LEADER 10942nam 2200505 450 001 996500063703316 005 20231110213720.0 010 $a3-031-19208-7 035 $a(MiAaPQ)EBC7141568 035 $a(Au-PeEL)EBL7141568 035 $a(CKB)25360914800041 035 $a(OCoLC)1351195730 035 $a(PPN)266348319 035 $a(EXLCZ)9925360914800041 100 $a20230330d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aWireless algorithms, systems, and applications $e17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, proceedings, part I /$fedited by Lei Wang, [and three others] 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (687 pages) 225 1 $aLecture Notes in Computer Science ;$vv.13471 311 08$aPrint version: Wang, Lei Wireless Algorithms, Systems, and Applications Cham : Springer,c2022 9783031192074 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Contents - Part III -- Cyber-Physical Systems Including Intelligent Transportation Systems and Smart Healthcare Systems -- An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks -- 1 Introduction -- 2 Background -- 2.1 Definitions -- 2.2 Models -- 3 Our Proposed Scheme -- 3.1 Overview -- 3.2 Location Privacy-Preserving Mechanism -- 3.3 Identity Privacy-Preserving Mechanism -- 4 Performance Evaluation -- 4.1 Results of Privacy-Preserving Mechanisms -- 4.2 Results of Costs -- 5 Conclusion -- References -- Skin Lesion Segmentation via Intensive Atrous Spatial Transformer -- 1 Introduction -- 2 Related Works -- 2.1 Hand-Crafted Feature Based Methods -- 2.2 Deep Learning Based Methods -- 3 The Proposed Method -- 3.1 Overall Framework -- 3.2 IASPP Module -- 3.3 Loss Function -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Experimental Results -- 4.3 Analysis -- 4.4 Conclusion -- References -- Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Skeleton-Based Action Recognition -- 2.2 SVD Compress -- 3 Methodology -- 3.1 Graph Construction -- 3.2 Local Information Capture Module Based on GCN -- 3.3 Scene Fusion Based on Lightweight Object Detection -- 3.4 SVD-Based Compression -- 4 Experiments -- 4.1 Dataset and Parameter Settings -- 4.2 Comparison with the State-of-the-Art -- 5 Ablation Study -- 5.1 Significance of Local Information -- 5.2 Effectiveness of Model Compression -- 5.3 Visualization -- 6 Conclusion -- References -- Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 VIM and SFA Algorithm. 327 $a4.1 Validation Incentive Mechanism Based on Model Quality -- 4.2 SFA Algorithm -- 5 Security Analysis and Performance Evaluation -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Conclusions -- References -- A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme -- 1 Introduction -- 2 Related Work -- 2.1 Edge Computing -- 2.2 Consortium Blockchain -- 2.3 Signal Timing Optimization -- 3 Intelligent Traffic Signal Control Solution -- 3.1 Problem Description -- 3.2 System Design -- 3.3 System Model -- 3.4 Scheme Flow -- 4 Security Analysis and Experimental Results -- 4.1 Security Analysis -- 4.2 Experimental Results -- 5 Conclusion -- References -- Inferring Device Interactions for Attack Path Discovery in Smart Home IoT -- 1 Introduction -- 2 Background: Smart Home IoT -- 3 Motivation and Threat Model -- 3.1 Motivation Examples -- 3.2 Threat Model -- 4 Design -- 4.1 App-enabled Interaction Identification -- 4.2 Physical Interaction Identification -- 4.3 Attack Path Discovery -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 Discussion -- 7 Conclusion -- References -- A Local Rotation Transformation Model for Vehicle Re-Identification -- 1 Introduction -- 2 Related Work -- 2.1 Vehicle Re-Identification -- 2.2 Data Augmentation -- 3 Methodology -- 3.1 Overall Framework -- 3.2 Local Rotation Transformation -- 3.3 Target Selection Module -- 4 Experiment and Discussion -- 4.1 Datasets -- 4.2 Implementation -- 4.3 Ablation Study -- 4.4 Comparison with the State-of-the-Art -- 5 Conclusion -- References -- A Prototype System for Blockchain Performance Evaluation -- 1 Introduction -- 2 Related Work -- 3 The Scheme of Building Prototype System -- 3.1 The Scheme of Real Deployment Test -- 3.2 The Scheme of Real Simulation Test -- 4 Experiment -- 4.1 The Architecture of Prototype System. 