| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996500063803316 |
|
|
Titolo |
Wireless algorithms, systems, and applications : 17th International Conference, WASA 2022, Dalian, China, October 28-30 2022, proceedings part III / / edited by Lei Wang, [and three others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (679 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science ; ; v.13473 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents - Part III -- Theoretical Frameworks and Analysis of Fundamental Cross-Layer Protocol and Network Design and Performance Issues -- DC-Gossip: An Enhanced Broadcast Protocol in Hyperledger Fabric Based on Density Clustering -- 1 Introduction -- 2 Related Works and Background -- 2.1 Communication Performance -- 2.2 Broadcast Protocal -- 3 Method Analysis -- 4 Design of DC-Gossip -- 4.1 Initial Dissemination Structure -- 4.2 Push Dissemination -- 4.3 Responding to Dynamic Changes of Network -- 4.4 Timed Re-clustering -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Comparison Results -- 6 Conclusion -- References -- A Time Utility Function Driven Scheduling Scheme for Managing Mixed-Criticality Traffic in TSN -- 1 Introduction -- 2 System Model and Problem Description -- 3 Proposed Scheduling Scheme -- 3.1 Stream Scheduling Constraints -- 3.2 Sieving Strategy for Scheduling Periodic Streams -- 3.3 Online Algorithm for Scheduling Aperiodic Streams -- 4 Experimental Evaluation -- 5 Conclusion -- References -- Distributed and Localized Algorithm Design and Analysis -- Distributed Anti-manipulation Incentive Mechanism Design for Multi-resource Trading in Edge-Assistant Vehicular Networks -- 1 Introduction -- 2 System Model -- 2.1 Network Model -- 2.2 Reverse Auction Framework -- 3 Problem Formulation -- 4 Faithful Distributed Multi-resource Trading Mechanism -- 4.1 The DRCA Mechanism -- 4.2 |
|
|
|
|
|
|
|
|
|
Proof of Properties -- 5 Simulation Results -- 5.1 Allocation Efficiency -- 5.2 System Overhead -- 6 Conclusion -- References -- Information and Coding Theory for Wireless Networks -- Communication Optimization in Heterogeneous Edge Networks Using Dynamic Grouping and Gradient Coding -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Dynamic Grouping and Heterogeneity-Aware Gradient Coding. |
3.1 Static Grouping and Dynamic Grouping -- 3.2 Dynamic Grouping and Heterogeneity-Aware Gradient Coding -- 3.3 DGHGC Complexity -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Analysis of Results -- 5 Conclusion -- References -- Design on Rateless LDPC Codes for Reliable WiFi Backscatter Communications -- 1 Introduction -- 2 Preliminaries -- 2.1 Backscatter Communication Based on WiFi -- 2.2 LDPC Code and Rateless Code -- 3 System Design -- 3.1 Index Matrix -- 3.2 Generator Matrix -- 3.3 Rateless LDPC Encoder -- 3.4 Rateless LDPC Decoder -- 4 Performance Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Design of Physical Layer Coding for Intermittent-Resistant Backscatter Communications Using Polar Codes -- 1 Introduction -- 2 Preliminary Knowledge -- 2.1 Polar Codes -- 2.2 Convolutional Codes -- 2.3 Fountain Code -- 2.4 SCL Algorithm -- 3 Coding Design -- 3.1 Transmitter -- 3.2 Receiver -- 3.3 Algorithm Design -- 4 Performance Analysis -- 5 Conclusion -- References -- MEBV: Resource Optimization for Packet Classification Based on Mapping Encoding Bit Vectors -- 1 Introduction -- 2 Related Work -- 2.1 BV-Based Packet Classification -- 2.2 Motivation -- 3 