to undertake a context assessment that ensures a better understanding of t作者: reflection 時間: 2025-3-22 17:36
Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of del design within a firm. Analyzing the case of a newcomer in the market for the provisioning of middleware platforms enabling the delivery of Mobile digital content, the paper first identifies a set of critical decisions to be made at a business model design level for a Mobile Middleware Technology作者: 脫水 時間: 2025-3-22 21:13
Collaboration Strategies in Turbulent Periods: Effects of Perception of Relational Risk on Enterpristive strategies and the effects of innovation diffusion. In particular, turbulent periods are taken into account (e.g. an Economic, Financial or Environmental crisis), during which the individual perception of the enterprises can be distorted both by exogenous factors and by endogenous ones. The cri作者: Influx 時間: 2025-3-23 01:36 作者: 物種起源 時間: 2025-3-23 06:47 作者: 使尷尬 時間: 2025-3-23 10:53 作者: 勤勞 時間: 2025-3-23 15:56 作者: exacerbate 時間: 2025-3-23 19:57 作者: deriver 時間: 2025-3-23 22:12
Optimizations for High-Performance IPsec ExecutionN) connectivity into a necessity. Internet Protocol Security (IPsec) is the de facto standardized VPN technology with support for multiple connectivity scenarios. The cryptographic transformations of IPsec are widely considered as a performance bottleneck and the usual target for optimization. We pr作者: Stricture 時間: 2025-3-24 05:20
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networkstocols for group key agreement exist in the literature, most of them are not applicable in heterogeneous environment where a number of computationally limited nodes coexist with one or more computationally efficient nodes. Among the few existing protocols, where some fail to satisfy the key agreemen作者: brachial-plexus 時間: 2025-3-24 10:01
Privacy Enhancements for Hardware-Based Security Modulesrous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are suscept作者: 售穴 時間: 2025-3-24 12:47 作者: Intervention 時間: 2025-3-24 15:46
Exploring Price Elasticity to Optimize Posted Prices in e-Commercee component and thus increase the contribution margin per visitor by about 7%. We conclude that the discussed method could be applied to answer further research questions such as the temporal behavior of demand curves.作者: Tracheotomy 時間: 2025-3-24 22:42 作者: surmount 時間: 2025-3-25 03:09
https://doi.org/10.1007/978-94-009-8165-2 perspective of a user, outlines the impact this is having on enterprises, and finally mentions some open issues and future directions, thereby showing that Web 2.0 has emerged from a buzzword to mainstream Web reality.作者: 不足的東西 時間: 2025-3-25 05:27 作者: 惡名聲 時間: 2025-3-25 07:40 作者: 誤傳 時間: 2025-3-25 14:09
1865-0929 ternationalJoint Conference on e-Business and Telecommunications, ICETE 2009, heldin Milan, Italy, in July 2009. The 34 revised full papers presented together with 4 invited papers inthis volume were carefully reviewed and selected from 300 submissions.They have passed two rounds of selection and im作者: 代理人 時間: 2025-3-25 19:16
Interactive Multimedia Learning we discuss the main privacy concerns that arise when releasing information to third parties. In particular, we focus on the data publication and data outsourcing scenarios, illustrating the emerging trends in terms of privacy and data protection and identifying some research directions to be investigated.作者: 模范 時間: 2025-3-25 21:05 作者: 樹上結(jié)蜜糖 時間: 2025-3-26 03:18
Lecture Notes in Computer Sciencech algorithms have great potentials for use in mobile terminals and provide therefore important support for wireless communication networks. The resulting unconventional adaptive antennas can lead to dramatically simplified architectures leading in turn to significantly lower power dissipation and fabrication costs.作者: Ostrich 時間: 2025-3-26 07:51 作者: Anterior 時間: 2025-3-26 10:37
Interactive Process Mining in Healthcareoccurred in the timeframe considered depended largely on a defective approach to business strategy definition, while environmental dynamicity mostly played an “amplification effect” on the mistakes made in the underlying strategic planning process.作者: Harass 時間: 2025-3-26 15:04
Introduction and problem statement,d here described. The results are mostly qualitative ones and show that, in response to crisis, communication complexity is reduced, power and influence become centralized, and concern for efficiency increases, leading to conservation of resources and greater behavioral rigidity in organizations.作者: Surgeon 時間: 2025-3-26 17:04
https://doi.org/10.1007/978-1-4020-9909-0tation load on powerful users, achieves true contributory key agreement property and dynamic handling of user join and leave. The security of the protocol has been analyzed under formal model. The comparison result shows considerable improvement in protocol efficiency compared to the existing ones.作者: Plaque 時間: 2025-3-26 22:02 作者: 棲息地 時間: 2025-3-27 01:36
Designing Digital Marketplaces for Competitiveness of SMEs in Developing Countriescing hindrances. However, starting at the right point and in the right way doesn’t automatically guarantee success and competitive advantage of SMEs, but can represent a way to start admitting the fundamental role of the innovation in a high complex environment.作者: Phagocytes 時間: 2025-3-27 08:53
Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of occurred in the timeframe considered depended largely on a defective approach to business strategy definition, while environmental dynamicity mostly played an “amplification effect” on the mistakes made in the underlying strategic planning process.作者: FLIRT 時間: 2025-3-27 10:24
Collaboration Strategies in Turbulent Periods: Effects of Perception of Relational Risk on Enterprisd here described. The results are mostly qualitative ones and show that, in response to crisis, communication complexity is reduced, power and influence become centralized, and concern for efficiency increases, leading to conservation of resources and greater behavioral rigidity in organizations.作者: 鑲嵌細工 時間: 2025-3-27 15:53
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networkstation load on powerful users, achieves true contributory key agreement property and dynamic handling of user join and leave. The security of the protocol has been analyzed under formal model. The comparison result shows considerable improvement in protocol efficiency compared to the existing ones.作者: OVERT 時間: 2025-3-27 21:02
https://doi.org/10.1007/978-3-031-01595-3oadcasting scheme, ., which provides a decentralized broadcasting service with anonymity. This scheme provides a practical alternative to existing techniques for broadcasting content that can be created in advance. We present security analysis of the scheme from the following aspects: ., and ..作者: Homocystinuria 時間: 2025-3-27 23:10
Run-Time Optimization of Readsize,esent a set of system configuration optimizations on Linux that achieve significant throughput gains, supported by extensive measurements. Our work demonstrates that IPsec performance can be significantly improved without altering the implementation of the cryptographic algorithms.作者: 低位的人或事 時間: 2025-3-28 05:25
Offline Peer-to-Peer Broadcast with Anonymityoadcasting scheme, ., which provides a decentralized broadcasting service with anonymity. This scheme provides a practical alternative to existing techniques for broadcasting content that can be created in advance. We present security analysis of the scheme from the following aspects: ., and ..作者: 明智的人 時間: 2025-3-28 09:45
Optimizations for High-Performance IPsec Executionesent a set of system configuration optimizations on Linux that achieve significant throughput gains, supported by extensive measurements. Our work demonstrates that IPsec performance can be significantly improved without altering the implementation of the cryptographic algorithms.作者: 龍蝦 時間: 2025-3-28 13:35
1865-0929 provement. The papers areorganized in topical sections on e-business; security and cryptography;signal processing and multimedia applications; wireless informationnetworks and systems.978-3-642-20076-2978-3-642-20077-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Euthyroid 時間: 2025-3-28 17:25
Conference proceedings 2011, Italy, in July 2009. The 34 revised full papers presented together with 4 invited papers inthis volume were carefully reviewed and selected from 300 submissions.They have passed two rounds of selection and improvement. The papers areorganized in topical sections on e-business; security and cryptog作者: Foam-Cells 時間: 2025-3-28 20:25 作者: expository 時間: 2025-3-29 01:07 作者: bacteria 時間: 2025-3-29 04:16 作者: SLAY 時間: 2025-3-29 09:08
Interactive Multimedia Learning e-Broker. This paper presents adaptive design architectures for e-Commerce and e-Broker, and it concludes by giving several reasons why a balanced e-Barter design cannot be reliably conjectured at this time.作者: 戲服 時間: 2025-3-29 13:45 作者: 清洗 時間: 2025-3-29 18:53 作者: 松軟無力 時間: 2025-3-29 20:24 作者: instill 時間: 2025-3-30 01:39 作者: 做作 時間: 2025-3-30 08:08 作者: 皺痕 時間: 2025-3-30 09:01
Plug and Play Transport Chain Management: Agent-Based Support to the Planning and Execution of Transiders, and infrastructure managers, during the complete process from planning to termination. The approach is inspired by the concepts of virtual enterprises and breeding environments. We analyse the requirements of such an approach and describe a multi-agent system architecture meeting these requirements.作者: 季雨 時間: 2025-3-30 14:10 作者: HALL 時間: 2025-3-30 18:16 作者: Anal-Canal 時間: 2025-3-30 23:27
e-Business and Telecommunications978-3-642-20077-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 激勵 時間: 2025-3-31 01:58
https://doi.org/10.1007/978-3-642-20077-9MANET; authentication; electronic commerce; encryption; hardware-based security; middleware; multimedia; ne作者: PHON 時間: 2025-3-31 07:32 作者: osteopath 時間: 2025-3-31 09:32
Interactive Multimedia Learningthat might be released publicly or semi-publicly for various purposes, are essential requirements for the today’s Electronic Society. In this chapter, we discuss the main privacy concerns that arise when releasing information to third parties. In particular, we focus on the data publication and data作者: 包裹 時間: 2025-3-31 14:26
Interactive Multimedia Learningd, because they over-prioritize control. Balance is achieved when one basic pattern is the top priority, while the other two patterns are not ignored. This paper explains how to use these patterns to create a balanced e-Business model: e-Commerce, e-Broker or e-Barter. Market forces are now occurrin作者: 盲信者 時間: 2025-3-31 20:00 作者: arrogant 時間: 2025-4-1 01:45
Comparing software applications,l appropriate to their strategy. This paper demonstrates how Internet retailers can optimize short-term profitability by determining the price elasticity of demand based on empirical price tests. For this purpose visitors of an Internet retailer are divided into subgroups of approximately same size