Books+ Search Results

Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings

Title
Wireless Algorithms, Systems, and Applications [electronic resource] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / edited by Sriram Chellappan, Wei Cheng, Wei Li.
ISBN
9783319942681
Edition
1st ed. 2018.
Publication
Cham : Springer International Publishing : Imprint: Springer, 2018.
Physical Description
1 online resource (XVIII, 910 p.) 398 illus.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
Variant and related titles
Springer ENIN.
Other formats
Printed edition:
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
April 05, 2023
Series
Theoretical Computer Science and General Issues, 10874
Theoretical Computer Science and General Issues, 10874
Contents
Hypergraph Based Radio Resource Management in 5G Fog Cell
A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism
Interest-aware next POI Recommendation for Mobile Social Networks
Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs
Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval
An Open Security-enhanced Compatible OpenFlow Platform
Hop-constrained Relay Node Placement in Wireless Sensor Networks
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection
A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications
Delay-constraint Throughput Maximization in UAV-assisted VANETs
Smart Device Fingerprinting based on Webpage Loading
Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain
Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT
Improving Security and Stability of AODV with Fuzzy Neural Network in VANET
Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder
TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System
Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation
Cancer-Drug Interaction network construction and drug target prediction based on multi-source data
Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data
Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks
Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model
Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments
iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques
Massive MIMO Power Allocation in Millimeter Wave Networks
A detection-resistant covert timing channel based on Geometric Huffman Coding
Spark: A Smart Parking Lot Monitoring System
A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection
Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users
A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning
Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation
Household Electrical Load Scheduling Algorithms with Renewable Energy
An Empirical Study of OAuth-based SSO System on Web
Turning Legacy IR Devices into Smart IoT Devices
Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy
Data Uploading Mechanism for Internet of Things with Energy Harvesting
Enabling ZigBee Link Performance Robust Under Cross-Technology Interference
Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines
Exploration of Human Activities Using Sensing Data via Deep Embedded Determination
Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks
A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks
Privacy-preserving Personal Sensitive Data in Crowdsourcing
A First Step Towards Combating Fake News Over Online Social Media
Predicting Smartphone App Usage with Recurrent Neural Networks
A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games
Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network
Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks
N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings
Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing
HEVC Lossless Compression Coding based on Hadamard Buttery Transformation
U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks
Localization of Thyroid Nodules in Ultrasonic Images
Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices
An Information Classification Collection Protocol for Large-scale RFID Systems
An efficient energy-aware probabilistic routing approach for mobile opportunistic networks
On Association Study of Scalp EEG Data Channels Under Different Circumstances
A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain
Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network
Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query
KrackCover: A Wireless Security Framework for Covering KRACK Attacks
Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network
LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information
NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays
Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks
Synergistic based Social Incentive Mechanism in Mobile Crowdsensing
SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET
DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way
A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems
A Novel Capability-Aware SIC-based Protocol for Wireless Networks
A Supervised Learning Approach to Link Prediction in Dynamic Networks
Mining Mobile Users' Interests through Cellular Network Browsing Profiles
A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System
The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers
Network Control for Large-Scale Container Clusters
Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks
Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals
A Recognition Approach for the Groups with Interactions
Security Enhancement of Over-the-Air Update for Connected Vehicles
Resilient SDN-based Communication in Vehicular Network
Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check
Understanding Data Breach: A Visualization Aspect
A Novel Recommendation-based Trust Inference Model for MANETs.
Also listed under
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?