


default search action
ICETE 2013: Reykjavík, Iceland
- Mohammad S. Obaidat

, Joaquim Filipe
:
E-Business and Telecommunications - International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers. Communications in Computer and Information Science 456, Springer 2014, ISBN 978-3-662-44787-1
Invited Speakers
- Pascal Lorenz

:
QoS and QoE in the Next Generation Networks and Wireless Networks. 3-16 - Roman Korkikian, David Naccache, Guilherme Ozari de Almeida, Rodrigo Portella do Canto:

Practical Instantaneous Frequency Analysis Experiments. 17-34
Data Communication Networking
- Anne Bouillard, Claude Jard, Aurore Junier:

The Impact of Initial Delays in OSPF Routing. 37-57 - Laura Ricci

, Luca Genovali, Barbara Guidi:
Managing Virtual Entities in MMOGs: A Voronoi-Based Approach. 58-73 - Libor Polcak, Martin Holkovic, Petr Matousek

:
Host Identity Detection in IPv6 Networks. 74-89
e-Business
- Tiago Picão, Fiona McMahon, Valerie Purchase, Maurice D. Mulvenna

:
The Use of Twitter by Local Government in Northern Ireland. 93-106 - Florian Nottorf:

Multi-channel Attribution Modeling on User Journeys. 107-125 - Uschi Buchinger, Heritiana Ranaivoson

, Pieter Ballon
:
When Loyalty Points Become Virtual Currencies: Transforming Business Models for Online Platforms. 126-141 - Elena Bellio

, Luca Buccoliero
:
Digital Cities Web Marketing Strategies in Italy: The Path Towards Citizen Empowerment. 142-159 - Milena Casagranda, Luigi Colazzo, Andrea Molinari

:
Estimating the Effort in the Development of Distance Learning Paths. 160-179
Optical Communication Systems
- Andreas Ahrens

, Steffen Schröder, Steffen Lochmann
:
Modal and Chromatic Dispersion Analysis Within a Measured 1, 4 km MIMO Multimode Channel. 183-196 - Tiago M. F. Alves

, Adolfo V. T. Cartaxo
:
Long-Reach PONs Employing Directly Modulated Lasers for Provisioning of OFDM-UWB Radio Signals in Sparse Geographical Areas. 197-206
Security and Cryptography
- Luis Campo-Giralte, Isaac Martín de Diego

, Cristina Conde
, Enrique Cabello
:
InCC: Evading Interception and Inspection by Mimicking Traffic in Network Flows. 209-225 - Lan Zhou, Vijay Varadharajan

, Michael Hitchens
:
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control. 226-251 - Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack:

IPv6 Network Attack Detection with HoneydV6. 252-269 - Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:

Youtube User and Usage Profiling: Stories of Political Horror and Security Success. 270-289 - Petr Svenda

, Martin Ukrop
, Vashek Matyás:
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. 290-305 - Bo Lang, Runhua Xu, Yawei Duan:

Self-contained Data Protection Scheme Based on CP-ABE. 306-321 - Massimiliano Albanese

, Sushil Jajodia
, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. 322-340
Signal Processing and Multimedia Applications
- Patrik Goorts, Steven Maesen, Maarten Dumont, Sammy Rogmans, Philippe Bekaert:

Optimal Distribution of Computational Power in Free Viewpoint Interpolation by Depth Hypothesis Density Adaptation in Plane Sweeping. 343-358 - Nassim Asbai, Messaoud Bengherabi

, Farid Harizi, Abderrahmane Amrouche:
Effect of the Front-End Processing on Speaker Verification Performance Using PCA and Scores Level Fusion. 359-368 - Steven Verstockt, Viktor Slavkovikj, Pieterjan De Potter, Olivier Janssens

, Jürgen Slowack, Rik Van de Walle:
Automatic Geographic Enrichment by Multi-modal Bike Sensing. 369-384
Wireless Information Networks and Systems
- Unai Hernández-Jayo

, Idoia De-la-Iglesia
:
Reliability of Cooperative Vehicular Applications on Real Scenarios Over an IEEE 802.11p Communications Architecture. 387-401 - Andreas Ahrens

, Francisco Cano-Broncano
, César Benavente-Peces
:
Transmitter-Side Antennas Correlation in SVD-assisted MIMO Systems. 402-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














