


default search action
2nd ICETE 2005: Reading, UK
- Joaquim Filipe, Luminita Vasiu:

ICETE 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005. INSTICC Press 2005, ISBN 972-8865-32-5
Invited Speakers
Keynote Lectures
- Mohammad S. Obaidat:

Trends and challenges in wireless networks. ICETE 2005 - Yin Leng Theng:

Usability, perceived credibility and trust: Users' perspectives to security and privacy. ICETE 2005 - David Wood:

Real world threats and opportunities with smartphones. ICETE 2005 - Susanne Wetzel:

Biometrics and cryptography. ICETE 2005 - Mark d'Inverno:

Agents, emergence and modelling: What value for communication networks? ICETE 2005 - Paulo T. de Sousa:

Mobile and wireless communications. ICETE 2005 - Rohit Dhamankar:

The evolution of security: Network intrusion prevention. ICETE 2005
Tutorial
- Mohammad S. Obaidat:

Fundamentals of wireless networks systems. ICETE 2005
Volume 1
Global Communication Information Systems and Services
Full Papers
- Ilhem Abdelhedi Abdelmoula, Hella Kaffel Ben Ayed, Farouk Kamoun:

A Hierarchical distributed communication architecture for real-time auctions. ICETE 2005: 5-15 - Jan Gerke, Peter Reichl, Burkhard Stiller:

Strategies for service composition in P2P networks. ICETE 2005: 16-24 - Cristian Donciulescu, Luminita Vasiu:

Securing XML web services Â- a plug & play approach. ICETE 2005: 25-32 - Asif Ali Munshi, Fareed Hussain:

Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrix. ICETE 2005: 33-40 - Mark W. Andrews, Ronan J. Skehill, Michael Barry, Sean McGrath:

Secure transparent mobility secure mobility infrastructure using mobile ip. ICETE 2005: 41-48 - Rebecca Bulander, Michael Decker, Gunther Schiefer:

Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy. ICETE 2005: 49-56 - Charles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy:

A secure framework for managing transactional properties of business objects. ICETE 2005: 57-65 - Daniel A. Nagy:

On digital cash-like payment systems. ICETE 2005: 66-73 - Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey:

A general model of authorisation for complex computing applications. ICETE 2005: 74-79 - C. W. Cheng, C. G. Chung:

An organization-based cache mechanism for supporting pcs number portability service. ICETE 2005: 80-87 - Evgenii Krouk, Sergei Semenov:

Transmission of a message during limited time with the help of transport coding. ICETE 2005: 88-93 - Wilfred W. K. Lin, Allan K. Y. Wong, Richard S. L. Wu, Tharam S. Dillon:

A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip time. ICETE 2005: 94-101 - Ghazal Afroozi Milani, Koorush Ziarati, Alireza Tamaddoni-Nezhad:

Virtual characteristics measurement using factor analysis. ICETE 2005: 102-108 - Hiroshi Yamada, Akira Kawaguchi:

Sharing service resource infromation for application integrtation in a virtual enterprise modeling the communication protocol for exchanging service resource information. ICETE 2005: 109-116 - Jinmi Jung, Hyun Kim, Hyung-Sun Kim, Joo-Haeng Lee:

The engine to support building cpc solutions. ICETE 2005: 117-121 - Antonia Stefani, Dimitris Stavrinoudis, Michalis Nik Xenos:

In-depth analysis of selected topics related to the quality assessment of e-commerce systems. ICETE 2005: 122-128
Short Papers
- Kristoffer Getchell, Martin Bateman, Colin Allison, Alan Miller:

End to end adaptation for the web matching content to client connections. ICETE 2005: 131-136 - C. W. Cheng, C. G. Chung:

A PBX-based approach for telecommunication number portability service. ICETE 2005: 137-142 - Taoshen Li, Jingli Wu:

An improved genetic algorithm for solving the vehicle routing problem with time windows. ICETE 2005: 143-149 - Victor Santos, Edmundo Monteiro, Antonio Gomes Martins:

E-business for the electricity retail market a business to client perspective. ICETE 2005: 150-156
Posters
- Israel González-Carrasco, José Luis López Cuadrado, Belén Ruíz-Mezcua, Ángel García-Crespo:

New trends of e-commerce in spain. ICETE 2005: 159-163 - Malamati D. Louta, Angelos Michalas, Ioannis Psoroulas, Evangelos Loutas:

Cost-effective service task assignment in multidomain distributed computing environments. ICETE 2005: 164-168 - Markus W. Schranz:

Nedine: An intelligent global news publishing and distribution service based on web services and peer-to-peer technologies. ICETE 2005: 169-172 - Noh-sam Park, Gil-Haeng Lee:

A framework for policy-based sla management over wireless lan. ICETE 2005: 173-176 - Panagiotis Germanakos, Constantinos Mourlas, Chara Isaia:

Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainability. ICETE 2005: 177-180 - Ricardo Colomo-Palacios, Edmundo Tovar:

E-commerce ticketing tool for multifunctional enclosures low cost solutions for tradicional venues best adventaje. ICETE 2005: 181-184 - Sandrine Pasqualini, Sofie Verbrugge, A. Kirstäter, Andreas Iselt, Didier Colle, Mario Pickavet, Piet Demeester:

GMPLS impact on network providerÂ's opex when compared to traditional approaches. ICETE 2005: 185-192 - Simone A. Ludwig, S. M. S. Reyhani:

Enhanced discovery of web services using semantic context descriptions. ICETE 2005: 193-196
Security and reliability in information systems and networks
Full Papers
- Muhammad Fermi Pasha, Rahmat Budiarto, Masashi Yamada:

Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system. ICETE 2005: 201-209 - Hehong Fan, Mingde Zhang, Xiaohan Sun:

Reliability evaluation of wdm networks with link capacity and hop constraints. ICETE 2005: 210-215 - Ahmad Fadlallah, Ahmed Serhrouchni:

A signaling architecture against dos attacks. ICETE 2005: 216-221 - Patrik Salmela, Jan Melén:

Host identity protocol proxy. ICETE 2005: 222-230 - Liu Yan, Yin Xia, Jianping Wu:

Survey on SNMP in next genaration network. ICETE 2005: 231-239 - Chunlei Yang, Gui Yun Tian, Steve Ward:

Biometric based smart card for security. ICETE 2005: 240-246 - Rachid Bencheikh, Luminita Vasiu:

Enhancing the security of mobile e-commerce with a hybrid biometric authentication system. ICETE 2005: 247-253 - Seny Kamara, Breno de Medeiros, Susanne Wetzel:

Secret locking: Exploring new approaches to biometric key encapsulation. ICETE 2005: 254-261 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Cellular automata based key agreement. ICETE 2005: 262-267 - Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:

Guaranteerring security of financial transaction by using quantum cryptography in banking environment. ICETE 2005: 268-274 - Marek Karpinski, Yakov Nekrich:

Optimal trade-off for merkle tree traversal. ICETE 2005: 275-282 - Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis:

Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290
Short Papers
- Eunjin Ko, Junwoo Lee, Gilhaeng Lee, Youngsun Kim:

The web-based sla monitoring and reporting (WSMR) system. ICETE 2005: 293-297 - Weider D. Yu, Archana Mansukhani:

A reusable intelligent authorization design for web services software security. ICETE 2005: 298-303 - David Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche:

Automated configuration distribution in verinec. ICETE 2005: 304-309 - Chih-Shing Tau, Tzone-I Wang:

Reliable multicast protocol a modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocols. ICETE 2005: 310-317 - Rodrigo Sanger Alves, Clarissa Cassales Marquezan, Philippe Olivier Alexandre Navaux, Lisandro Zambenedetti Granville:

Cluster and network management integration an SNMP-based Solution. ICETE 2005: 318-323 - Yazeed A. Al-Sbou, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan:

Estimation of the distributions of the QOS parameters using sampled passive measurements techniques. ICETE 2005: 324-329 - Delphine Charlet, Victor Peral Lecha:

Voice biometrics within the family: Trust, privacy and personalisation. ICETE 2005: 330-334 - Jarrod Trevathan, Alan McCabe:

Remote handwritten signature authentication. ICETE 2005: 335-339 - Jarrod Trevathan, Wayne Read, Hossein Ghodosi:

Design issues for electronic auctions. ICETE 2005: 340-347 - João Afonso, Edmundo Monteiro, Carlos Ferreira:

Monitoring and alarm management for system and network security a web-based comprehensive approach. ICETE 2005: 348-355
Posters
- Somchai Lekcharoen, Chanintorn Jittawiriyanukoon:

Scheduling and QOs for leak rate in policing mechanisms over telecommunications network. ICETE 2005: 359-363 - George I. Davida, Jeremy A. Hansen:

A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms. ICETE 2005: 364-367 - George I. Davida, Jon Peccarelli:

Hardening windows systems. ICETE 2005: 368-371 - Michael Höding:

Design and implementation aspects of management systems for application service providing. ICETE 2005: 372-375 - Nelson Uto, Helen Teixeira, Andre Blazko, Marcos Ferreira de Paula, Renata Cicilini Teixeira, Mamede Lima-Marques:

Generating security event correlation rules through k-means clustering. ICETE 2005: 376-381
Volume 2
Wireless communication systems and networks
- Nancy Alonistioti, Alexandros Kaloxylos, Andreas Maras:

Mobility management for beyond 3G reconfigurable systems. ICETE 2005: 5-12 - M. Vastram Naik, Anil Mahanta, Ratnajit Bhattacharjee, Harshal B. Nemade:

