default search action
2nd ICETE 2005: Reading, UK
- Joaquim Filipe, Luminita Vasiu:
ICETE 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005. INSTICC Press 2005, ISBN 972-8865-32-5
Invited Speakers
Keynote Lectures
- Mohammad S. Obaidat:
Trends and challenges in wireless networks. ICETE 2005 - Yin Leng Theng:
Usability, perceived credibility and trust: Users' perspectives to security and privacy. ICETE 2005 - David Wood:
Real world threats and opportunities with smartphones. ICETE 2005 - Susanne Wetzel:
Biometrics and cryptography. ICETE 2005 - Mark d'Inverno:
Agents, emergence and modelling: What value for communication networks? ICETE 2005 - Paulo T. de Sousa:
Mobile and wireless communications. ICETE 2005 - Rohit Dhamankar:
The evolution of security: Network intrusion prevention. ICETE 2005
Tutorial
- Mohammad S. Obaidat:
Fundamentals of wireless networks systems. ICETE 2005
Volume 1
Global Communication Information Systems and Services
Full Papers
- Ilhem Abdelhedi Abdelmoula, Hella Kaffel Ben Ayed, Farouk Kamoun:
A Hierarchical distributed communication architecture for real-time auctions. ICETE 2005: 5-15 - Jan Gerke, Peter Reichl, Burkhard Stiller:
Strategies for service composition in P2P networks. ICETE 2005: 16-24 - Cristian Donciulescu, Luminita Vasiu:
Securing XML web services Â- a plug & play approach. ICETE 2005: 25-32 - Asif Ali Munshi, Fareed Hussain:
Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrix. ICETE 2005: 33-40 - Mark W. Andrews, Ronan J. Skehill, Michael Barry, Sean McGrath:
Secure transparent mobility secure mobility infrastructure using mobile ip. ICETE 2005: 41-48 - Rebecca Bulander, Michael Decker, Gunther Schiefer:
Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy. ICETE 2005: 49-56 - Charles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy:
A secure framework for managing transactional properties of business objects. ICETE 2005: 57-65 - Daniel A. Nagy:
On digital cash-like payment systems. ICETE 2005: 66-73 - Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey:
A general model of authorisation for complex computing applications. ICETE 2005: 74-79 - C. W. Cheng, C. G. Chung:
An organization-based cache mechanism for supporting pcs number portability service. ICETE 2005: 80-87 - Evgenii Krouk, Sergei Semenov:
Transmission of a message during limited time with the help of transport coding. ICETE 2005: 88-93 - Wilfred W. K. Lin, Allan K. Y. Wong, Richard S. L. Wu, Tharam S. Dillon:
A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip time. ICETE 2005: 94-101 - Ghazal Afroozi Milani, Koorush Ziarati, Alireza Tamaddoni-Nezhad:
Virtual characteristics measurement using factor analysis. ICETE 2005: 102-108 - Hiroshi Yamada, Akira Kawaguchi:
Sharing service resource infromation for application integrtation in a virtual enterprise modeling the communication protocol for exchanging service resource information. ICETE 2005: 109-116 - Jinmi Jung, Hyun Kim, Hyung-Sun Kim, Joo-Haeng Lee:
The engine to support building cpc solutions. ICETE 2005: 117-121 - Antonia Stefani, Dimitris Stavrinoudis, Michalis Nik Xenos:
In-depth analysis of selected topics related to the quality assessment of e-commerce systems. ICETE 2005: 122-128
Short Papers
- Kristoffer Getchell, Martin Bateman, Colin Allison, Alan Miller:
End to end adaptation for the web matching content to client connections. ICETE 2005: 131-136 - C. W. Cheng, C. G. Chung:
A PBX-based approach for telecommunication number portability service. ICETE 2005: 137-142 - Taoshen Li, Jingli Wu:
An improved genetic algorithm for solving the vehicle routing problem with time windows. ICETE 2005: 143-149 - Victor Santos, Edmundo Monteiro, Antonio Gomes Martins:
E-business for the electricity retail market a business to client perspective. ICETE 2005: 150-156
Posters
- Israel González-Carrasco, José Luis López Cuadrado, Belén Ruíz-Mezcua, Ángel García-Crespo:
New trends of e-commerce in spain. ICETE 2005: 159-163 - Malamati D. Louta, Angelos Michalas, Ioannis Psoroulas, Evangelos Loutas:
Cost-effective service task assignment in multidomain distributed computing environments. ICETE 2005: 164-168 - Markus W. Schranz:
Nedine: An intelligent global news publishing and distribution service based on web services and peer-to-peer technologies. ICETE 2005: 169-172 - Noh-sam Park, Gil-Haeng Lee:
A framework for policy-based sla management over wireless lan. ICETE 2005: 173-176 - Panagiotis Germanakos, Constantinos Mourlas, Chara Isaia:
Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainability. ICETE 2005: 177-180 - Ricardo Colomo Palacios, Edmundo Tovar:
E-commerce ticketing tool for multifunctional enclosures low cost solutions for tradicional venues best adventaje. ICETE 2005: 181-184 - Sandrine Pasqualini, Sofie Verbrugge, A. Kirstäter, Andreas Iselt, Didier Colle, Mario Pickavet, Piet Demeester:
GMPLS impact on network providerÂ's opex when compared to traditional approaches. ICETE 2005: 185-192 - Simone A. Ludwig, S. M. S. Reyhani:
Enhanced discovery of web services using semantic context descriptions. ICETE 2005: 193-196
Security and reliability in information systems and networks
Full Papers
- Muhammad Fermi Pasha, Rahmat Budiarto, Masashi Yamada:
Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system. ICETE 2005: 201-209 - Hehong Fan, Mingde Zhang, Xiaohan Sun:
Reliability evaluation of wdm networks with link capacity and hop constraints. ICETE 2005: 210-215 - Ahmad Fadlallah, Ahmed Serhrouchni:
A signaling architecture against dos attacks. ICETE 2005: 216-221 - Patrik Salmela, Jan Melén:
Host identity protocol proxy. ICETE 2005: 222-230 - Liu Yan, Yin Xia, Jianping Wu:
Survey on SNMP in next genaration network. ICETE 2005: 231-239 - Chunlei Yang, Gui Yun Tian, Steve Ward:
Biometric based smart card for security. ICETE 2005: 240-246 - Rachid Bencheikh, Luminita Vasiu:
Enhancing the security of mobile e-commerce with a hybrid biometric authentication system. ICETE 2005: 247-253 - Seny Kamara, Breno de Medeiros, Susanne Wetzel:
Secret locking: Exploring new approaches to biometric key encapsulation. ICETE 2005: 254-261 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular automata based key agreement. ICETE 2005: 262-267 - Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:
Guaranteerring security of financial transaction by using quantum cryptography in banking environment. ICETE 2005: 268-274 - Marek Karpinski, Yakov Nekrich:
Optimal trade-off for merkle tree traversal. ICETE 2005: 275-282 - Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis:
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290
Short Papers
- Eunjin Ko, Junwoo Lee, Gilhaeng Lee, Youngsun Kim:
The web-based sla monitoring and reporting (WSMR) system. ICETE 2005: 293-297 - Weider D. Yu, Archana Mansukhani:
A reusable intelligent authorization design for web services software security. ICETE 2005: 298-303 - David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche:
Automated configuration distribution in verinec. ICETE 2005: 304-309 - Chih-Shing Tau, Tzone-I Wang:
Reliable multicast protocol a modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocols. ICETE 2005: 310-317 - Rodrigo Sanger Alves, Clarissa Cassales Marquezan, Philippe Olivier Alexandre Navaux, Lisandro Zambenedetti Granville:
Cluster and network management integration an SNMP-based Solution. ICETE 2005: 318-323 - Yazeed A. Al-Sbou, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan:
Estimation of the distributions of the QOS parameters using sampled passive measurements techniques. ICETE 2005: 324-329 - Delphine Charlet, Victor Peral Lecha:
Voice biometrics within the family: Trust, privacy and personalisation. ICETE 2005: 330-334 - Jarrod Trevathan, Alan McCabe:
Remote handwritten signature authentication. ICETE 2005: 335-339 - Jarrod Trevathan, Wayne Read, Hossein Ghodosi:
Design issues for electronic auctions. ICETE 2005: 340-347 - João Afonso, Edmundo Monteiro, Carlos Ferreira:
Monitoring and alarm management for system and network security a web-based comprehensive approach. ICETE 2005: 348-355
Posters
- Somchai Lekcharoen, Chanintorn Jittawiriyanukoon:
Scheduling and QOs for leak rate in policing mechanisms over telecommunications network. ICETE 2005: 359-363 - George I. Davida, Jeremy A. Hansen:
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. ICETE 2005: 364-367 - George I. Davida, Jon Peccarelli:
Hardening windows systems. ICETE 2005: 368-371 - Michael Höding:
Design and implementation aspects of management systems for application service providing. ICETE 2005: 372-375 - Nelson Uto, Helen Teixeira, Andre Blazko, Marcos Ferreira de Paula, Renata Cicilini Teixeira, Mamede Lima-Marques:
Generating security event correlation rules through k-means clustering. ICETE 2005: 376-381
Volume 2
Wireless communication systems and networks
- Nancy Alonistioti, Alexandros Kaloxylos, Andreas Maras:
