The SCEAS System
Navigation Menu

Conferences in DBLP

Int. Conf. on E-Business and Telecommunication Networks (icete)
2005 (conf/icete/2005)

  1. Mohammad S. Obaidat
    Fundamentals of wireless networks systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  2. Rohit Dhamankar
    The evolution of security: Network intrusion prevention. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  3. Paulo T. de Sousa
    Mobile and wireless communications. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  4. Mark d'Inverno
    Agents, emergence and modelling: What value for communication networks? [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  5. David Wood
    Real world threats and opportunities with smartphones. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  6. Susanne Wetzel
    Biometrics and cryptography. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  7. Mohammad S. Obaidat
    Trends and challenges in wireless networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  8. Yin Leng Theng
    Usability, perceived credibility and trust: Users' perspectives to security and privacy. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  9. Nancy Alonistioti, Alexandros Kaloxylos, Andreas Maras
    Mobility management for beyond 3G reconfigurable systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:5-12 [Conf]
  10. Ilhem Abdelhedi Abdelmoula, Hella Kaffel Ben Ayed, Farouk Kamoun
    A Hierarchical distributed communication architecture for real-time auctions. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:5-15 [Conf]
  11. M. Vastram Naik, A. Mahanta, R. Bhattacharjee, H. B. Nemade
    An automatic blind modulation recognition algorithm for m-psk signals based on mse criterion. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:13-19 [Conf]
  12. Jan Gerke, Peter Reichl, Burkhard Stiller
    Strategies for service composition in P2P networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:16-24 [Conf]
  13. Gráinne Hanley, Seán Murphy, Liam Murphy
    Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos support. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:20-27 [Conf]
  14. Cristian Donciulescu, Luminita Vasiu
    Securing XML web services Â- a plug & play approach. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:25-32 [Conf]
  15. Mohammad Saraireh, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan
    A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:28-35 [Conf]
  16. Asif Ali Munshi, Fareed Hussain
    Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrix. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:33-40 [Conf]
  17. Christian Veigner, Chunming Rong
    Flooding attack on the binding cache in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:36-43 [Conf]
  18. Mark W. Andrews, Ronan J. Skehill, Michael Barry, Sean McGrath
    Secure transparent mobility secure mobility infrastructure using mobile ip. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:41-48 [Conf]
  19. Shobhan Adhikari, Teerapat Sanguankotchakorn
    Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:44-54 [Conf]
  20. Rebecca Bulander, Michael Decker, Gunther Schiefer
    Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:49-56 [Conf]
  21. João Carlos Silva, Nuno Souto, Francisco Cercas, Rui Dinis
    Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:55-60 [Conf]
  22. Charles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy
    A secure framework for managing transactional properties of business objects. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:57-65 [Conf]
  23. Akira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga, Noriteru Shinagawa
    The robustness of blocking probability in a loss system with repeated customers. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:61-66 [Conf]
  24. Daniel A. Nagy
    On digital cash-like payment systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:66-73 [Conf]
  25. Albert Mráz, Mihály Katona, Sándor Imre
    Efficient call admission control for 3G networks chernoff-bound based CAC. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:67-73 [Conf]
  26. Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey
    A general model of authorisation for complex computing applications. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:74-79 [Conf]
  27. Fernando da Costa Jr., Luciano Paschoal Gaspary, Jorge L. V. Barbosa, Gerson G. H. Cavalheiro, Luciano Pfitscher, José Dirceu G. Ramos
    On the evaluation of a secure solution to access 802.11 networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:74-79 [Conf]
  28. Saravut Yaipairoj, Fotios C. Harmantzis, Vinoth Gunasekaran
    A pricing model of GPRS networks with WI-FI integration for "heavy" data users. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:80-85 [Conf]
  29. C. W. Cheng, C. G. Chung
    An organization-based cache mechanism for supporting pcs number portability service. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:80-87 [Conf]
  30. Andrey Lyakhov, Vladimir Vishnevsky, Pavel Poupyrev
    Analytical study of broadcasting in 802.11 ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:86-91 [Conf]
  31. Evgenii Krouk, Sergei Semenov
    Transmission of a message during limited time with the help of transport coding. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:88-93 [Conf]
  32. Nadia Chetta, Nadjib Badache
    Quorums based mobiles location scheme. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:92-97 [Conf]
  33. Wilfred W. K. Lin, Allan K. Y. Wong, Richard S. L. Wu, Tharam S. Dillon
    A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip time. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:94-101 [Conf]
  34. Andrey Krendzel, Jarmo Harju, Sergey Lopatin
    Performance evaluation of 3G core network nodes. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:98-104 [Conf]
