E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2020
|
Schriftenreihe: | Communications in Computer and Information Science Ser.
v.1247 |
Schlagworte: | |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (288 pages) |
ISBN: | 9783030526863 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048222992 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030526863 |9 978-3-030-52686-3 | ||
035 | |a (ZDB-30-PQE)EBC6272306 | ||
035 | |a (ZDB-30-PAD)EBC6272306 | ||
035 | |a (ZDB-89-EBL)EBL6272306 | ||
035 | |a (OCoLC)1175916671 | ||
035 | |a (DE-599)BVBBV048222992 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 381.142 | |
100 | 1 | |a Obaidat, Mohammad S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a E-Business and Telecommunications |b 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (288 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in Computer and Information Science Ser. |v v.1247 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents -- I Data Communication Networking -- Application Error Detection in Networks by Protocol Behavior Model -- 1 Introduction -- 2 Related Work -- 3 Model Representation -- 4 System Architecture -- 4.1 Input Data Processing -- 4.2 Model Training -- 4.3 Diagnostics -- 5 Algorithms -- 5.1 Adding Correct Traces -- 5.2 Model Generalization -- 5.3 Adding Error Traces -- 5.4 Testing Unknown Trace -- 6 Evaluation -- 6.1 Reference Set Preparation and Model Creation -- 6.2 Model Creation -- 6.3 Evaluation of Test Traces -- 6.4 Timed Transitions -- 6.5 Encrypted Data Diagnostics -- 7 Discussion -- 7.1 Fully Trained Model -- 7.2 Data Labeling -- 7.3 Model of Models -- 7.4 Another Usage of Models -- 8 Conclusions -- References -- Cooperative Communications, Distributed Coding and Machine Learning -- 1 Introduction -- 2 Cooperative Communications Models -- 3 Distributed Coding Schemes -- 4 Relay Channel Capacity -- 5 Iterative Learning Based Code Design -- 5.1 Code Design for SN -- 5.2 Code Design for RNs -- 6 Power Allocation and Relay Selection -- 6.1 Power Allocation -- 6.2 Relay Selection -- 7 Application in UAV Network -- 8 Conclusions -- References -- I e-Business -- Product-Service Systems at a Glance -- 1 Introduction of Product-Service Systems (PSS) -- 1.1 Motivation -- 1.2 History of PSS -- 2 Research Design -- 2.1 Set the Scope of Examination -- 2.2 Create the Conceptualization of the Topic -- 2.3 Perform the Literature Search -- 2.4 Conduct the Literature Analysis and Synthesis -- 2.5 Develop the Research Agenda -- 3 PSS Definition -- 4 PSS Classifications and Types -- 4.1 Mont -- 4.2 Tukker -- 4.3 Meier et al. -- 4.4 Neely -- 4.5 Van Ostaeyen et al. -- 4.6 Gassmann et al. -- 5 Conclusion -- 5.1 Consolidation of PSS Classification and Types -- 5.2 Summary of Research -- 6 Outlook of Future Research of PSS. | |
505 | 8 | |a References -- I Security and Cryptography -- A Reconfigurable Implementation of Elliptic Curve Cryptography over GF (2n) -- 1 Introduction -- 1.1 Xilinx FPGA Devices -- 2 Elliptic Curve Cryptography (ECC) -- 2.1 Finite Fields GF (2n) -- 3 High-Speed Core for ECC over GF (2n) -- 3.1 Montgomery Ladder Scalar Point Multiplication Algorithm -- 3.2 Trade-Off Between Area and High-Performance -- 3.3 Proposed High-Speed Area-Efficient ECC Core over GF (2n) -- 3.4 Finite-State Machine for the Proposed ECC Core -- 3.5 Computation Schedule for Montgomery Ladder SPM -- 3.6 Karatsuba-Ofman Field Multiplier -- 4 FPGA Implementation: Results and Comparisons -- 4.1 Power Consumption for the Proposed ECC Core -- 4.2 Software Implementation for the Proposed ECC Core -- 5 Conclusions and Future Work -- References -- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing -- 1 Introduction -- 2 Background on Secure Arithmetic -- 2.1 Secure Computation Based on Shamir Secret Sharing -- 2.2 Data Encoding -- 2.3 Complexity and Performance -- 2.4 Building Blocks -- 2.5 Evaluation of the Floating-Point Arithmetic Protocols -- 3 Secure Addition and Subtraction -- 4 Secure Multiplication -- 5 Secure Division and Square Root -- 6 Secure Comparison -- 7 Conclusions -- References -- Secure and Efficient Matrix Multiplication with MapReduce -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Tools -- 2.2 Strassen-Winograd Algorithm -- 3 Strassen-Winograd Matrix Multiplication with MapReduce -- 3.1 Strassen-Winograd MapReduce Protocol -- 4 Secure Strassen-Winograd Matrix Multiplication with MapReduce -- 4.1 Preprocessing for Secure Strassen-Winograd Matrix Multiplication -- 4.2 Secure Approach -- 4.3 Secure Strassen-Winograd Matrix Multiplication Protocol -- 5 Experimental Results -- 5.1 Dataset and Settings -- 5.2 Results -- 6 Security Proofs | |