Mobility management for beyond 3G reconfigurable systems. ICETE 2005: 5-12 - M. Vastram Naik, Anil Mahanta, Ratnajit Bhattacharjee, Harshal B. Nemade:
An automatic blind modulation recognition algorithm for m-psk signals based on mse criterion. ICETE 2005: 13-19 - Gráinne Hanley, Seán Murphy, Liam Murphy:
Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos support. ICETE 2005: 20-27 - Mohammad Saraireh, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan:
A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types. ICETE 2005: 28-35 - Christian Veigner, Chunming Rong:
Flooding attack on the binding cache in mobile IPv6. ICETE 2005: 36-43 - Shobhan Adhikari, Teerapat Sanguankotchakorn:
Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6. ICETE 2005: 44-54 - João Carlos Silva, Nuno Souto, Francisco Cercas, Rui Dinis:
Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systems. ICETE 2005: 55-60 - Akira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga, Noriteru Shinagawa:
The robustness of blocking probability in a loss system with repeated customers. ICETE 2005: 61-66 - Albert Mráz, Mihály Katona, Sándor Imre:
Efficient call admission control for 3G networks chernoff-bound based CAC. ICETE 2005: 67-73 - Fernando da Costa Jr., Luciano Paschoal Gaspary, Jorge L. V. Barbosa, Gerson G. H. Cavalheiro, Luciano Pfitscher, José Dirceu G. Ramos:
On the evaluation of a secure solution to access 802.11 networks. ICETE 2005: 74-79 - Saravut Yaipairoj, Fotios C. Harmantzis, Vinoth Gunasekaran:
A pricing model of GPRS networks with WI-FI integration for "heavy" data users. ICETE 2005: 80-85 - Andrey I. Lyakhov, Vladimir M. Vishnevsky, Pavel Poupyrev:
Analytical study of broadcasting in 802.11 ad hoc networks. ICETE 2005: 86-91 - Nadia Chetta, Nadjib Badache:
Quorums based mobiles location scheme. ICETE 2005: 92-97 - Andrey Krendzel, Jarmo Harju, Sergey Lopatin:
Performance evaluation of 3G core network nodes. ICETE 2005: 98-104 - Rodolfo Oliveira, Luís Bernardo, Paulo Pinto:
Searching for resources in manets: A cluster based flooding approach. ICETE 2005: 105-111 - Suresh Venkatachalaiah, Richard J. Harris:
Optimisation of handoff performance in wireless networks using evolutionary algorithms. ICETE 2005: 112-118 - Carlos Fernández, Juan P. Pece, Daniel I. Iglesi:
SMSFormKit: A System for presentation, validation and update of forms for mobile devices. ICETE 2005: 119-124 - Eisuke Hanada, Takato Kudou:
A wireless voice/data communication system in a large hospital. ICETE 2005: 125-132 - Adrian Spalka, Armin B. Cremers, Marcel Winandy:
Multilateral security considerations for adaptive mobile applications. ICETE 2005: 133-137 - Ziad Hunaiti, Ammar Rahman, Wamadeva Balachandran, Zayed Huneiti:
Evaluating the usage of wireless broadband hotspots. ICETE 2005: 138-141 - Hiroshi Masuyama, Yuuta Fukudome, Tetsuo Ichimori:
One-to-all and all-to-all broadcasting algorithms in cellular networks. ICETE 2005: 142-145 - Juan P. Pece, Carlos Fernández, Carlos J. Escudero:
Moviltooth: context-aware system for mobile phones based on bluetooth technology. ICETE 2005: 146-149 - Matthew D'Souza, Adam Postula, Neil W. Bergmann, Montserrat Ros:
Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebook. ICETE 2005: 150-153 - Matthew D'Souza, Adam Postula, Neil W. Bergmann, Montserrat Ros:
A bluetooth based protocol for multimedia guidebooks on mobile computing devices experiencing mobile locality-aware multimedia in the palm of your hand. ICETE 2005: 154-157 - Tsung-Han Lee, Alan Marshall, Bosheng Zhou:
Energy-conserving on-demand routing for multi-rate multi-hop networks. ICETE 2005: 158-161 - Jason C. T. Lo, Allan K. Y. Wong, Wilfred W. K. Lin:
A novel transfer policy model to enhance the serviceability of an e-business. ICETE 2005: 162-170 - Karol Wnukowicz, Wladyslaw Skarbek:
Properties of dominant color temperature descriptor. ICETE 2005: 171-176 - Klaus Holtz, Eric Holtz, Diana Kalienky:
Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theory. ICETE 2005: 177-182 - David Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García, Víctor G. García:
Test environment for performance evaluation of an internet radio. ICETE 2005: 183-190 - Xiaoyun Wang, Kefei Chen:
An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196 - Xabiel G. Pañeda, Roberto García, David Melendi, Manuel Vilas, Víctor G. García:
Method for audio/video streaming testbed definition and model development. ICETE 2005: 197-200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.