
Software Engineering and Computer Systems, Part I
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- Intro
- Title
- Preface
- Organization
- Table of Contents
- Software Engineering
- Use of Agents in Building Integration Tool for Component-Based Application
- Introduction
- CORBA Overview
- COM and DCOM Overview
- CORBA and DCOM Comparison
- Software Agents
- Related Work
- COM-CORBA Interoperability
- Multi-technology Distributed Objects and Their Integration
- A Component-Based Architecture for Multi-Agent Systems
- The Current Work
- System Analysis
- System Architecture
- Discussion
- Conclusion and Future Work
- References
- Towards Incorporation of Software Security Testing Framework in Software Development
- Introduction
- Related Work
- An Overview of Software Development Process
- An Overview of Software Testing
- Software Security Testing
- Analysis Approach
- Software Testing Framework
- Software Security Testing Framework
- Discussion and Findings
- The Proposed Framework
- Conclusion and Future Work
- References
- A Performance Modeling Framework Incorporating Cost Efficient Deployment of Multiple Collaborating Instances
- Introduction
- Proposed Performance Modeling Framework
- Application Example
- Conclusion
- References
- Software Quality Models: A Comparative Study
- Introduction
- Quality Models Background
- McCall Model
- Boehm Model
- FURPS Model
- Dromey Model
- ISO IEC 9126 Model
- The Comparison Method
- Case Study
- Result and Discussion
- Conclusion
- References
- Network
- QTCP: An Optimized and Improved Congestion Control Algorithm of High-Speed TCP Networks
- Introduction
- Related Work
- HS-TCP
- STCP
- HTCP
- BIC
- CUBIC
- Congestion Control Algorithm QTCP: In High-Speed Protocols
- Simulation Topology
- Performance Evaluation Criteria
- Jain's Fairness Index Evaluation
- Conclusions
- References
- Bioinformatics and E-Heatlth
- A Study on the Forecast of Meridian Energy and Biochemical Test by Using Bio-inspired NeuroMolecular Computing Model
- Introduction
- Architecture of the NMCN Model
- The Operation Hypotheses of the NMCN Model
- The Reference Neurons
- The Cytoskeletal Neurons
- Evolutionary Learning
- Experimental Results
- Discrimination Learning
- The Forecast Experiment
- Conclusions
- References
- A Model of Knowledge Management System and Early Warning System (KMS@EWS) for Clinical Diagnostic Environment
- Introduction
- Literature Review
- Knowledge Management System
- Early Warning System
- Clinical Diagnostic Process
- Research Metho
- A Model of KMS and EWS for CD Environment
- Understanding KM in Relation to EWS
- Model Development
- Preliminary Results and EWS Model and Its Functionalities
- Conclusion and Future Work
- References
- Biometrics Technologies
- ICT Evaluation for Knowledge Sharing among Senior Citizens Community
- Introduction
- Literature Review
- Knowledge Sharing
- Senior Citizen
- Common Worries about Technology among Senior Citizens
- ICT Difficulties among Senior Citizens
- Requirement of Sharing Knowledge among Senior Citizens
- Methodology
- Description of Knowledge Sharing Framework v2.0
- Vision
- Community of Practice
- Government
- Knowledge Process
- KM Tools
- Storage
- Results
- Reasons for Not Using Computer
- Age-Related Functional Limitations
- Common Computer Based Technologies among Senior Citizens
- Website Design Requirements for Senior Citizens
- Conclusion
- References
- Subthreshold SRAM Designs for Cryptography Security Computations
- Introduction
- CMOS SRAM for Crypto Designing
- SRAM Potential
- Reliability of Low-Power SRAM
- Remarks
- Conclusion
- References
- A Development of Integrated Learning System for Visual Impaired
- Introduction
- Literature Review
- Blind Acceptance towards Technologies
- Learning Method
- Student, ICT and Its Impact
- Methodology
- Integrated Learning System
- Slide to Text Module
- Parsing Module
- Match Module
- Database Module
- Results and Discussions
