Nicht aus der Schweiz? Besuchen Sie lehmanns.de
e-Business and Telecommunications -

e-Business and Telecommunications (eBook)

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
eBook Download: PDF
2009 | 1. Auflage
XVIII, 490 Seiten
Springer-Verlag
978-3-642-05197-5 (ISBN)
Systemvoraussetzungen
85,60 inkl. MwSt
(CHF 83,60)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems).

Preface 5
Organization 6
Table of Contents 13
Invited Speakers 17
e-Business Innovation: The Next Decade 18
Demographic Cycles 18
The Next Decade 18
The Birth Cycle 19
The Spending Cycle 19
The Economic Cycle 19
Technology Cycles 20
The 80-Year Cycle 20
The Internet S-Curve 21
The Wireless S-Curve 21
The Broadband S-Curve 21
Context Aware e-Business 21
Arrival of Mass Affluence 22
Premium Market Growth 22
Old Culture Scrutinized 22
Corporate Power Shifts 23
New Management Model 23
Customer-Based Organization 23
End-to-End Transaction 24
Customer-based Business Design 24
Business Replication by Market 24
Full Service Response 24
Browsers and Butlers 24
Adaptive Solutions 25
Value Chain 25
Internet Branding 26
Brand Transparency 26
Brand Transparency 26
Configurable Workflows 26
Data Integrity and Privacy 26
Anticipation of Customer Need 27
Responsive Operations 27
Order Management 27
Sourcing Strategy 28
Service Management 28
Transactional Alignment 28
Real-Time Reporting 28
Optimal Decision Making 29
Language-Based Decision Rules 30
Practice-Based Decision Rules 30
Practice-Based Decision Rules 31
Service-Based Decision Rules 31
Summary and Conclusions 31
More Applied Innovation 31
Architecture Innovation 32
XML Platform of Contracts 32
Front-Line Decision-Making 32
References 32
Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past 37
Introduction 37
Review of Multiple Access Technologies 39
History in Development of CDMA Technology 41
Impact of CDMA IPR Issues 44
Problems with the Current CDMA Technology 45
Introduction of NG-CDMA Technology 47
REAL Approach 47
Multi-dimensional Spreading 49
Comparison of NG-CDMA and OFDMA Technologies 52
Technical Features for OFDMA 53
Technical Limitations for OFDMA 56
Conclusions 58
References 59
Part I ICE-B 61
Method for Classification of Unstructured Data in Telecommunication Services 62
Introduction 62
Data Analysis in Telecom Operations 63
Necessities of Data Classification and Text Mining 63
Limitations of Morphological Analysis 64
Limitations of Correspondence Analysis 64
Features of Textual Data in Telecom Services 66
Classification Method Based on Co-occurrence 67
Framework of Classification 67
Term Classification for Telecom Enquiries 67
Calculation Based on Co-occurrence 68
Transition of Relativity among Multiple Terms 69
Evaluation of Results 70
Co-occurrence in a Category 70
Co-occurrence among Categories 70
Conclusions 72
References 72
Possible Determinants Affecting the Use of Mobile Tourism Services 74
Introduction 74
Service Descriptions 75
Possible Determinants 75
Value 76
Ease of Use 77
Risk 77
Social Influence 78
Tourist Characteristics 78
The Field Trial Setup 79
The Participants 81
Experiences from the Trial 81
Discussion 82
Tourist Characteristics 83
Mobile and Service Value 83
Risk 83
Ease of Use 84
Social Influence 84
Conclusions 84
References 85
Towards a Version-Based Approach to Deal with Business Process Evolution 87
Introduction 87
Modelling Business Processes 89
Modelling Versions of Business Processes 91
Concept of Version 91
The Versioned Business Process Meta-model 92
Operations for Business Process Versioning 94
State Chart for Versions 95
Creating and Updating Versions 96
Derivation of Versions 96
Selection of Versions 97
Conclusions 98
References 99
Comparing Consumer Resistance to Mobile Banking in Finland and Portugal 102
Introduction 102
Penetration of Communications Technology 103
Adoption Barriers and Hypotheses 104
Usage Barrier 104
Value Barrier 104
Risk Barrier 105
Tradition Barrier 105
Image Barrier 105
Hypotheses Development 106
Data and Methods 107
Results 108
Conclusions and Future Research 109
References 110
NPTool: Towards Scalability and Reliability of Business Process Management 112
Introduction 112
Related Work 113
NavigationPlanTool 114
The Relational Data Structures Created by $NPDL Interpreter$ 114
