default search action
ICETE 2015: Colmar, Alsace, France
- Mohammad S. Obaidat, Pascal Lorenz:
E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers. Communications in Computer and Information Science 585, Springer 2016, ISBN 978-3-319-30221-8
Invited Paper
- Anthony C. Boucouvalas, Constantine J. Aivalis, Kleanthis Gatziolis:
Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors. 3-35
Data Communication Networking
- Libor Polcák, Leo Caldarola, Amine Choukir, Davide Cuda, Marco Dondero, Domenico Ficara, Barbora Franková, Martin Holkovic, Roberto Muccifora, Antonio Trifilo:
High Level Policies in SDN. 39-57 - Stefan Prinz, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, Matthias Hudler:
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility. 58-78
e-Business
- Bruno Coelho, Fernando Costa, Gil Manuel Gonçalves:
ARM: Architecture for Recruitment Matchmaking. 81-99 - Nils Walravens:
Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels. 100-123 - Shang Gao, Xuemei Zhang:
Understanding the Use of Location Sharing Services on Social Networking Platforms in China. 124-136 - Alaa A. Qaffas, Alexandra I. Cristea:
Large Scale Evaluation of an Adaptive E-Advertising User Model. 137-157
Optical Communication Systems
- Peristera A. Baziana:
How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study. 161-176
Security and Cryptography
- Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:
A Scalable Honeynet Architecture for Industrial Control Systems. 179-200 - Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio:
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications. 201-222 - Jannik Dreier, Ali Kassem, Pascal Lafourcade:
Automated Verification of e-Cash Protocols. 223-244 - Rabih Mohsen, Alexandre Miranda Pinto:
Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach. 245-269 - Peter Amthor:
The Entity Labeling Pattern for Modeling Operating Systems Access Control. 270-292 - George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis:
Execution Path Classification for Vulnerability Analysis and Detection. 293-317 - Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Hafiz Salman Asif, Sameera Ghayyur, Shafay Shamail, Nabil R. Adam:
A Privacy-Sensitive Collaborative Approach to Business Process Development. 318-342 - Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti:
Using OWL Reasoning for Evaluating XACML Policies. 343-363 - Stelvio Cimato, Silvia Mella, Ruggero Susella:
Partial Key Exposure Attacks on RSA with Exponent Blinding. 364-385 - Huan Nguyen, Huy H. Nguyen, Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
A Generalized Authentication Scheme for Mobile Phones Using Gait Signals. 386-407
Signal Processing and Multimedia Applications
- Christoph F. Stallmann, Andries P. Engelbrecht:
Signal Modelling for the Digital Reconstruction of Gramophone Noise. 411-432 - Avi Bleiweiss:
Beat Analysis of Dimensionality Reduced Perspective Streams from Electrocardiogram Signal Data. 433-453 - Pavel Y. Yakimov:
Traffic Signs Detection Using Tracking with Prediction. 454-467 - Fatma Ayari, Ali T. Alouani, Mekki Ksouri:
A Passive Acoustic Technique to Enhance Lung Diseases Diagnostic. 468-489 - Artem V. Nikonorov, A. Kolsanov, Maksim V. Petrov, Yuriy V. Yuzifovich, Evgeny Prilepin, Sergey Chaplygin, Pavel Zelter, K. Bychenkov:
Vessel Segmentation for Noisy CT Data with Quality Measure Based on Single-Point Contrast-to-Noise Ratio. 490-507
Wireless Information Networks and Systems
- Sajid M. Sheikh, Riaan Wolhuter, Herman A. Engelbrecht:
Scheduling Strategies to Improve Reliability and Fairness for Priority Based Smart Rural Contention Based Applications Over Low-Cost Wireless Mesh Backbone Networks. 511-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.