- The Interfaces of the ILS
- Feedback on the Functional Testing
- Conclusion
- References
- Fingerprint Singularity Detection: A Comparative Study
- Introduction
- Poincaré Index Method
- Complex Filter Method
- Complex Orientation Field Estimation
- Complex Filter Construction
- Experimental Results and Comparisons
- Processing Time
- Bottlenecks Detection
- Singularity Detection Accuracy
- Other Considerations
- Conclusions and Future Work
- References
- The Development of Software Evaluation and Selection Framework for Supporting COTS-Based Systems: The Theoretical Framework
- Introduction
- Problem Statements
- Mismatches Problem
- Non-functional Requirements Problem
- Lack of Learning from Previous COTS Software Selection Cases Knowledge
- Objectives
- Literature Review
- Main Processes for Evaluating and Selecting COTS Software
- COTS Software Evaluation Criteria
- Existing Methods for Evaluating and Selecting COTS Software
- Methodology
- Theoretical Study
- Empirical Study
- Framework Development
- Framework Evaluating
- Theoretical Framework
- Conclusions and Future Work
- References
- Recipe Generation from Small Samples: Incorporating an Improved Weighted Kernel Regression with Correlation Factor
- Introduction
- Nadaraya Watson Kernel Regression
- The Proposed Weighted Kernel Regression with Correlation Factor
- Training Phase
- Testing Phase
- Experiment and Results
- Experiment Setup
- Performance Measure
- Results
- Conclusion
- References
- Applying Feature Selection Methods to Improve the Predictive Model of a Direct Marketing Problem
- Introduction
- Literature Review
- Data Collection and Experiments
- Evaluations and Outcomes
- Prediction Accuracy
- Lift Index
- Area under the ROC Curve (AUC)
- Precision for the Top Decile
- Feature Subsets Selected by the FS Methods
- Performance Outcomes
- Discussion and Conclusions
- References
- Visualizing MDS Coordinates of Multiple Information in Color for Attribute-Based Two-Dimensional Space
- Introduction
- The Survey Results
- Visualization
- Multidimensional Scaling (MDS)
- Methodology
- Results and Analyses
- MDS Data with Small Sample (50 Subjects)
- MDS Data with 200 Subjects
- Conclusion
- References
- User Interface and Interaction Design Considerations for Collaborative Learning Using Augmented Reality Learning Object
- Introduction
- Learning Styles
- Collaborative Learning
- Interface Design
- Augmented Reality Learning Object
- Pilot Test
- Conclusion and Future Work
- References
- Augmented Reality Remedial Paradigm for Negative Numbers: AVCTP
- Introduction
- Related Works
- Method
- Findings
- Discussion
- Conclusion and Future Works
- References
- A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring
- Introduction
- Malware Behavior Analysis
- Related Works
- Proposed Framework
- Secure Environment
- Run Time Analysis
- Resource Monitoring
- Behavior Definition
- Experiment
- Conclusion
- References
- Success Factors in Cost Estimation for Software Development Project
- Introduction
- Research Method
- Software Cost Estimation Process
- Success Factors in Cost Estimation
- Entertainment
- Role of Sponsor
- Changes of Company Policy
- Proper Tool Selection
- Suitable Estimation Technique
- Suitable Software Development Methodology
- Results
- Conclusion
- References
- Web Engineering
- Transactional Web Services Composition: A Genetic Algorithm Approach
- Introduction
- Related Work
- Approach Process
- Specification
- Tuple
- Service Types
- Workflow and Activities
- Transaction Properties
- Synthesis
- Synthesis to Functionality
- Synthesis to Transactional Property
- Genetic Algorithm
- Introduction to Genetic Algorithm
- Configuration of GA
- Fitness Functions
- Experiments and Discussion
- Conclusion
- References
- Rapid Development of Executable Ontology for Financial Instruments and Trading Strategies
- Introduction
- Related Work
- Facilitating Semantic Web Applications Construction