505 | 8 | |a 6.1 Security Proof for S2M3 Protocol -- 7 Conclusions and Future Work -- References -- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks -- 1 Introduction -- 2 Related Works -- 2.1 Robust Video Watermarking Techniques Against Collusion -- 2.2 Anaglyph 3D Image Watermarking -- 2.3 Anaglyph 3D Video Watermarking -- 3 Proposed Robust Watermarking Method -- 3.1 Proposed Embedding and Detection Algorithms -- 4 Experimental Results -- 4.1 Invisibility -- 4.2 Robustness -- 5 Comparative Study -- 6 Conclusions -- References -- Copyright Protection Method for Vector Map Data -- 1 Introduction -- 2 Brief Description of Proposed Watermarking Approach -- 3 Watermark Embedding and Extraction -- 4 Watermark Image Construction -- 5 Watermark Sequence Extraction -- 6 Study on Information Capacity -- 6.1 Experiment 1 -- 6.2 Experiment 2 -- 7 Study on Robustness Against Transformations -- 8 Study on Quality of Proposed Method -- 9 Conclusions -- References -- Dynamic Taint Tracking Simulation -- 1 Introduction -- 2 Taint Tracking -- 2.1 Taintdroid -- 2.2 TaintART -- 2.3 Shortcomings -- 3 Simulation Concept for Information Disclosure Detection -- 3.1 Simulation Process -- 3.2 Analysis Data Collection -- 3.3 Security Analysis -- 3.4 Recording Simulations -- 3.5 Replaying Simulations -- 3.6 Comparing Simulations -- 3.7 Connecting Real Mobile Devices -- 3.8 Sanity Checks -- 4 Implementation Aspects -- 5 Discussion and Evaluation -- 6 Conclusion -- References -- I Signal Processing and Multimedia Applications -- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation -- 1 Introduction -- 2 Problem Definition and Related Work -- 3 Note-Event Based Decomposition -- 3.1 Pitch Trajectory of the Predominant Note Event -- 3.2 Separation of Spectral Content -- 3.3 Note Event Extraction | |
505 | 8 | |a 4 Clustering of Note Events -- 5 Performance Evaluation -- 5.1 Database -- 5.2 Methodology -- 5.3 Results and Discussion -- 6 Conclusions -- References -- Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea -- 1 Introduction -- 2 System Overview -- 3 Materials and Methods -- 3.1 Experiment Data -- 3.2 Signal Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Normalization -- 3.5 Classification -- 3.6 Result Correction -- 3.7 PSG Sleep Quality Index -- 4 Performance Assessment -- 4.1 Influence of Signal Types -- 4.2 Feature Evaluation -- 4.3 Performance on Transfer Learning -- 5 Discussion -- 6 Conclusions -- References -- Author Index | |
650 | 4 | |a Telecommunication systems.. | |
650 | 4 | |a Electronic commerce.. | |
650 | 4 | |a Computer networks | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Obaidat, Mohammad S. |t E-Business and Telecommunications |d Cham : Springer International Publishing AG,c2020 |z 9783030526856 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033603724 |
Datensatz im Suchindex
_version_ | 1804184004689133568 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Obaidat, Mohammad S. |
author_facet | Obaidat, Mohammad S. |
author_role | aut |
author_sort | Obaidat, Mohammad S. |
author_variant | m s o ms mso |
building | Verbundindex |
bvnumber | BV048222992 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents -- I Data Communication Networking -- Application Error Detection in Networks by Protocol Behavior Model -- 1 Introduction -- 2 Related Work -- 3 Model Representation -- 4 System Architecture -- 4.1 Input Data Processing -- 4.2 Model Training -- 4.3 Diagnostics -- 5 Algorithms -- 5.1 Adding Correct Traces -- 5.2 Model Generalization -- 5.3 Adding Error Traces -- 5.4 Testing Unknown Trace -- 6 Evaluation -- 6.1 Reference Set Preparation and Model Creation -- 6.2 Model Creation -- 6.3 Evaluation of Test Traces -- 6.4 Timed Transitions -- 6.5 Encrypted Data Diagnostics -- 7 Discussion -- 7.1 Fully Trained Model -- 7.2 Data Labeling -- 7.3 Model of Models -- 7.4 Another Usage of Models -- 8 Conclusions -- References -- Cooperative Communications, Distributed Coding and Machine Learning -- 1 Introduction -- 2 Cooperative Communications Models -- 3 Distributed Coding Schemes -- 4 Relay Channel Capacity -- 5 Iterative Learning Based Code Design -- 5.1 Code Design for SN -- 5.2 Code Design for RNs -- 6 Power Allocation and Relay Selection -- 6.1 Power Allocation -- 6.2 Relay Selection -- 7 Application in UAV Network -- 8 Conclusions -- References -- I e-Business -- Product-Service Systems at a Glance -- 1 Introduction of Product-Service Systems (PSS) -- 1.1 