  35. Ghazal Afroozi Milani, Koorush Ziarati, Alireza Tamaddoni-Nezhad
    Virtual characteristics measurement using factor analysis. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:102-108 [Conf]
  36. Rodolfo Oliveira, Luis Bernardo, Paulo Pinto
    Searching for resources in manets: A cluster based flooding approach. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:105-111 [Conf]
  37. Hiroshi Yamada, Akira Kawaguchi
    Sharing service resource infromation for application integrtation in a virtual enterprise modeling the communication protocol for exchanging service resource information. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:109-116 [Conf]
  38. Suresh Venkatachalaiah, Richard J. Harris
    Optimisation of handoff performance in wireless networks using evolutionary algorithms. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:112-118 [Conf]
  39. Jinmi Jung, Hyun Kim, Hyung-Sun Kim, Joo-Haeng Lee
    The engine to support building cpc solutions. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:117-121 [Conf]
  40. Carlos Fernández, Juan P. Pece, Daniel I. Iglesi
    SMSFormKit: A System for presentation, validation and update of forms for mobile devices. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:119-124 [Conf]
  41. Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos
    In-depth analysis of selected topics related to the quality assessment of e-commerce systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:122-128 [Conf]
  42. Eisuke Hanada, Takato Kudou
    A wireless voice/data communication system in a large hospital. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:125-132 [Conf]
  43. Kristoffer Getchell, Martin Bateman, Colin Allison, Alan Miller
    End to end adaptation for the web matching content to client connections. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:131-136 [Conf]
  44. Adrian Spalka, Armin B. Cremers, Marcel Winandy
    Multilateral security considerations for adaptive mobile applications. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:133-137 [Conf]
  45. C. W. Cheng, C. G. Chung
    A PBX-based approach for telecommunication number portability service. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:137-142 [Conf]
  46. Ziad Hunaiti, Ammar Rahman, Wamadeva Balachandran, Zayed Huneiti
    Evaluating the usage of wireless broadband hotspots. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:138-141 [Conf]
  47. Hiroshi Masuyama, Yuuta Fukudome, Tetsuo Ichimori
    One-to-all and all-to-all broadcasting algorithms in cellular networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:142-145 [Conf]
  48. Tao-Shen Li, Jing-Li Wu
    An improved genetic algorithm for solving the vehicle routing problem with time windows. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:143-149 [Conf]
  49. Juan P. Pece, Carlos Fernández, Carlos J. Escudero
    Moviltooth: context-aware system for mobile phones based on bluetooth technology. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:146-149 [Conf]
  50. Victor Santos, Edmundo Monteiro, Antonio Gomes Martins
    E-business for the electricity retail market a business to client perspective. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:150-156 [Conf]
  51. Matthew D'Souza, Adam Postula, Neil Bergmann, Montserrat Ros
    Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebook. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:150-153 [Conf]
  52. Matthew D'Souza, Adam Postula, Neil Bergmann, Montserrat Ros
    A bluetooth based protocol for multimedia guidebooks on mobile computing devices experiencing mobile locality-aware multimedia in the palm of your hand. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:154-157 [Conf]
  53. Tsung-Han Lee, Alan Marshall, Bosheng Zhou
    Energy-conserving on-demand routing for multi-rate multi-hop networks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:158-161 [Conf]
  54. Israel Gonzàles-Carrasco, Jose Luis Cuadrado, Belén Ruíz-Mezcua, Ángel García-Crespo
    New trends of e-commerce in spain. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:159-163 [Conf]
  55. Jason C. T. Lo, Allan K. Y. Wong, Wilfred W. K. Lin
    A novel transfer policy model to enhance the serviceability of an e-business. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:162-170 [Conf]
  56. Malamati D. Louta, Angelos Michalas, Ioannis Psoroulas, Evangelos Loutas
    Cost-effective service task assignment in multidomain distributed computing environments. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:164-168 [Conf]
  57. Markus Schranz
    Nedine: An intelligent global news publishing and distribution service based on web services and peer-to-peer technologies. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:169-172 [Conf]
  58. Karol Wnukowicz, Wladyslaw Skarbek
    Properties of dominant color temperature descriptor. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:171-176 [Conf]
  59. Noh-sam Park, Gil-Haeng Lee
    A framework for policy-based sla management over wireless lan. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:173-176 [Conf]
  60. Klaus Holtz, Eric Holtz, Diana Kalienky
    Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theory. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:177-182 [Conf]
  61. Panagiotis Germanakos, Constantinos Mourlas, Chara Isaia
    Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainability. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:177-180 [Conf]
  62. Ricardo Colomo, Edmundo Tovar
    E-commerce ticketing tool for multifunctional enclosures low cost solutions for tradicional venues best adventaje. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:181-184 [Conf]
  63. David Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García, Víctor G. García