Proposed Scheme -- 3.1 Mapping Encoding Bit Vector (MEBV) SCHEME -- 3.2 HRME: High Reuse Field Mapping Encoding -- 3.3 PMME: Prefix Matching Field Mapping Encoding -- 3.4 WMME: Wildcard Matrix Field Mapping Encoding -- 3.5 RMME: Range Matching Field Mapping Encoding -- 3.6 Packet Rule Matching -- 3.7 Hash Collision Resolution -- 4 Experimental Results and Analysis -- 4.1 Space Complexity -- 4.2 Throughput -- 4.3 Resource Consumption -- 5 Conclusion -- References -- NT-RP: A High-Versatility Approach for Network Telemetry Based on FPGA Dynamic Reconfigurable Pipeline -- 1 Introduction -- 2 Related Work -- 3 Architecture and Methodology of NT-RP -- 3.1 Overview. |
3.2 Distributed NTM Cyclic Storage Strategy -- 3.3 Telemetry Function Integration Mechanism -- 3.4 NT-RP Based Network Telemetry Methods -- 4 Performance Evaluation -- 5 Conclusion -- References -- An Effective Comprehensive Trust Evaluation Model in WSNs -- 1 Introduction -- 2 Related Works -- 3 Proposed Comprehensive Trust Assessment Model -- 3.1 Network Topology Model and Assumptions -- 3.2 Direct Trust Model -- 3.3 Indirect Trust Model -- 3.4 Comprehensive Trust Evaluation Model -- 4 Simulation Experiment and Performance Analysis -- 5 Conclusion -- References -- Precise Code Clone Detection with Architecture of Abstract Syntax Trees -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Parsing and Calculating -- 3.2 Abstract Syntax Tree Filtering -- 3.3 Eliminate Duplicate Clone Pairs -- 4 Experimental Setup -- 4.1 Research Questions -- 4.2 Dataset and Configuration -- 5 Experimental Results and Analyses -- 5.1 Recall -- 5.2 Precision -- 5.3 Optimal Range -- 5.4 Execution Time -- 6 Discussion -- 7 Related Work -- 8 Conclusion -- References -- Multi-view Pre-trained Model for Code Vulnerability Identification -- 1 Introduction -- 2 Methodology -- 2.1 Structural Information -- 2.2 Structure-Aware Self-attention Encoder -- 2.3 Multi-view Contrastive Learning -- 2.4 Training Loss -- 3 Experiments -- 3.1 Experimental Setup -- 3.2 Experimental Results -- 3.3 Ablation Study -- 4 Related Work -- 5 Conclusion -- References -- Localization |
|
|
|
|
|
|
|
-- Discover the ICS Landmarks Based on Multi-stage Clue Mining -- 1 Introduction -- 2 Background and Motivation -- 2.1 Clues in Banner -- 2.2 Clues in HTML -- 2.3 ICS Geolocation Based on Clues -- 3 Location-Indicating Clue Miner -- 3.1 Banner Grabber -- 3.2 Banner Clue Miner -- 3.3 Html Clue Miner -- 3.4 Clue Normalization -- 4 Geographical Location Generation -- 5 Experiment -- 5.1 Dataset -- 5.2 Performance of LCM. |
5.3 Landmarks Validation -- 5.4 Geolocation Performance -- 5.5 Related Work -- 5.6 Conclusion -- References -- Mobility Models and Mobile Social Networking -- Dynamic Mode-Switching-Based Worker Selection for Mobile Crowd Sensing -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Dynamic Mode-Switching-Based Worker Selection -- 5 Performance Evaluation -- 6 Conclusion -- References -- A Distributed Simulator of Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Design of DISMAN -- 3.1 Architecture -- 3.2 Workflow -- 4 Implementation of Functional Modules -- 4.1 Bandwidth Setting and Poor Channel Simulation -- 4.2 Queue Management and Data Transmission -- 4.3 Subnet Division -- 4.4 Multi-path and Multi-hop Networks -- 4.5 Dynamic Network Reconstruction and Visual Interaction -- 5 Evaluation -- 5.1 Evaluation of Bandwidth Limitation -- 5.2 Evaluation of Network Performance Parameters -- 5.3 Evaluation