The Execution Control of Business Processes in NPTool 115
Example of Execution Control 120
Conclusions 124
References 124
In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland 126
Introduction 126
Study Background 126
Research Methodology 128
Findings 129
Website Development 129
Nature of the SEM Strategy 129
Types of SEM Strategy Used by SMEs 130
SEO Strategy Techniques 130
Paid Search Strategy Techniques 131
Measuring SEM 132
Effectiveness of SEM Measurement 133
Ethics and SEM 134
Challenges in SEM 135
Conclusions 135
References 136
Part II SECRYPT 138
Integrating Anomaly-Based Approach into Bayesian Network Classifiers 139
Introduction 139
Bayesian Classifiers 140
Anomaly Detection 141
Novel Attacks’ Impact on Feature Sets 142
Why Standard Bayesian Classifiers Fail in Detecting Novel Attacks 143
Enhancing Standard Bayesian Classification Rule 144
Enhancing Bayesian Classification Rule to Exploit Normality/Abnormality Duality 144
Enhancing Bayesian Classification Rule to Exploit Zero Probabilities 145
Enhancing Bayesian Classification Rule to Exploit Likelihood of Unusual Attacks 146
Experimental Studies 147
Training and Testing Data Sets 147
Brief Description of Naive Bayes and TAN Classifiers 148
Standard vs Enhanced Bayesian Classification Rule on $http$ Traffic 148
Conclusions 150
References 150
Aggregation and Thresholding Schemes for Anomaly-Based Approaches 152
Introduction 152
Related Work 153
AnomalyMeasuring, Aggregating and Thresholding 153
Drawbacks of Existing Schemes for Anomaly Measuring, Aggregating and Thresholding 155
New Schemes for Anomaly Score Aggregating and Thresholding 156
What Is “Anomalous Behavior” 156
New Thresholding Schemes 157
Bayesian-Based Aggregation 158
Experimental Studies 159
DetectionModel Definition 159
Training and Testing Data 160
Comparison of Thresholding and Aggregation Schemes 161
Evaluation of Ranking-Based Thresholding 162
Conclusions 162
References 163
A Memory Efficient Network Encryption Scheme 165
Introduction 165
Current Schemes 166
General Assumptions 166
CBC-Pre 166
CBC-On 167
Proposed Scheme 167
Proposed Scheme Objectives 167
AES2S 168
Secondary Keys Generation 168
CBC-S$^{/it n}$ 168
MemoryAnalysis 169
Simulation Analysis 170
Server Configuration 170
Parameters 170
The Scenarios 171
The Simulation Results 172
Discussion of the Results 173
Security Analysis 173
Security of CBC 173
Security of AES 174
Security of AES2S 174
Security of the Schemes 174
Conclusions 175
References 176
Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks 178
Introduction 178
Attacks over MANETs 179
PGP-Like 180
Metrics 183
Evaluation Results 184
Lack of Cooperation Attack 185
Impersonation Attacks 186
Conclusions and Future Work 189
References 190
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes 192
Introduction 192
Previous Work in Multiphase Keying: RoK Approach 193
Node Configuration Phase 194
Key Establishment Phase 195
Comparison of Multiphase Keying and Basic Scheme 196
Self Healing 196
Resiliency against Continuous Attack 197
Proposed Schemes 197
DeploymentModels 198
Key Establishment Phase 201
Performance Evaluation 201
Discussions 206
Connectivity versus Resiliency Tradeoff 207
Dynamic Lifetimes of Key Rings andWasted Non-captured Nodes 207
Related Work 207
Conclusions 208
References 209
Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays 211
Introduction 211
Our Contribution 211
RelatedWork 212
Organization 212
Preliminaries 212
The Generalized Birthday Paradox 213
A Multiple Birthday Attack for NTRU 214
An Approach with Symmetric Sets 215
Experimental Results 218
Comparison with Other Attacks 218
Conclusions 219
Open Questions 219
References 219
Appendix 220
On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority 222
Introduction 222
Basic Notions 223
Goals 223
Security Properties 224
Players and Trust Assumptions 224
Ibrahim $et al.’s$ Protocols 224
Protocol in IAS 2007 226
Protocol in SECRYPT 2007 228
Our Analysis 228
Definition 229
Attacks 229
Williams-Treharne-Ho Analysis of the Protocols 231
Deng-Preneel Analysis of the Protocols 231
Comments 232
Conclusions 233
References 234
RKRD: Runtime Kernel Rootkit Detection 236
Introduction 236
Design Principles 237
