The Resource E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)
E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)
Resource Information
The item E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
-
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- Language
- eng
- Edition
- 1st ed. 2019.
- Contents
-
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Isbn
- 9783030110390
- Label
- E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
- Title
- E-Business and Telecommunications
- Title remainder
- 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
- Statement of responsibility
- edited by Mohammad S. Obaidat, Enrique Cabello
- Subject
-
- Coding theory
- Computer Communication Networks
- Computer communication systems
- Computer networks -- Security measures
- Computer security
- Computer system failures
- Information Systems Applications (incl. Internet)
- Information theory
- Mobile and Network Security
- System Performance and Evaluation
- Systems and Data Security
- Application software
- Coding and Information Theory
- Language
- eng
- Summary
-
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems
- Dewey number
- 004.6
- http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
-
- ReK8HVAxyGc
- GRxjWYzhQow
- LC call number
- TK5105.5-5105.9
- http://library.link/vocab/relatedWorkOrContributorName
-
- Obaidat, Mohammad S
- Cabello, Enrique
- SpringerLink (Online service)
- Series statement
- Communications in Computer and Information Science,
- Series volume
- 990
- http://library.link/vocab/subjectName
-
- Computer communication systems
- Computer system failures
- Application software
- Computer networks
- Computer security
- Coding theory
- Information theory
- Computer Communication Networks
- System Performance and Evaluation
- Information Systems Applications (incl. Internet)
- Mobile and Network Security
- Systems and Data Security
- Coding and Information Theory
- Label
- E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)
- Contents
-
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Control code
- OCM1bookssj0002116518
- Dimensions
- unknown
- Edition
- 1st ed. 2019.
- Isbn
- 9783030110390
- Other control number
- 10.1007/978-3-030-11039-0
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0002116518
- Label
- E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)
- Contents
-
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph -- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study -- Approaches to Securing P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes -- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements -- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers -- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256 -- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack -- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy -- History-based Throttling of Distributed Denial-of-Service Attacks -- LocalPKI: An Interoperable and IoT Friendly PKI -- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption -- Computer-based Analysis of Tomatis Listening Test System Audio Data -- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks -- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application -- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance -- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare
- Control code
- OCM1bookssj0002116518
- Dimensions
- unknown
- Edition
- 1st ed. 2019.
- Isbn
- 9783030110390
- Other control number
- 10.1007/978-3-030-11039-0
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0002116518
Subject
- Coding theory
- Computer Communication Networks
- Computer communication systems
- Computer networks -- Security measures
- Computer security
- Computer system failures
- Information Systems Applications (incl. Internet)
- Information theory
- Mobile and Network Security
- System Performance and Evaluation
- Systems and Data Security
- Application software
- Coding and Information Theory
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/E-Business-and-Telecommunications--14th/46q7m_uiyNA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/E-Business-and-Telecommunications--14th/46q7m_uiyNA/">E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/E-Business-and-Telecommunications--14th/46q7m_uiyNA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/E-Business-and-Telecommunications--14th/46q7m_uiyNA/">E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, edited by Mohammad S. Obaidat, Enrique Cabello, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>