- Problem and Proposal for Solution
- Rapid Ontology Development
- Case Study Implementation and Discussion
- FITS Ontology
- Semantic Integration of Data Sources
- Technology
- Conclusions and Future Work
- References
- A Greedy Approach for Adapting Web Content for Mobile Devices
- Introduction
- Related Work
- Proposed Solution
- Identification of Important Blocks
- Assignment of Profit to Each Object of a Block
- Pre-processing of Blocks
- Assignment of Weight to Each Object in a Block
- Greedy Algorithm for Selecting Blocks to Display on Mobile Device
- Results and Discussion
- Framework Comparison
- Visualization Comparison
- Conclusion
- References
- QoS-Aware Web Services Selection with Interval-Valued Intuitionistic Fuzzy Soft Sets
- Introduction
- Basic Notions
- Basic System Architecture
- The Proposed Approach for Selecting Web Services
- Aggregating QoS Information
- Evaluating and Selecting Web Services
- An Example
- Conclusion
- References
- DBrain Portal for Collaborative BioGrid Environment
- Introduction
- Grid and Its Interoperability
- Grid System
- Challenges in Grid Computing
- Grid Portal
- Portal Requirements
- Architecture
- Portal Components
- gUSE/WS-PGRADE Portal
- Conclusion and Future Work
- References
- Assessing the Use of Mash-Ups in Higher Education
- Introduction
- Review
- Yahoo Pipes
- An Open University Blog
- Library LookUp
- A Study to Find the Best Social Media HE Mash-Up
- Methodology of This Research
- Results
- Conclusions
- References
- Influence of Informal Visual Environments and Informal Motivational Factors on Learners' Aesthetic Expectations from Formal Learning Visual Environments
- Introduction
- Research Objectives
- Literature Review
- Formal Learning Visual Environments (FLVEs)
- Informal Visual Environments (IVEs)
- Research Questions
- Methodology
- Results and Analysis
- Discussion
- Conclusion
- Future Works
- References
- Zero Watermarking for Text on WWW Using Semantic Approach
- Introduction
- Related Work
- Proposed Methodology
- Experimental Results
- Conclusion
- Recommendations and Future Work
- References
- Sentiment Classification from Online Customer Reviews Using Lexical Contextual Sentence Structure
- Introduction
- Background and Related Research
- Proposed Framework
- Sentence Splitter and Processing Noisy Text
- Part of Speech (POS) Tagger
- Feature and Opinion Word Position Extraction
- Sentiment Sentences Extraction
- Knowledge Base for the Sentence Structure and Contextual Information
- Contextual Semantic Orientation of Sentences
- Experiments and Results
- Conclusion and Future Work
- References
- Neural Network
- Experimental Approximation of Breast Tissue Permittivity and Conductivity Using NN-Based UWB Imaging
- Introduction
- Method
- Results
- Conclusion
- References
- Banking Deposit Number Recognition Using Neural Network
- Introduction
- Proposed Methods
- Results
- Discussion
- Conclusion
- References
- Features Selection for Training Generator Excitation Neurocontroller Using Statistical Methods
- Introduction
- Power System Modelling
- Data Analysis
- Conclusion
- References
- Intelligent Decision Support Model Based on Neural Network to Support Reservoir Water Release Decision
- Introduction
- Reservoir as Structural Mitigation during Emergency Situation
- Intelligent Decision Support System Framework
- Neural Network Application in Reservoir Operation
- Method
- Case Study: Timah Tasoh Reservoir
- Data Preparation
- Neural Network Modelling
- Findings
- Forecasting Model
- Decision Model
- Discussion
- Conclusion
- References
- The Effect of Adaptive Momentum in Improving the Accuracy of Gradient Descent Back Propagation Algorithm on Classification Problems
- Introduction
- BPNN with Momentum Coefficient($\alpha$)
- The Proposed Algorithm
- Gradient Descent Adaptive Momentum (GDAM) Algorithm
- Results and Discussions
- Preliminary Study
- Breast Cancer (Wisconsin) Classification Problem