Assumptions and Threat Model 238
System Architecture 240
Prototype 242
Performance 244
Threat Analysis 246
Related Work 247
Concluding Remarks 248
References 248
A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation 249
Introduction 249
Disk Encryption 250
Disk Encryption Constraints 250
General Scheme and Tweak Calculation 250
Current Modes of Operations 251
Terminologies 251
CBC: Cipher Block Chaining 251
CFB: Cipher Feedback 252
ProposedMode 252
Goals 252
Keys 253
Design 253
Discussion of SCC Mode 254
Pros of SCC 255
Security of SCC 255
Performance Analysis 256
Operational Time 256
Parallel Implementation 256
Elephant 256
The Diffusers 257
ProposedModification 258
Bit Dependency Tests 258
Performance 259
Conclusions 260
References 260
Security Requirements Management in Software Product Line Engineering 262
Introduction 262
SREPPLine 263
Security Requirements Variability Management 265
Product Line Security Domain Requirements Engineering Sub-process 269
Product Line Security Application Requirements Engineering Sub-process 271
Related Work 272
Conclusions and Further Work 273
References 274
Part III SIGMAP 276
On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression 277
Introduction 277
LZ77 and LZSS Compression 278
Decoding 279
Suffix Trees for LZ77 Compression 279
Encoding Using Suffix Trees 280
Suffix Arrays for LZ77 Compression 281
Encoding Using Suffix Arrays 282
Implementation Details 283
Experimental Results 284
Encoding Time, Memory and Compression Ratio 285
Encoding Time and Memory Analysis 287
Conclusions and Future Work 288
References 289
Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes 291
Introduction 291
Cable Characteristics 292
MIMO-OFDM System Model and Quality Criteria 293
Coded MIMO-OFDM System 296
Results 297
Uncoded System 298
Coded System 299
Conclusions 302
Outlook 302
References 302
Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions 304
Introduction 304
Problem Formulation 305
Material 306
Signal Filtering 306
Rough $/~{/it T}$ Estimation 308
$/~{/it T}$ Selection 308
Localization with a Linear Profile 308
The CRLB and the Confidence Regions 309
The CRLB 309
Confidence Regions 310
Results 310
Tracking Comparisons 310
CRLB Computation 310
The Confidence Regions 313
Performance Comparisons 315
Conclusions 315
References 315
Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features 317
Introduction 317
The Perceptual Spectral Cluster Concept 319
Estimation of PSCs 319
PSC Features 320
F0-Normalized PSC Features 322
Automatic Recognition Tests 323
Training and Testing Data Base 324
Results and Discussion 324
Conclusions 326
References 326
High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor 328
Introduction 328
Lifting Scheme 330
Proposed Architecture 331
Architecture of the Processing Element 332
Normalization 332
Context Controller 333
Processor and Its Memory Controller 334
Results and Performances 337
Conclusions 339
References 340
Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches 341
Introduction 341
Face Detection Using Discrete Gabor Jets 343
Feature Extraction I: Discrete Gabor Jets 343
Feature Extraction II: Modified Linear Discriminant Analysis 345
Classification and Postprocessing 346
Face Detection Using Color Information 347
Modeling Skin Color and Other Colors 347
Modeling Colored Image Patches 348
Learning Parameters of Image Patch Model 349
Face Detection Using the Image Patch Model 349
Combining Discrete Gabor Jets and Color Information 350
Results 350
Conclusions 353
References 353
Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images 355
Introduction 355
Invariant Direction 357
Image Pre-processing 357
Invariant Direction ExtractionMethod 358
Embedding and Detection 359
Results 361
Effectiveness of Direction Extraction 361
Imperceptibility 362
Robustness 364
Conclusions 366
References 366
Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware 368
Introduction 368
System Architecture 369
Preprocessing 370
View Interpolation 371
Depth Refinement 372
Recoloring 374
Movement Analysis 375
Concurrent Eye Tracking 375
Networking 376
Optimizations 376
Improved Arithmetic Intensity 377
Acceleration by Elevated Granularity 377
Dynamic GPU Programming 378
Results 378
Conclusions 380