Motivation -- 1.2 History of PSS -- 2 Research Design -- 2.1 Set the Scope of Examination -- 2.2 Create the Conceptualization of the Topic -- 2.3 Perform the Literature Search -- 2.4 Conduct the Literature Analysis and Synthesis -- 2.5 Develop the Research Agenda -- 3 PSS Definition -- 4 PSS Classifications and Types -- 4.1 Mont -- 4.2 Tukker -- 4.3 Meier et al. -- 4.4 Neely -- 4.5 Van Ostaeyen et al. -- 4.6 Gassmann et al. -- 5 Conclusion -- 5.1 Consolidation of PSS Classification and Types -- 5.2 Summary of Research -- 6 Outlook of Future Research of PSS. References -- I Security and Cryptography -- A Reconfigurable Implementation of Elliptic Curve Cryptography over GF (2n) -- 1 Introduction -- 1.1 Xilinx FPGA Devices -- 2 Elliptic Curve Cryptography (ECC) -- 2.1 Finite Fields GF (2n) -- 3 High-Speed Core for ECC over GF (2n) -- 3.1 Montgomery Ladder Scalar Point Multiplication Algorithm -- 3.2 Trade-Off Between Area and High-Performance -- 3.3 Proposed High-Speed Area-Efficient ECC Core over GF (2n) -- 3.4 Finite-State Machine for the Proposed ECC Core -- 3.5 Computation Schedule for Montgomery Ladder SPM -- 3.6 Karatsuba-Ofman Field Multiplier -- 4 FPGA Implementation: Results and Comparisons -- 4.1 Power Consumption for the Proposed ECC Core -- 4.2 Software Implementation for the Proposed ECC Core -- 5 Conclusions and Future Work -- References -- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing -- 1 Introduction -- 2 Background on Secure Arithmetic -- 2.1 Secure Computation Based on Shamir Secret Sharing -- 2.2 Data Encoding -- 2.3 Complexity and Performance -- 2.4 Building Blocks -- 2.5 Evaluation of the Floating-Point Arithmetic Protocols -- 3 Secure Addition and Subtraction -- 4 Secure Multiplication -- 5 Secure Division and Square Root -- 6 Secure Comparison -- 7 Conclusions -- References -- Secure and Efficient Matrix Multiplication with MapReduce -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Tools -- 2.2 Strassen-Winograd Algorithm -- 3 Strassen-Winograd Matrix Multiplication with MapReduce -- 3.1 Strassen-Winograd MapReduce Protocol -- 4 Secure Strassen-Winograd Matrix Multiplication with MapReduce -- 4.1 Preprocessing for Secure Strassen-Winograd Matrix Multiplication -- 4.2 Secure Approach -- 4.3 Secure Strassen-Winograd Matrix Multiplication Protocol -- 5 Experimental Results -- 5.1 Dataset and Settings -- 5.2 Results -- 6 Security Proofs 6.1 Security Proof for S2M3 Protocol -- 7 Conclusions and Future Work -- References -- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks -- 1 Introduction -- 2 Related Works -- 2.1 Robust Video Watermarking Techniques Against Collusion -- 2.2 Anaglyph 3D Image Watermarking -- 2.3 Anaglyph 3D Video Watermarking -- 3 Proposed Robust Watermarking Method -- 3.1 Proposed Embedding and Detection Algorithms -- 4 Experimental Results -- 4.1 Invisibility -- 4.2 Robustness -- 5 Comparative Study -- 6 Conclusions -- References -- Copyright Protection Method for Vector Map Data -- 1 Introduction -- 2 Brief Description of Proposed Watermarking Approach -- 3 Watermark Embedding and Extraction -- 4 Watermark Image Construction -- 5 Watermark Sequence Extraction -- 6 Study on Information Capacity -- 6.1 Experiment 1 -- 6.2 Experiment 2 -- 7 Study on Robustness Against Transformations -- 8 Study on Quality of Proposed Method -- 9 Conclusions -- References -- Dynamic Taint Tracking Simulation -- 1 Introduction -- 2 Taint Tracking -- 2.1 Taintdroid -- 2.2 TaintART -- 2.3 Shortcomings -- 3 Simulation Concept for Information Disclosure Detection -- 3.1 Simulation Process -- 3.2 Analysis Data Collection -- 3.3 Security Analysis -- 3.4 Recording Simulations -- 3.5 Replaying Simulations -- 3.6 Comparing Simulations -- 3.7 Connecting Real Mobile Devices -- 3.8 Sanity Checks -- 4 Implementation Aspects -- 5 Discussion and Evaluation -- 6 Conclusion -- References -- I Signal Processing and Multimedia Applications -- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation -- 1 Introduction -- 2 Problem Definition and Related Work -- 3 Note-Event Based Decomposition -- 3.1 Pitch Trajectory of the Predominant Note Event -- 3.2 Separation of Spectral Content -- 3.3 Note Event Extraction 4 Clustering of Note Events -- 5 Performance Evaluation -- 5.1 Database -- 5.2 Methodology -- 5.3 Results and Discussion -- 6 Conclusions -- References -- Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea -- 1 Introduction -- 2 System Overview -- 3 Materials and Methods -- 3.1 Experiment Data -- 3.2 Signal Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Normalization -- 3.5 Classification -- 3.6 Result Correction -- 3.7 PSG Sleep Quality Index -- 4 Performance Assessment -- 4.1 Influence of Signal Types -- 4.2 Feature Evaluation -- 4.3 Performance on Transfer Learning -- 5 Discussion -- 6 Conclusions -- References -- Author Index |
ctrlnum | (ZDB-30-PQE)EBC6272306 (ZDB-30-PAD)EBC6272306 (ZDB-89-EBL)EBL6272306 (OCoLC)1175916671 (DE-599)BVBBV048222992 |
dewey-full | 381.142 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 381 - Commerce (Trade) |
dewey-raw | 381.142 |
dewey-search | 381.142 |
dewey-sort | 3381.142 |
dewey-tens | 380 - Commerce, communications, transportation |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07844nmm a2200433zcb4500</leader><controlfield tag="001">BV048222992</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030526863</subfield><subfield code="9">978-3-030-52686-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6272306</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6272306</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6272306</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1175916671</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048222992</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">381.142</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Obaidat, Mohammad S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-Business and Telecommunications</subfield><subfield code="b">16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (288 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in Computer and Information Science Ser.</subfield><subfield code="v">v.1247</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- I Data Communication Networking -- Application Error Detection in Networks by Protocol Behavior Model -- 1 Introduction -- 2 Related Work -- 3 Model Representation -- 4 System Architecture -- 4.1 Input Data Processing -- 4.2 Model Training -- 4.3 Diagnostics -- 5 Algorithms -- 5.1 Adding Correct Traces -- 5.2 Model Generalization -- 5.3 Adding Error Traces -- 5.4 Testing Unknown Trace -- 6 Evaluation -- 6.1 Reference Set Preparation and Model Creation -- 6.2 Model Creation -- 6.3 Evaluation of Test Traces -- 6.4 Timed Transitions -- 6.5 Encrypted Data Diagnostics -- 7 Discussion -- 7.1 Fully Trained Model -- 7.2 Data Labeling -- 7.3 Model of Models -- 7.4 Another Usage of Models -- 8 Conclusions -- References -- Cooperative Communications, Distributed Coding and Machine Learning -- 1 Introduction -- 2 Cooperative Communications Models -- 3 Distributed Coding Schemes -- 4 Relay Channel Capacity -- 5 Iterative Learning Based Code Design -- 5.1 Code Design for SN -- 5.2 Code Design for RNs -- 6 Power Allocation and Relay Selection -- 6.1 Power Allocation -- 6.2 Relay Selection -- 7 Application in UAV Network -- 8 Conclusions -- References -- I e-Business -- Product-Service Systems at a Glance -- 1 Introduction of Product-Service Systems (PSS) -- 1.1 Motivation -- 1.2 History of PSS -- 2 Research Design -- 2.1 Set the Scope of Examination -- 2.2 Create the Conceptualization of the Topic -- 2.3 Perform the Literature Search -- 2.4 Conduct the Literature Analysis and Synthesis -- 2.5 Develop the Research Agenda -- 3 PSS Definition -- 4 PSS Classifications and Types -- 4.1 Mont -- 4.2 Tukker -- 4.3 Meier et al. -- 4.4 Neely -- 4.5 Van Ostaeyen et al. -- 4.6 Gassmann et al. -- 5 Conclusion -- 5.1 Consolidation of PSS Classification and Types -- 5.2 Summary of Research -- 6 Outlook of Future Research of PSS.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">References -- I Security and Cryptography -- A Reconfigurable Implementation of Elliptic Curve Cryptography over GF (2n) -- 1 Introduction -- 1.1 Xilinx FPGA Devices -- 2 Elliptic Curve Cryptography (ECC) -- 2.1 Finite Fields GF (2n) -- 3 High-Speed Core for ECC over GF (2n) -- 3.1 Montgomery Ladder Scalar Point Multiplication Algorithm -- 3.2 Trade-Off Between Area and High-Performance -- 3.3 Proposed High-Speed Area-Efficient ECC Core over GF (2n) -- 3.4 Finite-State Machine for the Proposed ECC Core -- 3.5 Computation Schedule for Montgomery Ladder SPM -- 3.6 Karatsuba-Ofman Field Multiplier -- 4 FPGA Implementation: Results and Comparisons -- 4.1 Power Consumption for the Proposed ECC Core -- 4.2 Software Implementation for the Proposed ECC Core -- 5 Conclusions and Future Work -- References -- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing -- 1 Introduction -- 2 Background on Secure Arithmetic -- 2.1 Secure Computation Based on Shamir Secret Sharing -- 2.2 Data Encoding -- 2.3 Complexity and Performance -- 2.4 Building Blocks -- 2.5 Evaluation of the Floating-Point Arithmetic Protocols -- 3 Secure Addition and Subtraction -- 4 Secure Multiplication -- 5 Secure Division and Square Root -- 6 Secure Comparison -- 7 Conclusions -- References -- Secure and Efficient Matrix Multiplication with MapReduce -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Tools -- 2.2 Strassen-Winograd Algorithm -- 3 Strassen-Winograd Matrix Multiplication with MapReduce -- 3.1 Strassen-Winograd MapReduce Protocol -- 4 Secure Strassen-Winograd Matrix Multiplication with MapReduce -- 4.1 Preprocessing for Secure Strassen-Winograd Matrix Multiplication -- 4.2 Secure Approach -- 4.3 Secure Strassen-Winograd Matrix Multiplication Protocol -- 5 Experimental Results -- 5.1 Dataset and Settings -- 5.2 Results -- 6 Security Proofs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.1 Security Proof for S2M3 Protocol -- 7 Conclusions and Future Work -- References -- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks -- 1 Introduction -- 2 Related Works -- 2.1 Robust Video Watermarking Techniques Against Collusion -- 2.2 Anaglyph 3D Image Watermarking -- 2.3 Anaglyph 3D Video Watermarking -- 3 Proposed Robust Watermarking Method -- 3.1 Proposed Embedding and Detection Algorithms -- 4 Experimental Results -- 4.1 Invisibility -- 4.2 Robustness -- 5 Comparative Study -- 6 Conclusions -- References -- Copyright Protection Method for Vector Map Data -- 1 Introduction -- 2 Brief Description of Proposed Watermarking Approach -- 3 Watermark Embedding and Extraction -- 4 Watermark Image Construction -- 5 Watermark Sequence Extraction -- 6 Study on Information Capacity -- 6.1 Experiment 1 -- 6.2 Experiment 2 -- 7 Study on Robustness Against Transformations -- 8 Study on Quality of Proposed Method -- 9 Conclusions -- References -- Dynamic Taint Tracking Simulation -- 1 Introduction -- 2 Taint Tracking -- 2.1 Taintdroid -- 2.2 TaintART -- 2.3 Shortcomings -- 3 Simulation Concept for Information Disclosure Detection -- 3.1 Simulation Process -- 3.2 Analysis Data Collection -- 3.3 Security Analysis -- 3.4 Recording Simulations -- 3.5 Replaying Simulations -- 3.6 Comparing Simulations -- 3.7 Connecting Real Mobile Devices -- 3.8 Sanity Checks -- 4 Implementation Aspects -- 5 Discussion and Evaluation -- 6 Conclusion -- References -- I Signal Processing and Multimedia Applications -- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation -- 1 Introduction -- 2 Problem Definition and Related Work -- 3 Note-Event Based Decomposition -- 3.1 Pitch Trajectory of the Predominant Note Event -- 3.2 Separation of Spectral Content -- 3.3 Note Event Extraction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Clustering of Note Events -- 5 Performance Evaluation -- 5.1 Database -- 5.2 Methodology -- 5.3 Results and Discussion -- 6 Conclusions -- References -- Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea -- 1 Introduction -- 2 System Overview -- 3 Materials and Methods -- 3.1 Experiment Data -- 3.2 Signal Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Normalization -- 3.5 Classification -- 3.6 Result Correction -- 3.7 PSG Sleep Quality Index -- 4 Performance Assessment -- 4.1 Influence of Signal Types -- 4.2 Feature Evaluation -- 4.3 Performance on Transfer Learning -- 5 Discussion -- 6 Conclusions -- References -- Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Obaidat, Mohammad S.</subfield><subfield code="t">E-Business and Telecommunications</subfield><subfield code="d">Cham : Springer International Publishing AG,c2020</subfield><subfield code="z">9783030526856</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033603724</subfield></datafield></record></collection> |
id | DE-604.BV048222992 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:37Z |
indexdate | 2024-07-10T09:32:27Z |
institution | BVB |
isbn | 9783030526863 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033603724 |
oclc_num | 1175916671 |
open_access_boolean | |
physical | 1 Online-Ressource (288 pages) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Communications in Computer and Information Science Ser. |
spelling | Obaidat, Mohammad S. Verfasser aut E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers Cham Springer International Publishing AG 2020 ©2020 1 Online-Ressource (288 pages) txt rdacontent c rdamedia cr rdacarrier Communications in Computer and Information Science Ser. v.1247 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents -- I Data Communication Networking -- Application Error Detection in Networks by Protocol Behavior Model -- 1 Introduction -- 2 Related Work -- 3 Model Representation -- 4 System Architecture -- 4.1 Input Data Processing -- 4.2 Model Training -- 4.3 Diagnostics -- 5 Algorithms -- 5.1 Adding Correct Traces -- 5.2 Model Generalization -- 5.3 Adding Error Traces -- 5.4 Testing Unknown Trace -- 6 Evaluation -- 6.1 Reference Set Preparation and Model Creation -- 6.2 Model Creation -- 6.3 Evaluation of Test Traces -- 6.4 Timed Transitions -- 6.5 Encrypted Data Diagnostics -- 7 Discussion -- 7.1 Fully Trained Model -- 7.2 Data Labeling -- 7.3 Model of Models -- 7.4 Another Usage of Models -- 8 Conclusions -- References -- Cooperative Communications, Distributed Coding and Machine Learning -- 1 Introduction -- 2 Cooperative Communications Models -- 3 Distributed Coding Schemes -- 4 Relay Channel Capacity -- 5 Iterative Learning Based Code Design -- 5.1 Code Design for SN -- 5.2 Code Design for RNs -- 6 Power Allocation and Relay Selection -- 6.1 Power Allocation -- 6.2 Relay Selection -- 7 Application in UAV Network -- 8 Conclusions -- References -- I e-Business -- Product-Service Systems at a Glance -- 1 Introduction of Product-Service Systems (PSS) -- 1.1 Motivation -- 1.2 History of PSS -- 2 Research Design -- 2.1 Set the Scope of Examination -- 2.2 Create the Conceptualization of the Topic -- 2.3 Perform the Literature Search -- 2.4 Conduct the Literature Analysis and Synthesis -- 2.5 Develop the Research Agenda -- 3 PSS Definition -- 4 PSS Classifications and Types -- 4.1 Mont -- 4.2 Tukker -- 4.3 Meier et al. -- 4.4 Neely -- 4.5 Van Ostaeyen et al. -- 4.6 Gassmann et al. -- 5 Conclusion -- 5.1 Consolidation of PSS Classification and Types -- 5.2 Summary of Research -- 6 Outlook of Future Research of PSS. References -- I Security and Cryptography -- A Reconfigurable Implementation of Elliptic Curve Cryptography over GF (2n) -- 1 Introduction -- 1.1 Xilinx FPGA Devices -- 2 Elliptic Curve Cryptography (ECC) -- 2.1 Finite Fields GF (2n) -- 3 High-Speed Core for ECC over GF (2n) -- 3.1 Montgomery Ladder Scalar Point Multiplication Algorithm -- 3.2 Trade-Off Between Area and High-Performance -- 3.3 Proposed High-Speed Area-Efficient ECC Core over GF (2n) -- 3.4 Finite-State Machine for the Proposed ECC Core -- 3.5 Computation Schedule for Montgomery Ladder SPM -- 3.6 Karatsuba-Ofman Field Multiplier -- 4 FPGA Implementation: Results and Comparisons -- 4.1 Power Consumption for the Proposed ECC Core -- 4.2 Software Implementation for the Proposed ECC Core -- 5 Conclusions and Future Work -- References -- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing -- 1 Introduction -- 2 Background on Secure Arithmetic -- 2.1 Secure Computation Based on Shamir Secret Sharing -- 2.2 Data Encoding -- 2.3 Complexity and Performance -- 2.4 Building Blocks -- 2.5 Evaluation of the Floating-Point Arithmetic Protocols -- 3 Secure Addition and Subtraction -- 4 Secure Multiplication -- 5 Secure Division and Square Root -- 6 Secure Comparison -- 7 Conclusions -- References -- Secure and Efficient Matrix Multiplication with MapReduce -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Tools -- 2.2 Strassen-Winograd Algorithm -- 3 Strassen-Winograd Matrix Multiplication with MapReduce -- 3.1 Strassen-Winograd MapReduce Protocol -- 4 Secure Strassen-Winograd Matrix Multiplication with MapReduce -- 4.1 Preprocessing for Secure Strassen-Winograd Matrix Multiplication -- 4.2 Secure Approach -- 4.3 Secure Strassen-Winograd Matrix Multiplication Protocol -- 5 Experimental Results -- 5.1 Dataset and Settings -- 5.2 Results -- 6 Security Proofs 6.1 Security Proof for S2M3 Protocol -- 7 Conclusions and Future Work -- References -- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks -- 1 Introduction -- 2 Related Works -- 2.1 Robust Video Watermarking Techniques Against Collusion -- 2.2 Anaglyph 3D Image Watermarking -- 2.3 Anaglyph 3D Video Watermarking -- 3 Proposed Robust Watermarking Method -- 3.1 Proposed Embedding and Detection Algorithms -- 4 Experimental Results -- 4.1 Invisibility -- 4.2 Robustness -- 5 Comparative Study -- 6 Conclusions -- References -- Copyright Protection Method for Vector Map Data -- 1 Introduction -- 2 Brief Description of Proposed Watermarking Approach -- 3 Watermark Embedding and Extraction -- 4 Watermark Image Construction -- 5 Watermark Sequence Extraction -- 6 Study on Information Capacity -- 6.1 Experiment 1 -- 6.2 Experiment 2 -- 7 Study on Robustness Against Transformations -- 8 Study on Quality of Proposed Method -- 9 Conclusions -- References -- Dynamic Taint Tracking Simulation -- 1 Introduction -- 2 Taint Tracking -- 2.1 Taintdroid -- 2.2 TaintART -- 2.3 Shortcomings -- 3 Simulation Concept for Information Disclosure Detection -- 3.1 Simulation Process -- 3.2 Analysis Data Collection -- 3.3 Security Analysis -- 3.4 Recording Simulations -- 3.5 Replaying Simulations -- 3.6 Comparing Simulations -- 3.7 Connecting Real Mobile Devices -- 3.8 Sanity Checks -- 4 Implementation Aspects -- 5 Discussion and Evaluation -- 6 Conclusion -- References -- I Signal Processing and Multimedia Applications -- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation -- 1 Introduction -- 2 Problem Definition and Related Work -- 3 Note-Event Based Decomposition -- 3.1 Pitch Trajectory of the Predominant Note Event -- 3.2 Separation of Spectral Content -- 3.3 Note Event Extraction 4 Clustering of Note Events -- 5 Performance Evaluation -- 5.1 Database -- 5.2 Methodology -- 5.3 Results and Discussion -- 6 Conclusions -- References -- Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea -- 1 Introduction -- 2 System Overview -- 3 Materials and Methods -- 3.1 Experiment Data -- 3.2 Signal Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Normalization -- 3.5 Classification -- 3.6 Result Correction -- 3.7 PSG Sleep Quality Index -- 4 Performance Assessment -- 4.1 Influence of Signal Types -- 4.2 Feature Evaluation -- 4.3 Performance on Transfer Learning -- 5 Discussion -- 6 Conclusions -- References -- Author Index Telecommunication systems.. Electronic commerce.. Computer networks Erscheint auch als Druck-Ausgabe Obaidat, Mohammad S. E-Business and Telecommunications Cham : Springer International Publishing AG,c2020 9783030526856 |
spellingShingle | Obaidat, Mohammad S. E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers Intro -- Preface -- Organization -- Contents -- I Data Communication Networking -- Application Error Detection in Networks by Protocol Behavior Model -- 1 Introduction -- 2 Related Work -- 3 Model Representation -- 4 System Architecture -- 4.1 Input Data Processing -- 4.2 Model Training -- 4.3 Diagnostics -- 5 Algorithms -- 5.1 Adding Correct Traces -- 5.2 Model Generalization -- 5.3 Adding Error Traces -- 5.4 Testing Unknown Trace -- 6 Evaluation -- 6.1 Reference Set Preparation and Model Creation -- 6.2 Model Creation -- 6.3 Evaluation of Test Traces -- 6.4 Timed Transitions -- 6.5 Encrypted Data Diagnostics -- 7 Discussion -- 7.1 Fully Trained Model -- 7.2 Data Labeling -- 7.3 Model of Models -- 7.4 Another Usage of Models -- 8 Conclusions -- References -- Cooperative Communications, Distributed Coding and Machine Learning -- 1 Introduction -- 2 Cooperative Communications Models -- 3 Distributed Coding Schemes -- 4 Relay Channel Capacity -- 5 Iterative Learning Based Code Design -- 5.1 Code Design for SN -- 5.2 Code Design for RNs -- 6 Power Allocation and Relay Selection -- 6.1 Power Allocation -- 6.2 Relay Selection -- 7 Application in UAV Network -- 8 Conclusions -- References -- I e-Business -- Product-Service Systems at a Glance -- 1 Introduction of Product-Service Systems (PSS) -- 1.1 Motivation -- 1.2 History of PSS -- 2 Research Design -- 2.1 Set the Scope of Examination -- 2.2 Create the Conceptualization of the Topic -- 2.3 Perform the Literature Search -- 2.4 Conduct the Literature Analysis and Synthesis -- 2.5 Develop the Research Agenda -- 3 PSS Definition -- 4 PSS Classifications and Types -- 4.1 Mont -- 4.2 Tukker -- 4.3 Meier et al. -- 4.4 Neely -- 4.5 Van Ostaeyen et al. -- 4.6 Gassmann et al. -- 5 Conclusion -- 5.1 Consolidation of PSS Classification and Types -- 5.2 Summary of Research -- 6 Outlook of Future Research of PSS. References -- I Security and Cryptography -- A Reconfigurable Implementation of Elliptic Curve Cryptography over GF (2n) -- 1 Introduction -- 1.1 Xilinx FPGA Devices -- 2 Elliptic Curve Cryptography (ECC) -- 2.1 Finite Fields GF (2n) -- 3 High-Speed Core for ECC over GF (2n) -- 3.1 Montgomery Ladder Scalar Point Multiplication Algorithm -- 3.2 Trade-Off Between Area and High-Performance -- 3.3 Proposed High-Speed Area-Efficient ECC Core over GF (2n) -- 3.4 Finite-State Machine for the Proposed ECC Core -- 3.5 Computation Schedule for Montgomery Ladder SPM -- 3.6 Karatsuba-Ofman Field Multiplier -- 4 FPGA Implementation: Results and Comparisons -- 4.1 Power Consumption for the Proposed ECC Core -- 4.2 Software Implementation for the Proposed ECC Core -- 5 Conclusions and Future Work -- References -- Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing -- 1 Introduction -- 2 Background on Secure Arithmetic -- 2.1 Secure Computation Based on Shamir Secret Sharing -- 2.2 Data Encoding -- 2.3 Complexity and Performance -- 2.4 Building Blocks -- 2.5 Evaluation of the Floating-Point Arithmetic Protocols -- 3 Secure Addition and Subtraction -- 4 Secure Multiplication -- 5 Secure Division and Square Root -- 6 Secure Comparison -- 7 Conclusions -- References -- Secure and Efficient Matrix Multiplication with MapReduce -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Tools -- 2.2 Strassen-Winograd Algorithm -- 3 Strassen-Winograd Matrix Multiplication with MapReduce -- 3.1 Strassen-Winograd MapReduce Protocol -- 4 Secure Strassen-Winograd Matrix Multiplication with MapReduce -- 4.1 Preprocessing for Secure Strassen-Winograd Matrix Multiplication -- 4.2 Secure Approach -- 4.3 Secure Strassen-Winograd Matrix Multiplication Protocol -- 5 Experimental Results -- 5.1 Dataset and Settings -- 5.2 Results -- 6 Security Proofs 6.1 Security Proof for S2M3 Protocol -- 7 Conclusions and Future Work -- References -- An Invisible Hybrid 3D Video Watermarking Robust Against Malicious Attacks -- 1 Introduction -- 2 Related Works -- 2.1 Robust Video Watermarking Techniques Against Collusion -- 2.2 Anaglyph 3D Image Watermarking -- 2.3 Anaglyph 3D Video Watermarking -- 3 Proposed Robust Watermarking Method -- 3.1 Proposed Embedding and Detection Algorithms -- 4 Experimental Results -- 4.1 Invisibility -- 4.2 Robustness -- 5 Comparative Study -- 6 Conclusions -- References -- Copyright Protection Method for Vector Map Data -- 1 Introduction -- 2 Brief Description of Proposed Watermarking Approach -- 3 Watermark Embedding and Extraction -- 4 Watermark Image Construction -- 5 Watermark Sequence Extraction -- 6 Study on Information Capacity -- 6.1 Experiment 1 -- 6.2 Experiment 2 -- 7 Study on Robustness Against Transformations -- 8 Study on Quality of Proposed Method -- 9 Conclusions -- References -- Dynamic Taint Tracking Simulation -- 1 Introduction -- 2 Taint Tracking -- 2.1 Taintdroid -- 2.2 TaintART -- 2.3 Shortcomings -- 3 Simulation Concept for Information Disclosure Detection -- 3.1 Simulation Process -- 3.2 Analysis Data Collection -- 3.3 Security Analysis -- 3.4 Recording Simulations -- 3.5 Replaying Simulations -- 3.6 Comparing Simulations -- 3.7 Connecting Real Mobile Devices -- 3.8 Sanity Checks -- 4 Implementation Aspects -- 5 Discussion and Evaluation -- 6 Conclusion -- References -- I Signal Processing and Multimedia Applications -- A Note Event-Based Decomposition of Polyphonic Recordings Applied to Single-channel Audio Source Separation -- 1 Introduction -- 2 Problem Definition and Related Work -- 3 Note-Event Based Decomposition -- 3.1 Pitch Trajectory of the Predominant Note Event -- 3.2 Separation of Spectral Content -- 3.3 Note Event Extraction 4 Clustering of Note Events -- 5 Performance Evaluation -- 5.1 Database -- 5.2 Methodology -- 5.3 Results and Discussion -- 6 Conclusions -- References -- Automatic Sleep Scoring Toolbox and Its Application in Sleep Apnea -- 1 Introduction -- 2 System Overview -- 3 Materials and Methods -- 3.1 Experiment Data -- 3.2 Signal Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Normalization -- 3.5 Classification -- 3.6 Result Correction -- 3.7 PSG Sleep Quality Index -- 4 Performance Assessment -- 4.1 Influence of Signal Types -- 4.2 Feature Evaluation -- 4.3 Performance on Transfer Learning -- 5 Discussion -- 6 Conclusions -- References -- Author Index Telecommunication systems.. Electronic commerce.. Computer networks |
title | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_auth | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_exact_search | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_exact_search_txtP | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_full | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_fullStr | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_full_unstemmed | E-Business and Telecommunications 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
title_short | E-Business and Telecommunications |
title_sort | e business and telecommunications 16th international conference icete 2019 prague czech republic july 26 28 2019 revised selected papers |
title_sub | 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers |
topic | Telecommunication systems.. Electronic commerce.. Computer networks |
topic_facet | Telecommunication systems.. Electronic commerce.. Computer networks |
work_keys_str_mv | AT obaidatmohammads ebusinessandtelecommunications16thinternationalconferenceicete2019pragueczechrepublicjuly26282019revisedselectedpapers |