- IRIS Classification Problem
- Australian Credit Card Approval Classification Problem
- Conclusions
- References
- Fuzzy Models for Complex Social Systems Using Distributed Agencies in Poverty Studies
- Introduction
- Agents
- Multi-Agents Systems
- Holons
- Distributed Agencies
- Methodology
- Implementations
- Conclusions
- References
- Parallel and Distributed
- Grid Jobs Scheduling Improvement Using Priority Rules and Backfilling
- Introduction
- Problem Description
- Performance Metrics
- Minimizing Total Tardiness
- Minimizing Makespan Time
- Minimizing Response Time
- Minimizing Number of Delayed Jobs
- Maximizing Resource Utilization
- Priority Rules Scheduling Algorithms
- First Come First Serve (FCFS)
- Earliest Deadline First (EDF)
- Shortest Job First (SJF)
- Longest Job First (LJF)
- Earliest Release Date (ERD)
- Minimum Time to Due Date (MTTD)
- Related Work
- Earliest Gap - Earliest Deadline First (EG-EDF)
- Backfilling
- Proposed Algorithm
- Experiment Setup
- Experimental Results and Discussions
- Results for Priority Rules Algorithms
- Results for Proposed Algorithms
- Conclusion
- References
- Dynamic Load Balancing Policy in Grid Computing with Multi-Agent System Integration
- Introduction
- Related Work
- Dynamic Load Balancing Policy
- Dynamic Load Balancing Policy Communication
- Multi-Agent System
- Implementation Strategy
- Conclusion
- References
- Dynamic Multilevel Dual Queue Scheduling Algorithms for Grid Computing
- Introduction
- Related Research
- Proposed Scheduling Algorithms
- Multilevel Dual Queue Scheduling Algorithm (MDQ)
- Dynamic Multilevel Dual Queue Scheduling Algorithm Using Median (MDQM)
- Dynamic Multilevel Dual Queue Scheduling Algorithm Using Square Root (MDQR)
- Statistical Analysis of Real Workload Traces
- Homogeneous Implementation of Proposed Scheduling Algorithms
- Scheduling Simulator Design and Development
- Experimental Setup
- Simulation Data
- Performance Analysis of Grid Scheduling Algorithms
- Average Waiting Times Analysis
- Average Turnaround Times Analysis
- Average Response Times Analysis
- Performance Analysis of Scheduling Algorithms by Changing Time Quantum
- Conclusion
- References
- Communications in Computer and Information Science: Performance Improvement and Interference Reduction through Complex Task Partitioning in a Self-organized Robotic Swarm
- Introduction
- Interference in Multi-Robot Systems
- The Recommended Method
- Interference Reduction through Sequential Task Partitioning
- Operation Environment
- Conclusion
- References
- A Semantic Service Discovery Framework for Intergrid
- Introduction
- Semantic-Based Resource Description Model
- The Model Components
- The Model Description
- The Model Description
- The Model Building Block
- The Description Process
- Model Evaluation
- Results and Discussion
- Experimental Setup
- Performance of the New Framework
- Conclusions
- References
- Agent-Based Grid Resource Management
- Introduction
- Method for Grid Resource Management
- Agent-Based Grid Resource Management Middleware
- Experimental Results
- Conclusion
- References
- E- Learning
- Current Practices of Programming Assessment at Higher Learning Institutions
- Introduction
- The Survey
- Results and Discussion
- Demography of Respondents
- Construction of Programming Exercise Item
- Evaluation of Programming Exercises
- Approaches for Programming Exercises
- Conclusion and Future Work
- References
- Learn with Me: Collaborative Virtual Learning for the Special Children
- Introduction
- Design and Development
- Conceptual Modeling of Learn with Me
- Components of Learn with Me
- Design of Learn with Me
- Development of Learn with Me
- Methodology
- Procedures and Setup
- Hardware and Software
- Procedures
- Results
- Learning without and with Assistance
- Correlation of Each Assistance and Errors in Learning with Assistance
- Discussion
- Conclusions
- References