of Multipath Transmission -- 5.4 Evaluation of Dynamic Network -- 5.5 Performance of DISMAN -- 6 Conclusion -- References -- Social-Network-Assisted Task Selection for Online Workers in Spatial Crowdsourcing: A Multi-Agent Multi-Armed Bandit Approach -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Social Network Communication Model -- 2.3 Problem Formulation -- 3 Mechanism Design -- 3.1 Social-Network-Based Observation -- 3.2 Thompson-Sampling-Based Payment Estimation -- 3.3 Detailed Algorithm -- 4 Performance Evaluation -- 4.1 Settings, Metrics and Baselines -- 4.2 Simulation Results -- 5 Conclusion -- References -- Privacy-Aware Task Allocation Based on Deep Reinforcement Learning for Mobile Crowdsensing -- 1 Introduction -- 2 Problem Description -- 3 System Model and Algorithm -- 3.1 Overview of System Model -- 3.2 PPO -- 3.3 Task Allocation Algorithm Based on PPO -- 4 Experiments and Results. |
4.1 Experimental Settings -- 4.2 Loss of Model -- 4.3 Comparative Experiment -- 4.4 Ablation Experiment -- 5 Conclusion -- References -- Information Sources Identification in Social Networks Using Deep Convolutional Neural Network -- 1 Introduction -- 2 Related Works -- 3 Notations and Preliminaries -- 3.1 Notations -- 3.2 Deep Convolutional Neural Network -- 3.3 Information Sources Identification -- 4 System Model -- 4.1 Graph Embedding -- 4.2 Deep Conbolutional Neural Network -- 4.3 Sources Identification -- 5 Experiments -- 5.1 Datasets -- 5.2 Experiment Setup -- 6 Model Evaluations -- 6.1 Performance Evaluation -- 6.2 Cost Evaluation -- 7 Conclusion and Future Improvements -- References -- Underwater and Underground Networks -- MineTag: Exploring Low-Cost Battery-Free Localization Optical Tag for Mine Rescue Robot -- 1 Introduction -- 2 System Overview -- 3 System Design -- 3.1 Optical Tag Design -- 3.2 Build Localization Base Station -- 3.3 Optical Tag Recognition -- 4 Experiment and Evaluation -- 4.1 Experimental Results -- 4.2 Impact of Varying Factors -- 5 Conclusion -- References -- TSV-MAC: Time Slot Variable MAC Protocol Based on Deep Reinforcement Learning for UASNs -- 1 Introduction -- 2 Network Model and Problem Description -- 2.1 Network Model -- 2.2 MAC Protocol Workflow -- 2.3 Problem Description -- 3 TSV-MAC Protocol -- 3.1 Node Information Matrix -- |
|
|
|
|
|
|
|
|
|
|
|
3.2 LSTM-DQN for TSV-MAC Protocol -- 3.3 Design of Time Slot Allocation Table -- 4 Performance Evaluation -- 4.1 Simulation Scenario and Settings -- 4.2 Simulation Results -- 5 Conclusions -- References -- Localization for Underwater Sensor Networks Based on a Mobile Beacon -- 1 Introduction -- 2 Localization Algorithm Design -- 2.1 LSMB in Static Environment -- 2.2 LSMB in Dynamic Environment -- 3 Simulations -- 3.1 Settings -- 3.2 Simulations for LSMB -- 4 Conclusion -- References. |
Vehicular Networks. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910481270803321 |
|
|
Titolo |
Liber Psalmorum Dauidis regis, et prophetae. Ex Arabico idiomate in Latinum translatus. A Victorio Scialac Accurensi, & Gabriele Sionita Edeniensi Maronitis, è Monte Libano, philosophiae, & sacrae theologiae professoribus. Recens in lucem editus munificentia illustrissimi, & excellentiss. D.D. Francisci Sauary de Breues, |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
Online resource (12, 474, 2 p., 4º) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Reproduction of original in Biblioteca Nazionale Centrale di Firenze. |
|
|
|
|
|
| |