Sign in
ICETE
2004
2005
2004
2005
Keyphrases
Publications
2005
Hehong Fan
,
Mingde Zhang
,
Xiaohan Sun
Reliability evaluation of wdm networks with link capacity and hop constraints.
ICETE
(2005)
Cristian Donciulescu
,
Luminita Vasiu
Securing XML web services Â- a plug & play approach.
ICETE
(2005)
João Carlos Silva
,
Nuno Souto
,
Francisco Cercas
,
Rui Dinis
Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systems.
ICETE
(2005)
Albert Mráz
,
Mihály Katona
,
Sándor Imre
Efficient call admission control for 3G networks chernoff-bound based CAC.
ICETE
(2005)
Panagiotis Germanakos
,
Constantinos Mourlas
,
Chara Isaia
Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainability.
ICETE
(2005)
Rebecca Bulander
,
Michael Decker
,
Gunther Schiefer
Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy.
ICETE
(2005)
Antonia Stefani
,
Dimitris Stavrinoudis
,
Michalis Nik Xenos
In-depth analysis of selected topics related to the quality assessment of e-commerce systems.
ICETE
(2005)
Chunlei Yang
,
Gui Yun Tian
,
Steve Ward
Biometric based smart card for security.
ICETE
(2005)
Weider D. Yu
,
Archana Mansukhani
A reusable intelligent authorization design for web services software security.
ICETE
(2005)
Jason C. T. Lo
,
Allan K. Y. Wong
,
Wilfred W. K. Lin
A novel transfer policy model to enhance the serviceability of an e-business.
ICETE
(2005)
Klaus Holtz
,
Eric Holtz
,
Diana Kalienky
Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theory.
ICETE
(2005)
Seny Kamara
,
Breno de Medeiros
,
Susanne Wetzel
Secret locking: Exploring new approaches to biometric key encapsulation.
ICETE
(2005)
Solange Ghernaouti-Helie
,
Mohamed Ali Sfaxi
Guaranteerring security of financial transaction by using quantum cryptography in banking environment.
ICETE
(2005)
Sandrine Pasqualini
,
Sofie Verbrugge
,
A. Kirstäter
,
Andreas Iselt
,
Didier Colle
,
Mario Pickavet
,
Piet Demeester
GMPLS impact on network providerÂ's opex when compared to traditional approaches.
ICETE
(2005)
ICETE 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005
ICETE
(2005)
Nancy Alonistioti
,
Alexandros Kaloxylos
,
Andreas Maras
Mobility management for beyond 3G reconfigurable systems.
ICETE
(2005)
Eunjin Ko
,
Junwoo Lee
,
Gilhaeng Lee
,
Youngsun Kim
The web-based sla monitoring and reporting (WSMR) system.
ICETE
(2005)
Yin Leng Theng
Usability, perceived credibility and trust: Users' perspectives to security and privacy.
ICETE
(2005)
Mark W. Andrews
,
Ronan J. Skehill
,
Michael Barry
,
Sean McGrath
Secure transparent mobility secure mobility infrastructure using mobile ip.
ICETE
(2005)
Marek Karpinski
,
Yakov Nekrich
Optimal trade-off for merkle tree traversal.
ICETE
(2005)
Andrey I. Lyakhov
,
Vladimir M. Vishnevsky
,
Pavel Poupyrev
Analytical study of broadcasting in 802.11 ad hoc networks.
ICETE
(2005)
Matthew D'Souza
,
Adam Postula
,
Neil W. Bergmann
,
Montserrat Ros
Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebook.
ICETE
(2005)
Gráinne Hanley
,
Seán Murphy
,
Liam Murphy
Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos support.
ICETE
(2005)
Georgia Frantzeskou
,
Efstathios Stamatatos
,
Stefanos Gritzalis
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information.
ICETE
(2005)
Mohammad Saraireh
,
Reza Saatchi
,
Samir Al-Khayatt
,
Rebecca Strachan
A comparative study of IEEE 802.11 MAC access mechanisms for different traffic types.
ICETE
(2005)
Debdeep Mukhopadhyay
,
Dipanwita Roy Chowdhury
Cellular automata based key agreement.
ICETE
(2005)
Wilfred W. K. Lin
,
Allan K. Y. Wong
,
Richard S. L. Wu
,
Tharam S. Dillon
A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip time.
ICETE
(2005)
Nelson Uto
,
Helen Teixeira
,
Andre Blazko
,
Marcos Ferreira de Paula
,
Renata Cicilini Teixeira
,
Mamede Lima-Marques
Generating security event correlation rules through k-means clustering.
ICETE
(2005)
Andrey Krendzel
,
Jarmo Harju
,
Sergey Lopatin
Performance evaluation of 3G core network nodes.
ICETE
(2005)
David Wood
Real world threats and opportunities with smartphones.
ICETE
(2005)
Adrian Spalka
,
Armin B. Cremers
,
Marcel Winandy
Multilateral security considerations for adaptive mobile applications.
ICETE
(2005)
Asif Ali Munshi
,
Fareed Hussain
Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrix.
ICETE
(2005)
Eisuke Hanada
,
Takato Kudou
A wireless voice/data communication system in a large hospital.
ICETE
(2005)
Delphine Charlet
,
Victor Peral Lecha
Voice biometrics within the family: Trust, privacy and personalisation.
ICETE
(2005)
Ghazal Afroozi Milani
,
Koorush Ziarati
,
Alireza Tamaddoni-Nezhad
Virtual characteristics measurement using factor analysis.
ICETE
(2005)
Susanne Wetzel
Biometrics and cryptography.
ICETE
(2005)
Hiroshi Masuyama
,
Yuuta Fukudome
,
Tetsuo Ichimori
One-to-all and all-to-all broadcasting algorithms in cellular networks.
ICETE
(2005)
George I. Davida
,
Jeremy A. Hansen
A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithms.
ICETE
(2005)
Christian Veigner
,
Chunming Rong
Flooding attack on the binding cache in mobile IPv6.
ICETE
(2005)
Rohit Dhamankar
The evolution of security: Network intrusion prevention.
ICETE
(2005)
Somchai Lekcharoen
,
Chanintorn Jittawiriyanukoon
Scheduling and QOs for leak rate in policing mechanisms over telecommunications network.
ICETE
(2005)
Nadia Chetta
,
Nadjib Badache
Quorums based mobiles location scheme.
ICETE
(2005)
Ziad Hunaiti
,
Ammar Rahman
,
Wamadeva Balachandran
,
Zayed Huneiti
Evaluating the usage of wireless broadband hotspots.
ICETE
(2005)
Jarrod Trevathan
,
Wayne Read
,
Hossein Ghodosi
Design issues for electronic auctions.
ICETE
(2005)
Carlos Fernández
,
Juan P. Pece
,
Daniel I. Iglesi
SMSFormKit: A System for presentation, validation and update of forms for mobile devices.
ICETE
(2005)
David Melendi
,
Manuel Vilas
,
Xabiel G. Pañeda
,
Roberto García
,
Víctor G. García
Test environment for performance evaluation of an internet radio.
ICETE
(2005)
Ahmad Fadlallah
,
Ahmed Serhrouchni
A signaling architecture against dos attacks.
ICETE
(2005)
Daniel A. Nagy
On digital cash-like payment systems.
ICETE
(2005)
Shobhan Adhikari
,
Teerapat Sanguankotchakorn
Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6.
ICETE
(2005)
C. W. Cheng
,
C. G. Chung
A PBX-based approach for telecommunication number portability service.
ICETE
(2005)