𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Communications in Computer and Information Science] E-Business and Telecommunication Networks Volume 9 || A New Approach for the Trust Calculation in Social Networks

✍ Scribed by Filipe, Joaquim; Obaidat, Mohammad S.


Book ID
121494132
Publisher
Springer Berlin Heidelberg
Year
2008
Tongue
German
Weight
341 KB
Category
Article
ISBN
3540707603

No coin nor oath required. For personal study only.

✦ Synopsis


This Book Contains The Best Papers Of The Third International Conference On E-business And Telecommunications (icete), Which Was Held In 2006 In Portugal. This Conference Reflects A Continuing Effort To Increase The Dissemination Of Recent Research Results Among Professionals Who Work In The E-business Field. Icete Is A Joint International Conference Integrating Four Major Areas Of Knowledge That Are Divided Into Four Cor- Sponding Conferences: Ice-b (int’l Conf. On E-business), Secrypt (int’l Conf. On Security And Cryptography), Winsys (int’l Conf. On Wireless Information Systems) And Sigmap (int’l Conf. On Signal Processing And Multimedia). The Program Of This Joint Conference Included Seven Outstanding Keynote Lectures Presented By Internationally Renowned Distinguished Researchers Who Are Experts In The Various Icete Areas. Their Keynote Speeches Contributed To Heightening The Ov- All Quality Of The Program And Significance Of The Theme Of The Conference. The Conference Topic Areas Define A Broad Spectrum In The Key Areas Of E-business And Telecommunications. This Wide View Has Made It Appealing To A Global Audience Of Engineers, Scientists, Business Practitioners And Policy Experts. The Papers - Cepted And Presented At The Conference Demonstrated A Number Of New And Innovative Solutions For E-business And Telecommunication Networks, Showing That The Technical Problems In Both Fields Are Challenging, Related And Significant.


πŸ“œ SIMILAR VOLUMES


[Communications in Computer and Informat
✍ Wyld, David C.; Wozniak, Michal; Chaki, Nabendu; Meghanathan, Natarajan; Nagamal πŸ“‚ Article πŸ“… 2011 πŸ› Springer Berlin Heidelberg 🌐 English βš– 457 KB

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical asp

[Communications in Computer and Informat
✍ Das, Vinu V; Thankachan, Nessy πŸ“‚ Article πŸ“… 2011 πŸ› Springer Berlin Heidelberg 🌐 English βš– 166 KB

This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011. The 58 revised full papers, 67 revised short papers, and 32 poster papers presented were carefully reviewed and sele

[Lecture Notes of the Institute for Comp
✍ Meghanathan, Natarajan; Chaki, Nabendu; Nagamalai, Dhinaharan πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 316 KB

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andse