LEADER 04564nam 2200589Ia 450 001 9910820118603321 005 20230725061519.0 010 $a1-61728-319-3 035 $a(CKB)2550000001041154 035 $a(EBL)3018108 035 $a(SSID)ssj0001101152 035 $a(PQKBManifestationID)11600758 035 $a(PQKBTitleCode)TC0001101152 035 $a(PQKBWorkID)11068526 035 $a(PQKB)10758141 035 $a(MiAaPQ)EBC3018108 035 $a(Au-PeEL)EBL3018108 035 $a(CaPaEBR)ebr10659030 035 $a(OCoLC)923655122 035 $a(EXLCZ)992550000001041154 100 $a20130317d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInternet policies and issues$b[electronic resource] $hVolume 7 /$fB.G. Kutais, editor 210 $aNew York $cNova Science Publishers$dc2011 215 $a1 online resource (375 p.) 225 1 $aInternet Policies and Issues ;$vv.7 300 $aDescription based upon print version of record. 311 $a1-61668-745-2 320 $aIncludes bibliographical references and index. 327 $a""INTERNET POLICIES AND ISSUES, VOLUME 7 ""; ""INTERNET POLICIES AND ISSUES, VOLUME 7 ""; ""CONTENTS""; ""PREFACE""; ""MOBILE MIDDLEWARE PLATFORMS FOR CONTENT AND SERVICE CREATION, MANAGEMENT AND DELIVERY: A TECHNOLOGY CLASSIFICATION FRAMEWORK ""; ""Abstract ""; ""1. Introduction""; ""2. Methodology""; ""3. The MCSDP Technology Classification Model ""; ""3.1. The MCSDP Functional Architecture""; ""3.2. The MCSDP Functional Architecture ""; ""3.3. The Identification of the Modela???s Technology Classification Variables ""; ""3.4. The Overall MCSDP Technology Classification Model "" 327 $a""4. The Model Application to the Companies Sample """"4.1. The Offer Distribution on the Five MCSDP Categories ""; ""4.2.The Mmtps Choices Concerning the Technology Classification Variables""; ""5. Conclusion ""; ""References ""; ""USING DIGITAL WATERMARKING TO IDENTIFY AUDIO AND VIDEO SOFTWARE PRODUCTS""; ""Abstract""; ""1. Introduction""; ""2. Software Product Serialization""; ""2.1. Effectiveness of Identifying Software Product ""; ""2.2. Software Product Serialization Using Digital Watermarking Techniques""; ""2.3. Underlying Watermarking Algorithm "" 327 $a""2.4. Problems with Conventional Watermark Detection Improvement Methods """"3. Audio Watermark Detection Using Reference Signal ""; ""3.1. Research Approach ""; ""3.2. Proposed System for Audio Watermark Detection Using Re-synthesized Voice ""; ""3.3. Process Flow of Audio Watermark Embedding and Detection ""; ""3.4. Evaluation for Synthesized Voice""; ""3.4.1. Experimental Conditions""; ""3.4.2. Results of Audibility Test""; ""3.5. Summary of Evaluation for Audio Watermark Application ""; ""4. Video Watermark Detection Using Reference Signal "" 327 $a""4.1. Use Case of Illegal Copies of Video Encoder""""4.2. Problems with Conventional Methods""; ""4.3. Proposed System for Video Watermark Detection Using Degraded Original Images ""; ""4.3.1. Research Approach ""; ""4.3.2. Design of Proposed System ""; ""4.3.3. Prototype ""; ""4.4. System Evaluations ""; ""4.4.1. Experimental Conditions ""; ""4.4.2. Image Quality ""; ""4.4.3. Robustness Compared with Conventional Methods ""; ""4.4.4. Effect of Estimated Parameter on Detection Performance ""; ""4.4.5. Summary of Evaluation for Video Watermark Application ""; ""5. Conclusion "" 327 $a""References """"A CASE OF MIDDLEWARE FOR INFORMATION SYSTEMS OF PUBLIC TRANSPORT BY ROAD""; ""Abstract""; ""1. Introduction ""; ""2. General Description of the System ""; ""2.1. Ubiquitous Devices""; ""2.2. Ubiquitous Network ""; ""2.2.1. Data Transference ""; ""2.2.2. Scheme Based on Mailboxes ""; ""3. Middleware ""; ""3.1. Ubiquitous Applications Interface ""; ""3.2. Actions Triggered by Context ""; ""3.3. Ubiquitous Network Interface""; ""4. Ubiquitous Programs""; ""4.1. Payment System ""; ""5. Conclusions ""; ""Acknowledgement ""; ""References ""; ""INSTANT MESSAGING IN PRIMARY SCHOOLS"" 327 $a""Abstract "" 410 0$aInternet Policies and Issues 606 $aInternet$xManagement 606 $aInternet governance 615 0$aInternet$xManagement. 615 0$aInternet governance. 701 $aKutais$b B. G$01614546 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820118603321 996 $aInternet policies and issues$93944388 997 $aUNINA