    Test environment for performance evaluation of an internet radio. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:183-190 [Conf]
  64. Sandrine Pasqualini, Sofie Verbrugge, A. Kirstäter, Andreas Iselt, Didier Colle, Mario Pickavet, Piet Demeester
    GMPLS impact on network providerÂ's opex when compared to traditional approaches. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:185-192 [Conf]
  65. Xiaoyun Wang, Kefei Chen
    An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:191-196 [Conf]
  66. Simone A. Ludwig, S. M. S. Reyhani
    Enhanced discovery of web services using semantic context descriptions. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:193-196 [Conf]
  67. Xabiel G. Pañeda, Roberto García, David Melendi, Manuel Vilas, Víctor G. García
    Method for audio/video streaming testbed definition and model development. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:197-200 [Conf]
  68. Muhammad Fermi Pasha, Rahmat Budiarto, Masashi Yamada
    Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:201-209 [Conf]
  69. Hehong Fan, Mingde Zhang, Xiaohan Sun
    Reliability evaluation of wdm networks with link capacity and hop constraints. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:210-215 [Conf]
  70. Ahmad Fadlallah, Ahmed Serhrouchni
    A signaling architecture against dos attacks. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:216-221 [Conf]
  71. Patrik Salmela, Jan Melén
    Host identity protocol proxy. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:222-230 [Conf]
  72. Liu Yan, Yin Xia, Jianping Wu
    Survey on SNMP in next genaration network. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:231-239 [Conf]
  73. Chunlei Yang, Gui Yun Tian, Steve Ward
    Biometric based smart card for security. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:240-246 [Conf]
  74. Rachid Bencheikh, Luminita Vasiu
    Enhancing the security of mobile e-commerce with a hybrid biometric authentication system. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:247-253 [Conf]
  75. Seny Kamara, Breno de Medeiros, Susanne Wetzel
    Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:254-261 [Conf]
  76. Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
    Cellular automata based key agreement. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:262-267 [Conf]
  77. Solange Ghernaouti-Helie, Mohamed Ali Sfaxi
    Guaranteerring security of financial transaction by using quantum cryptography in banking environment. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:268-274 [Conf]
  78. Marek Karpinski, Yakov Nekrich
    Optimal trade-off for merkle tree traversal. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:275-282 [Conf]
  79. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis
    Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:283-290 [Conf]
  80. Eunjin Ko, Junwoo Lee, Gilhaeng Lee, Youngsun Kim
    The web-based sla monitoring and reporting (WSMR) system. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:293-297 [Conf]
  81. Weider D. Yu, Archana Mansukhani
    A reusable intelligent authorization design for web services software security. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:298-303 [Conf]
  82. David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche
    Automated configuration distribution in verinec. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:304-309 [Conf]
  83. Chih-Shing Tau, Tzone-I Wang
    Reliable multicast protocol a modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocols. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:310-317 [Conf]
  84. Rodrigo Sanger Alves, Clarissa Cassales Marquezan, Philippe Olivier Alexandre Navaux, Lisandro Zambenedetti Granville
    Cluster and network management integration an SNMP-based Solution. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:318-323 [Conf]
  85. Yazeed A. Al-Sbou, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan
    Estimation of the distributions of the QOS parameters using sampled passive measurements techniques. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:324-329 [Conf]
  86. Delphine Charlet, Victor Peral Lecha
    Voice biometrics within the family: Trust, privacy and personalisation. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:330-334 [Conf]
  87. Jarrod Trevathan, Alan McCabe
    Remote handwritten signature authentication. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:335-339 [Conf]
  88. Jarrod Trevathan, Wayne Read, Hossein Ghodosi
    Design issues for electronic auctions. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:340-347 [Conf]
  89. João Afonso, Edmundo Monteiro, Carlos Ferreira
    Monitoring and alarm management for system and network security a web-based comprehensive approach. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:348-355 [Conf]
  90. Somchai Lekcharoen, Chanintorn Jittawiriyanukoon
    Scheduling and QOs for leak rate in policing mechanisms over telecommunications network. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:359-363 [Conf]
  91. George I. Davida, Jeremy A. Hansen
    A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:364-367 [Conf]
  92. George I. Davida, Jon Peccarelli
    Hardening windows systems. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:368-371 [Conf]
  93. Michael Höding
    Design and implementation aspects of management systems for application service providing. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:372-375 [Conf]
  94. Nelson Uto, Helen Teixeira, Andre Blazko, Marcos Ferreira de Paula, Renata Cicilini Teixeira, Mamede Lima Marques
    Generating security event correlation rules through k-means clustering. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:376-381 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002