default search action
6th ICETE 2009: Milan, Italy
- Mohammad S. Obaidat, Joaquim Filipe:
e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers. Communications in Computer and Information Science 130, Springer 2011, ISBN 978-3-642-20076-2
Part 1 / Invited Papers
- Blagovest Shishkov:
Stochastic Modeling and Statistical Inferences of Adaptive Antennas in Wireless Communications. 3-19 - Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati:
Protecting Information Privacy in the Electronic Society. 20-36 - David A. Marca:
The Three Fundamental e-Business Models. 37-52 - Gottfried Vossen:
Web 2.0: From a Buzzword to Mainstream Web Reality. 53-67
Part 2 / Part I: e-Business
- Burkhardt Funk:
Exploring Price Elasticity to Optimize Posted Prices in e-Commerce. 71-81 - Valentina Ndou, Pasquale Del Vecchio, Laura Schina:
Designing Digital Marketplaces for Competitiveness of SMEs in Developing Countries. 82-93 - Antonio Ghezzi, Andrea Rangone, Raffaello Balocco:
Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of a Mobile Middleware Technology Provider. 94-109 - Marco Remondino, Marco Pironti, Paola Pisano:
Collaboration Strategies in Turbulent Periods: Effects of Perception of Relational Risk on Enterprise Alliances. 110-125 - Marcelo Cortimiglia, Filippo Renga, Andrea Rangone:
A Classification Schema for Mobile-Internet 2.0 Applications. 126-138 - Paul Davidsson, Johan Holmgren, Jan A. Persson, Andreas Jacobsson:
Plug and Play Transport Chain Management: Agent-Based Support to the Planning and Execution of Transports. 139-155
Part 3 / Part II: Security and Cryptography
- Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi:
Exploiting Crosstalk Effects in FPGAs for Generating True Random Numbers. 159-173 - Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
Offline Peer-to-Peer Broadcast with Anonymity. 174-185 - Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar:
Wireless Authentication and Transaction-Confirmation Token. 186-198 - Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Optimizations for High-Performance IPsec Execution. 199-211 - Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks. 212-223 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Privacy Enhancements for Hardware-Based Security Modules. 224-236 - Kristof Verslype, Bart De Decker:
Flexible and Time-Based Anonymous Access Restrictions. 237-250
Part 4 / Part III: Signal Processing and Multimedia Applications
- Gaurav Gupta, Josef Pieprzyk, Mohan S. Kankanhalli:
Robust Numeric Set Watermarking: Numbers Don't Lie. 253-265 - François Xavier Nsabimana, Vignesh Subbaraman, Udo Zölzer:
Corrupting Noise Estimation Based on Rapid Adaptation and Recursive Smoothing. 266-277 - Paulo Muniz de Ávila, Sérgio Donizetti Zorzo:
Recommender System: A Personalized TV Guide System. 278-290 - Günther Schatter, Andreas Eiselt:
An Enhanced Concept of a Digital Radio Incorporating a Multimodal Interface and Searchable Spoken Content. 291-304
Part 5 / Part IV: Wireless Information Networks and Systems
- Andreas Ahrens, César Benavente-Peces:
Modulation-Mode Assignment in Iteratively Detected and SVD-Assisted Broadband MIMO Schemes. 307-319 - David B. Lowe, Steve Murray, Xiaoying Kong:
Wireless Sensor Resource Usage Optimisation Using Embedded State Predictors. 320-331 - Tudor Cioara, Ionut Anghel, Ioan Salomie:
A Self-configuring Middleware Solution for Context Management. 332-345 - Karl-Heinz Krempels, Sebastian Patzak, Janno von Stülpnagel, Christoph Terwelp:
Device Whispering: An Approach for Directory-Less WLAN Positioning. 346-357
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.