- Potential of Using Virtual Environment for Aircraft Maintenance Learning System in Making Tacit Knowledge Explicit
- Introduction
- Method
- Results and Discussion
- Virtual Aircraft Maintenance Learning System (VAMLS)
- RPG Infrastructure
- VAMLS Architecture
- VAMLS Screenshot
- Conclusion
- References
- Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review
- Introduction
- Competency Based-Assessment
- Associate Degrees and Diplomas Programmes
- Undergraduate Programs
- Postgraduate Programs
- Professional Certification Programs
- Discussion
- Conclusion
- References
- Survey of Software Engineering Practices in Undergraduate Information System Projects
- Introduction
- Methodology
- Study Design
- Participants
- Instruments
- Data Management and Analysis Techniques
- An Overview of Information System Engineering Program (CS226)
- Results and Discussions
- Documentation
- Requirements Engineering
- Software Design
- Quality Assurance
- Conclusion
- References
- Ontology
- Health Ontology Generator, Distiller and Accumulator
- Introduction
- The Overall Design
- The Ontology Generator
- Algorithm to Extract Schema from Database
- Method for Encoding Ontology
- Encoding the Header
- Encoding the Body
- Encoding the Trailer
- The User Interface of HOG
- The Ontology Distiller
- The Distiller Algorithm
- The Distiller User Interface
- The Ontology Accumulator
- Conclusion
- References
- Image Processing
- A New Model of Securing Iris Authentication Using Steganography
- Introduction
- A General Process of Steganography
- A Propose Model of Iris Steganography
- Iris Enrollment Process
- Iris Verification Process
- Discussion
- Conclusion
- References
- Tamper Localization and Lossless Recovery Watermarking Scheme
- Introduction
- Tamper Localization and Recovery Watermarking
- Compression
- Huffman Coding
- Arithmetic Coding
- RLE
- JPEG
- Methodology
- Image Preparation
- Embedding
- Tamper Localization And Recovery
- Experiment Results
- Discussion and Conclusion
- References
- A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes
- Introduction
- Watermarking System
- Watermarking Performance Measures
- The Trade-Off Triangle for Watermarking Performance Measures
- Attacks on Watermarking Schemes
- Proposed Scheme to Measure the Watermarking Performance Trade-Off
- Proposed Prerequisites and Experimental Settings
- Analysis and Discussions
- Conclusions and Future Works
- References
- Malaysian Car Plates Recognition Using Freeman Chain Codes and Characters' Features
- Introduction
- Related Works
- Chain Codes
- Proposed Approach
- Segmentation
- Chain Code Derivation
- Characters' Features Extraction
- References
- Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding
- Introduction
- Bit-Plane Model
- Bit-Plane Model
- Embedding Model
- Repetition of the Embedding
- Implementation and Experimental Results
- Conclusion
- References
- Geometrically Invariant Watermarking Based on Local Generalized Orthogonalized Complex Moments
- Introduction
- Preliminaries
- Bessel-Fourier Moments
- Hessian-Laplace Detector
- Local Feature Region Construction
- The Proposed Watermarking Scheme
- Watermark Embedding
- Watermark Extraction
- Experimental Results
- Imperceptibility
- Robustness
- Conclusions
- References
- Hierarchical Groups with Low Complexity Block Compensation for Reconstruction Video Sequences
- Introduction
- The Blocks Diagram of Features Detection for Video Encoder
- Features Detection
- Blocks' Compensation
- Index Selection
- Reconstruction Process
- Simulation Results
- Conclusions
- References
- Gait Classification by Support Vector Machine
- Introduction
- Previous Works
- Overview of the System
- Extracting the Gait Features
- Original Image Enhancement
- Measurement of Width and Height
- Dividing Enhanced Human Silhouette
- Skeletonization of Body Segments
- Joint Trajectory Extraction
- Measurement of Step-Size and Crotch Height
- Smoothing Technique
- SVM Classifier
- Experimental Set Up
- Experiment Results
- Conclusion
- References
- Selecting Significant Features for Authorship Invarianceness in Writer Identification
- Introduction
- Authorship Invarianceness
- Global Features Representation
- United Moment Invariant Fuction
- Feature Selection
- Proposed Approach
- Extracting Features
- Selecting Significant Features
- Identifying the Authorship Using Significant Features
- Conclusion and Future Work
- References
- Pixel Mask Analyzer (PMA): Noise Removal in Gland Detection for Colon Cancer Image
- Introduction
- Problem
- Algorithm
- Simulation Result
- Conclusion
- References
- A Review of Bio-inspired Algorithms as Image Processing Techniques
- Introduction
- Methodology
- Bio-inspired Algorithm Matrix
- Results and Discussion
- Population of BIAs Applications between 1995-2010
- Statistics of BIAs in Image Processing
- Conclusion and Recommendation
- References
- The Use of Elimination Method and Nearest Neighbor for Oil Palm Fruit Ripeness Indicator
- Introduction
- Related Work
- Methodology
- Data Collection
- Process Flow
- HSV Color Model
- Elimination Process
- Nearest Neighbor Distance
- Experimental Design
- Result and Analysis
- Ripe FFB
- Unripe FFB
- Conclusion and Future Work
- References
- Crowd Analysis and Its Applications
- Introduction
- Crowd Analysis and Related Studies
- A Framework of Crowd Analysis
- Common Approaches in Crowd Analysis
- Preprocessing
- Object Tracking
- Event/Behavior Recognition
- Applications of Crowd Analysis
- Conclusion
- References
- Iris Segmentation: A Review and Research Issues
- Introduction
- The Path Forward for Iris Recognition Systems
- Related Work in Close-Up Imaging Environment
- Daugman's Approach
- Wildes' Method
- Others Methods
- Related Work in Non-cooperative Imaging Environment
- Proenca and Alexandre's Technique
- Jeong's et al. Approach
- Labati and Scotti's Algorithm
- Li's et al. Method
- Tan's et al. Technique
- Proenca' New Method
- Iris Segmentation Delimitations
- Databases
- Discussion and Conclusion
- References
- Splitting Strategies for Video Images Processing in Medical Data Grid
- Introduction
- Backgrounds and Related Works
- Biomedical Informatics Research Network (BIRN)
- MammoGrid
- MedIGrid
- KnowledgeGRID Malaysia
- Overview on Medical Data Grid
- Medical Image Storage (Grid-Based PACS)
- Medical Data Management
- Medical Image and Video Processing
- Echocardiography System in PPUKM
- Splitting Strategies
- Video Compression Techniques
- Conclusion
- References
- Comparison of Linear Discriminant Analysis and Support Vector Machine in Classification of Subdural and Extradural Hemorrhages
- Introduction
- Overview of the Proposed Scheme
- Three-Stage Preprocessing
- First Level Prepocessing: Original Image Contrast Enhancement
- Second Level Prepocessing: Segmentation of Intracranial Contents
- Third Level Preprocessing: Contrast Adjustment of Candidate SDH and EDH
- Potential Candidate SDH and EDH Clustering
- Extraction of Shape Features
- LDA vs. SVM Classification
- Experimental Protocol and Discussion
- Conclusion
- References
- A New Approach for Adjusting Braille Image Skewness in Optical Braille Recognition
- Introduction
- The Proposed Approach
- Braille Image Segmentation
- Simple Braille Cells Detection
- Skewness Angle Estimation
- Experimental Results
- Conclusion
- References
- Multilevel Thresholding Method Based on Aggressive Particle Swarm Optimization
- Introduction
- Aggressive Particle Swarm Optimization
- Overview of Particle Swarm Optimization
- Aggressive Behaviour in Particle Swarm
- Multilevel Thresholding Selection of Image Segmentation
- Bilevel Thresholding
- Multilevel Thresholding
- AgPSO Step-by-Step Procedure
- Experiments and Performance Evaluation
- Multilevel Thresholding Result
- Stability Comparison of Algorithms
- Efficiency Comparison of Algorithms
- Conclusion
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.