Future Work 381
References 381
A New IMS Based Inter-working Solution 383
Introduction 383
Multimedia Inter-working Service 384
Technical Description 385
Logic Flows 386
Mapping Rules 387
Use Case Discussion 388
Comparison 391
Summary 392
References 393
Quality Evaluation of Reverberation in Audioband Speech Signals 394
Introduction 394
Reverberation Definition 395
Reverberation Modeling 396
Early Reflections via Image Method 396
Schroeder’s Late Reverberator 397
Feedback Delay Networks (FDN) 398
Gardner’s Late Reverberator 399
Gardner’sModified Full Reverberator 399
Subjective Evaluation of Reverberation 400
Test Specification 400
Test Results 401
Objective Evaluation of Reverberation 402
Standard Quality Assessment Methods 402
Articulation Loss of Consonants 403
Conclusions 405
References 405
Part IV WINSYS 407
Conservative Transmit Power Control Mechanism for 802.11 Mesh 408
Introduction 408
Related Work 409
Conservative Transmit Power Control (ConTPC) 410
ConTPC Implementation Details 411
Experimental Setup 412
Results 413
Delivery Ratio vs. SNR 413
Disjoint Case 414
Eleven Nodes Testbed Case 416
Stability of ConTPC 416
Overhead of ConTPC 417
ConTPC Parameters Evaluation 418
Conclusions 419
References 419
Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks 421
Introduction 421
Design Parameters in Energy Constrained WSNs: Description and Related Work 422
Network Architecture for WSNs 422
Nodes Deployment 424
Energy Model 424
Single Hop vs. Multi Hop 425
Multiple Mobile Sinks 426
Overhead Problem 428
Buffering Data 428
Transmission Range Influence 429
Multiple Sinks Placement in Large Scale WSNs: Proposed Approach 429
Existing Graph Partitioning Techniques 430
Model Formulation 430
Problem Resolution 431
Simulation Results and Analysis 431
Conclusion and Future Work 434
References 435
Using Vegetation Barriers to Improving Wireless Network Isolation and Security 437
Introduction 437
Measurements 438
Measurement Setup 439
Measurement Procedure 439
Vegetation Species 441
Analysis of the Results 441
Attenuation Due to the Vegetation Lines 442
Variability with Time 444
Application to Interference Mitigation 444
Application to Protection against External Attacks 445
Conclusions 446
References 447
Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control 448
Introduction 448
WiMedia MAC and PHY Protocol Overview 450
WiMedia MB-OFDM PHY 450
WiMedia MAC 451
Throughput Analysis and Frame Length Optimization 453
AnalyticalModel 453
Throughput 455
Frame Length Optimization Design 456
Numerical Results 457
Conclusions 459
References 460
Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks 462
Introduction 462
Model Description 464
General Considerations 464
PropagationModel 464
Proposed Clustering Strategy 465
Multicast Scheduling 466
EB Scheduler 467
Max-SNR Scheduler 467
WFQ-RR 468
Generic System Context 468
Multicast Scheduling with SC 469
EB with SC 469
Max-SNR with SC 469
WFQ-RR with SC 470
Multicast Scheduling with MRC 470
EB with MRC 471
Max-SNR with MRC 471
WFQ-RR with MRC 472
Evaluation Results 472
Conclusions 474
References 474
The Service Distribution Protocol for MANETs - Criteria and Performance Analysis 476
Introduction 476
Overview on the Service Distribution Protocol for MANETs 478
ReplicationMechanism 478
HibernationMechanism 479
Service Caching 479
Network Model 479
Mobility Model 480
Service Model 480
Calling Model 480
Simulation and Discussions 480
Configurations 481
Performance Analysis 481
Extended Performance Analysis 484
Related Work 486
Conclusions 487
References 487
Author Index 489

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Office Programme Outlook
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Wirtschaft
Schlagworte 802.11 • authentication • Bayesian networks • cellular networks • Communication • cryptography • discrete gabor jets • E-Banking • E-Business • Encryption • Information • Lempel-Ziv • location based • Manet • Multimedia • search engine marketing (SEM) • watermark • Wavelets • Wireless • wireless sensor networks
ISBN-10 3-642-05197-9 / 3642051979
ISBN-13 978-3-642-05197-5 / 9783642051975
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 9,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich