2010 International Conference on e-Business (ICE-B)

26-28 July 2010

Filter Results

Displaying Results 1 - 25 of 76
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (818 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): i
    IEEE is not the copyright holder of this material | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Brief contents

    Publication Year: 2010, Page(s): iii
    IEEE is not the copyright holder of this material | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB) | HTML iconHTML

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing and Steering Committees

    Publication Year: 2010, Page(s): v
    IEEE is not the copyright holder of this material | PDF file iconPDF (22 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program committee

    Publication Year: 2010, Page(s): vi
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (30 KB) | HTML iconHTML

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program committee (cont.)

    Publication Year: 2010, Page(s): vii
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (23 KB)

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selected papers book

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (19 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xi
    IEEE is not the copyright holder of this material | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xii
    IEEE is not the copyright holder of this material | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xiii
    IEEE is not the copyright holder of this material | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xiv
    IEEE is not the copyright holder of this material | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speakers

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • Nanonetworks: A new frontier in communications

    Publication Year: 2010, Page(s): IS-5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, are expected to expand the capabilities of single nano-machines by allowing them to cooperate and share information. Traditional communication technologies are not directly suitable for nanonetworks mainly due to the size ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From nature to methods and back to nature

    Publication Year: 2010, Page(s): IS-7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (32 KB) | HTML iconHTML

    [Summary form only given]. A fundamental challenge in today's arena of complex systems is the design and development of accurate and robust signal processing methods. These methods should be capable to adapt quickly to unexpected changes in the data and operate under minimal model assumptions. Systems in Nature also do signal processing and often do it optimally. Therefore, it makes much sense to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic quantum cryptography: The ultimate for network security

    Publication Year: 2010, Page(s): IS-9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (36 KB) | HTML iconHTML

    As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an effort to create the “holy grail” of cryptographic systems and network security. Quantum theory defines the non-classical qubit, which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information security: The SCAN — Secure processor with crypto-biometrics capabilities

    Publication Year: 2010, Page(s): IS-11
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-business applications

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full papers

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • Mobile marketing communications to the youth: An analysis of the MXit platform

    Publication Year: 2010, Page(s):1 - 9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    This paper explores the various ways in which mobile marketing communications are available to the youth on a very popular South African mobile social network site known as MXit. The popularity of cellular phones has resulted in mobile-based brand advertising and promotions that specifically target the youth. The mobile medium is used by marketers as an additional channel to current marketing comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preferences of handwriting recognition on mobile information systems in medicine: Improving handwriting algorithm on the basis of real-life usability research

    Publication Year: 2010, Page(s):1 - 8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Streamlining data acquisition in mobile health care in order to increase accuracy and efficiency can only benefit the patient. The company FERK-Systems has been providing health care information systems for various German medical services for many years. The design and development of a compatible front-end system for handwriting recognition, particularly for use in ambulances was clearly needed. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.