Conferences in DBLP
Mohammad S. Obaidat Fundamentals of wireless networks systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Rohit Dhamankar The evolution of security: Network intrusion prevention. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Paulo T. de Sousa Mobile and wireless communications. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Mark d'Inverno Agents, emergence and modelling: What value for communication networks? [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] David Wood Real world threats and opportunities with smartphones. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Susanne Wetzel Biometrics and cryptography. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Mohammad S. Obaidat Trends and challenges in wireless networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Yin Leng Theng Usability, perceived credibility and trust: Users' perspectives to security and privacy. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:- [Conf ] Nancy Alonistioti , Alexandros Kaloxylos , Andreas Maras Mobility management for beyond 3G reconfigurable systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:5-12 [Conf ] Ilhem Abdelhedi Abdelmoula , Hella Kaffel Ben Ayed , Farouk Kamoun A Hierarchical distributed communication architecture for real-time auctions. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:5-15 [Conf ] M. Vastram Naik , A. Mahanta , R. Bhattacharjee , H. B. Nemade An automatic blind modulation recognition algorithm for m-psk signals based on mse criterion. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:13-19 [Conf ] Jan Gerke , Peter Reichl , Burkhard Stiller Strategies for service composition in P2P networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:16-24 [Conf ] Gráinne Hanley , Seán Murphy , Liam Murphy Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos support. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:20-27 [Conf ] Cristian Donciulescu , Luminita Vasiu Securing XML web services Â- a plug & play approach. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:25-32 [Conf ] Mohammad Saraireh , Reza Saatchi , Samir Al-Khayatt , Rebecca Strachan A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:28-35 [Conf ] Asif Ali Munshi , Fareed Hussain Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrix. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:33-40 [Conf ] Christian Veigner , Chunming Rong Flooding attack on the binding cache in mobile IPv6. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:36-43 [Conf ] Mark W. Andrews , Ronan J. Skehill , Michael Barry , Sean McGrath Secure transparent mobility secure mobility infrastructure using mobile ip. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:41-48 [Conf ] Shobhan Adhikari , Teerapat Sanguankotchakorn Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:44-54 [Conf ] Rebecca Bulander , Michael Decker , Gunther Schiefer Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:49-56 [Conf ] João Carlos Silva , Nuno Souto , Francisco Cercas , Rui Dinis Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:55-60 [Conf ] Charles A. Shoniregun , Ziyang Duan , Subhra Bose , Alex Logvynovskiy A secure framework for managing transactional properties of business objects. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:57-65 [Conf ] Akira Takahashi , Yoshitaka Takahashi , Shigeru Kaneda , Yoshikazu Akinaga , Noriteru Shinagawa The robustness of blocking probability in a loss system with repeated customers. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:61-66 [Conf ] Daniel A. Nagy On digital cash-like payment systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:66-73 [Conf ] Albert Mráz , Mihály Katona , Sándor Imre Efficient call admission control for 3G networks chernoff-bound based CAC. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:67-73 [Conf ] Jim J. Longstaff , Mike A. Lockyer , Tony Howitt , Ian Elcoate , Paul Massey A general model of authorisation for complex computing applications. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:74-79 [Conf ] Fernando da Costa Jr. , Luciano Paschoal Gaspary , Jorge L. V. Barbosa , Gerson G. H. Cavalheiro , Luciano Pfitscher , José Dirceu G. Ramos On the evaluation of a secure solution to access 802.11 networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:74-79 [Conf ] Saravut Yaipairoj , Fotios C. Harmantzis , Vinoth Gunasekaran A pricing model of GPRS networks with WI-FI integration for "heavy" data users. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:80-85 [Conf ] C. W. Cheng , C. G. Chung An organization-based cache mechanism for supporting pcs number portability service. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:80-87 [Conf ] Andrey Lyakhov , Vladimir Vishnevsky , Pavel Poupyrev Analytical study of broadcasting in 802.11 ad hoc networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:86-91 [Conf ] Evgenii Krouk , Sergei Semenov Transmission of a message during limited time with the help of transport coding. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:88-93 [Conf ] Nadia Chetta , Nadjib Badache Quorums based mobiles location scheme. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:92-97 [Conf ] Wilfred W. K. Lin , Allan K. Y. Wong , Richard S. L. Wu , Tharam S. Dillon A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip time. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:94-101 [Conf ] Andrey Krendzel , Jarmo Harju , Sergey Lopatin Performance evaluation of 3G core network nodes. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:98-104 [Conf ] Ghazal Afroozi Milani , Koorush Ziarati , Alireza Tamaddoni-Nezhad Virtual characteristics measurement using factor analysis. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:102-108 [Conf ] Rodolfo Oliveira , Luis Bernardo , Paulo Pinto Searching for resources in manets: A cluster based flooding approach. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:105-111 [Conf ] Hiroshi Yamada , Akira Kawaguchi Sharing service resource infromation for application integrtation in a virtual enterprise modeling the communication protocol for exchanging service resource information. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:109-116 [Conf ] Suresh Venkatachalaiah , Richard J. Harris Optimisation of handoff performance in wireless networks using evolutionary algorithms. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:112-118 [Conf ] Jinmi Jung , Hyun Kim , Hyung-Sun Kim , Joo-Haeng Lee The engine to support building cpc solutions. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:117-121 [Conf ] Carlos Fernández , Juan P. Pece , Daniel I. Iglesi SMSFormKit: A System for presentation, validation and update of forms for mobile devices. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:119-124 [Conf ] Antonia Stefani , Dimitris Stavrinoudis , Michalis Xenos In-depth analysis of selected topics related to the quality assessment of e-commerce systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:122-128 [Conf ] Eisuke Hanada , Takato Kudou A wireless voice/data communication system in a large hospital. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:125-132 [Conf ] Kristoffer Getchell , Martin Bateman , Colin Allison , Alan Miller End to end adaptation for the web matching content to client connections. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:131-136 [Conf ] Adrian Spalka , Armin B. Cremers , Marcel Winandy Multilateral security considerations for adaptive mobile applications. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:133-137 [Conf ] C. W. Cheng , C. G. Chung A PBX-based approach for telecommunication number portability service. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:137-142 [Conf ] Ziad Hunaiti , Ammar Rahman , Wamadeva Balachandran , Zayed Huneiti Evaluating the usage of wireless broadband hotspots. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:138-141 [Conf ] Hiroshi Masuyama , Yuuta Fukudome , Tetsuo Ichimori One-to-all and all-to-all broadcasting algorithms in cellular networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:142-145 [Conf ] Tao-Shen Li , Jing-Li Wu An improved genetic algorithm for solving the vehicle routing problem with time windows. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:143-149 [Conf ] Juan P. Pece , Carlos Fernández , Carlos J. Escudero Moviltooth: context-aware system for mobile phones based on bluetooth technology. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:146-149 [Conf ] Victor Santos , Edmundo Monteiro , Antonio Gomes Martins E-business for the electricity retail market a business to client perspective. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:150-156 [Conf ] Matthew D'Souza , Adam Postula , Neil Bergmann , Montserrat Ros Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebook. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:150-153 [Conf ] Matthew D'Souza , Adam Postula , Neil Bergmann , Montserrat Ros A bluetooth based protocol for multimedia guidebooks on mobile computing devices experiencing mobile locality-aware multimedia in the palm of your hand. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:154-157 [Conf ] Tsung-Han Lee , Alan Marshall , Bosheng Zhou Energy-conserving on-demand routing for multi-rate multi-hop networks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:158-161 [Conf ] Israel Gonzàles-Carrasco , Jose Luis Cuadrado , Belén Ruíz-Mezcua , Ángel García-Crespo New trends of e-commerce in spain. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:159-163 [Conf ] Jason C. T. Lo , Allan K. Y. Wong , Wilfred W. K. Lin A novel transfer policy model to enhance the serviceability of an e-business. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:162-170 [Conf ] Malamati D. Louta , Angelos Michalas , Ioannis Psoroulas , Evangelos Loutas Cost-effective service task assignment in multidomain distributed computing environments. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:164-168 [Conf ] Markus Schranz Nedine: An intelligent global news publishing and distribution service based on web services and peer-to-peer technologies. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:169-172 [Conf ] Karol Wnukowicz , Wladyslaw Skarbek Properties of dominant color temperature descriptor. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:171-176 [Conf ] Noh-sam Park , Gil-Haeng Lee A framework for policy-based sla management over wireless lan. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:173-176 [Conf ] Klaus Holtz , Eric Holtz , Diana Kalienky Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theory. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:177-182 [Conf ] Panagiotis Germanakos , Constantinos Mourlas , Chara Isaia Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainability. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:177-180 [Conf ] Ricardo Colomo , Edmundo Tovar E-commerce ticketing tool for multifunctional enclosures low cost solutions for tradicional venues best adventaje. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:181-184 [Conf ] David Melendi , Manuel Vilas , Xabiel G. Pañeda , Roberto García , Víctor G. García Test environment for performance evaluation of an internet radio. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:183-190 [Conf ] Sandrine Pasqualini , Sofie Verbrugge , A. Kirstäter , Andreas Iselt , Didier Colle , Mario Pickavet , Piet Demeester GMPLS impact on network providerÂ's opex when compared to traditional approaches. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:185-192 [Conf ] Xiaoyun Wang , Kefei Chen An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:191-196 [Conf ] Simone A. Ludwig , S. M. S. Reyhani Enhanced discovery of web services using semantic context descriptions. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:193-196 [Conf ] Xabiel G. Pañeda , Roberto García , David Melendi , Manuel Vilas , Víctor G. García Method for audio/video streaming testbed definition and model development. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:197-200 [Conf ] Muhammad Fermi Pasha , Rahmat Budiarto , Masashi Yamada Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:201-209 [Conf ] Hehong Fan , Mingde Zhang , Xiaohan Sun Reliability evaluation of wdm networks with link capacity and hop constraints. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:210-215 [Conf ] Ahmad Fadlallah , Ahmed Serhrouchni A signaling architecture against dos attacks. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:216-221 [Conf ] Patrik Salmela , Jan Melén Host identity protocol proxy. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:222-230 [Conf ] Liu Yan , Yin Xia , Jianping Wu Survey on SNMP in next genaration network. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:231-239 [Conf ] Chunlei Yang , Gui Yun Tian , Steve Ward Biometric based smart card for security. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:240-246 [Conf ] Rachid Bencheikh , Luminita Vasiu Enhancing the security of mobile e-commerce with a hybrid biometric authentication system. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:247-253 [Conf ] Seny Kamara , Breno de Medeiros , Susanne Wetzel Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:254-261 [Conf ] Debdeep Mukhopadhyay , Dipanwita Roy Chowdhury Cellular automata based key agreement. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:262-267 [Conf ] Solange Ghernaouti-Helie , Mohamed Ali Sfaxi Guaranteerring security of financial transaction by using quantum cryptography in banking environment. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:268-274 [Conf ] Marek Karpinski , Yakov Nekrich Optimal trade-off for merkle tree traversal. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:275-282 [Conf ] Georgia Frantzeskou , Efstathios Stamatatos , Stefanos Gritzalis Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:283-290 [Conf ] Eunjin Ko , Junwoo Lee , Gilhaeng Lee , Youngsun Kim The web-based sla monitoring and reporting (WSMR) system. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:293-297 [Conf ] Weider D. Yu , Archana Mansukhani A reusable intelligent authorization design for web services software security. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:298-303 [Conf ] David Buchmann , Dominik Jungo , Ulrich Ultes-Nitsche Automated configuration distribution in verinec. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:304-309 [Conf ] Chih-Shing Tau , Tzone-I Wang Reliable multicast protocol a modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocols. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:310-317 [Conf ] Rodrigo Sanger Alves , Clarissa Cassales Marquezan , Philippe Olivier Alexandre Navaux , Lisandro Zambenedetti Granville Cluster and network management integration an SNMP-based Solution. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:318-323 [Conf ] Yazeed A. Al-Sbou , Reza Saatchi , Samir Al-Khayatt , Rebecca Strachan Estimation of the distributions of the QOS parameters using sampled passive measurements techniques. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:324-329 [Conf ] Delphine Charlet , Victor Peral Lecha Voice biometrics within the family: Trust, privacy and personalisation. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:330-334 [Conf ] Jarrod Trevathan , Alan McCabe Remote handwritten signature authentication. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:335-339 [Conf ] Jarrod Trevathan , Wayne Read , Hossein Ghodosi Design issues for electronic auctions. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:340-347 [Conf ] João Afonso , Edmundo Monteiro , Carlos Ferreira Monitoring and alarm management for system and network security a web-based comprehensive approach. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:348-355 [Conf ] Somchai Lekcharoen , Chanintorn Jittawiriyanukoon Scheduling and QOs for leak rate in policing mechanisms over telecommunications network. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:359-363 [Conf ] George I. Davida , Jeremy A. Hansen A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:364-367 [Conf ] George I. Davida , Jon Peccarelli Hardening windows systems. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:368-371 [Conf ] Michael Höding Design and implementation aspects of management systems for application service providing. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:372-375 [Conf ] Nelson Uto , Helen Teixeira , Andre Blazko , Marcos Ferreira de Paula , Renata Cicilini Teixeira , Mamede Lima Marques Generating security event correlation rules through k-means clustering. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:376-381 [Conf ]