An automatic blind modulation recognition algorithm for m-psk signals based on mse criterion. ICETE 2005: 13-19 - Gráinne Hanley, Seán Murphy, Liam Murphy:

Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos support. ICETE 2005: 20-27 - Mohammad Saraireh, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan:

A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types. ICETE 2005: 28-35 - Christian Veigner, Chunming Rong:

Flooding attack on the binding cache in mobile IPv6. ICETE 2005: 36-43 - Shobhan Adhikari, Teerapat Sanguankotchakorn:

Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6. ICETE 2005: 44-54 - João Carlos Silva, Nuno Souto, Francisco Cercas, Rui Dinis:

Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systems. ICETE 2005: 55-60 - Akira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga, Noriteru Shinagawa:

The robustness of blocking probability in a loss system with repeated customers. ICETE 2005: 61-66 - Albert Mráz, Mihály Katona, Sándor Imre:

Efficient call admission control for 3G networks chernoff-bound based CAC. ICETE 2005: 67-73 - Fernando da Costa Jr., Luciano Paschoal Gaspary, Jorge L. V. Barbosa, Gerson G. H. Cavalheiro, Luciano Pfitscher, José Dirceu G. Ramos:

On the evaluation of a secure solution to access 802.11 networks. ICETE 2005: 74-79 - Saravut Yaipairoj, Fotios C. Harmantzis, Vinoth Gunasekaran:

A pricing model of GPRS networks with WI-FI integration for "heavy" data users. ICETE 2005: 80-85 - Andrey I. Lyakhov, Vladimir M. Vishnevsky, Pavel Poupyrev:

Analytical study of broadcasting in 802.11 ad hoc networks. ICETE 2005: 86-91 - Nadia Chetta, Nadjib Badache:

Quorums based mobiles location scheme. ICETE 2005: 92-97 - Andrey Krendzel, Jarmo Harju, Sergey Lopatin:

Performance evaluation of 3G core network nodes. ICETE 2005: 98-104 - Rodolfo Oliveira, Luís Bernardo, Paulo Pinto:

Searching for resources in manets: A cluster based flooding approach. ICETE 2005: 105-111 - Suresh Venkatachalaiah, Richard J. Harris:

Optimisation of handoff performance in wireless networks using evolutionary algorithms. ICETE 2005: 112-118 - Carlos Fernández, Juan P. Pece, Daniel I. Iglesi:

SMSFormKit: A System for presentation, validation and update of forms for mobile devices. ICETE 2005: 119-124 - Eisuke Hanada, Takato Kudou:

A wireless voice/data communication system in a large hospital. ICETE 2005: 125-132 - Adrian Spalka, Armin B. Cremers, Marcel Winandy:

Multilateral security considerations for adaptive mobile applications. ICETE 2005: 133-137 - Ziad Hunaiti, Ammar Rahman, Wamadeva Balachandran, Zayed Huneiti:

Evaluating the usage of wireless broadband hotspots. ICETE 2005: 138-141 - Hiroshi Masuyama, Yuuta Fukudome, Tetsuo Ichimori:

One-to-all and all-to-all broadcasting algorithms in cellular networks. ICETE 2005: 142-145 - Juan P. Pece, Carlos Fernández, Carlos J. Escudero:

Moviltooth: context-aware system for mobile phones based on bluetooth technology. ICETE 2005: 146-149 - Matthew D'Souza, Adam Postula, Neil W. Bergmann, Montserrat Ros:

Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebook. ICETE 2005: 150-153 - Matthew D'Souza, Adam Postula, Neil W. Bergmann, Montserrat Ros:

A bluetooth based protocol for multimedia guidebooks on mobile computing devices experiencing mobile locality-aware multimedia in the palm of your hand. ICETE 2005: 154-157 - Tsung-Han Lee, Alan Marshall, Bosheng Zhou:

Energy-conserving on-demand routing for multi-rate multi-hop networks. ICETE 2005: 158-161 - Jason C. T. Lo, Allan K. Y. Wong, Wilfred W. K. Lin:

A novel transfer policy model to enhance the serviceability of an e-business. ICETE 2005: 162-170 - Karol Wnukowicz, Wladyslaw Skarbek:

Properties of dominant color temperature descriptor. ICETE 2005: 171-176 - Klaus Holtz, Eric Holtz, Diana Kalienky:

Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theory. ICETE 2005: 177-182 - David Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García, Víctor G. García:

Test environment for performance evaluation of an internet radio. ICETE 2005: 183-190 - Xiaoyun Wang, Kefei Chen:

An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196 - Xabiel G. Pañeda, Roberto García, David Melendi, Manuel Vilas, Víctor G. García:

Method for audio/video streaming testbed definition and model development. ICETE 2005: 197-200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