327 $a4.2 The Experiments of Real Deployment Test -- 4.3 The Experiments of Simulation Test -- 5 Conclusion -- References -- A Spatial-Temporal Convolutional Model with Improved Graph Representation -- 1 Introduction -- 2 Related Work -- 2.1 Data Presented with Graph -- 2.2 Spatial-Temporal Data Forecasting -- 3 Data Design -- 3.1 Unstructured Graph Data -- 4 Model Design -- 4.1 Spatial Convolutional Layer -- 4.2 Temporal Convolutional Layer -- 5 Experiments -- 5.1 Dataset -- 5.2 Settings -- 5.3 Quantitative Analysis -- 5.4 Qualitative Analysis -- 6 Conclusions -- References -- A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems -- 1 Introduction -- 2 Architecture of Blockchain-Enabled CPS -- 2.1 Real Space Layer -- 2.2 Cyber Space Layer -- 2.3 Blockchain Layer -- 3 PoWPB -- 3.1 TPB -- 3.2 Design of PoWPB -- 3.3 Optimal Credit Threshold and Authorized Candidate Algorithm Design -- 4 Numerical Tests -- 5 Conclusions -- A Appendix -- A.1 Proof of Theorem 1 -- References -- E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems -- 1 Introduction -- 2 Overview -- 2.1 ET Contextualization -- 2.2 Framework Overview -- 3 Data Preprocessing -- 3.1 Mobility Event Extraction -- 3.2 Hotspot Detection -- 4 Mobility Modeling -- 4.1 Transition Pattern Modeling -- 4.2 Charging Pattern Modeling -- 4.3 Resting Pattern Modeling -- 5 Trajectory Generation -- 5.1 Deterministic Finite Automaton Algorithm -- 5.2 Fleet Generation Algorithm -- 6 Evaluation -- 6.1 Dataset and Experimental Settings -- 6.2 Transition Pattern Modeling Evaluation -- 6.3 Charging Behavior Prediction -- 6.4 Generation Evaluation -- 7 Conclusion -- References -- Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare Systems -- 1 Introduction. 327 $a2 Related Work -- 2.1 Adversarial Domain Adaptation -- 2.2 Medical Applications Based on Deep Learning -- 3 Method -- 3.1 Multi-task Domain Adaptation Framework -- 3.2 Class Feature Space Fusion -- 4 Experimental Results and Analysis -- 4.1 Dataset -- 4.2 Experiment Setup and Evaluation Value -- 4.3 Experiment Results -- 5 Conclusion -- References -- A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks -- 1 Introduction -- 2 Related Work -- 3 The Time-Varying Model of Satellite Networks -- 4 The CSSI Cache Model -- 4.1 Cache Strategy Based on Spreading Influence -- 4.2 The CSSI Routing and Forwarding Strategy -- 5 Simulation Experiments -- 5.1 Parameter Settings -- 5.2 Evaluation Indicators -- 5.3 Experimental Results -- 6 Summary -- References -- Posture and Appearance Fusion Network for Driver Distraction Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network -- 2.2 Driver Behavior Recognition -- 3 Proposed Method -- 3.1 Patch Extraction Module -- 3.2 MFD-former Encoder -- 4 Experiments -- 4.1 Datasets Settings -- 4.2 Implementation Details -- 4.3 Comparison Results -- 5 Conclusion -- References -- A Behavior Decision Method for Autonomous Vehicles in an Urban Scene -- 1 Introduction -- 2 Trajectory and Behavior Prediction Method -- 2.1 Surrounding Vehicle Collection Extraction -- 2.2 Behavior and Trajectory Prediction of Adjacent Vehicles -- 3 Autonomous Vehicle Behavior Decision Model -- 3.1 Formal Specification -- 3.2 Autonomous Driving Behavior Decision -- 3.3 Multi-objective Evolutionary Algorithm for DMAV -- 4 Experiments and Evaluation -- 4.1 Experiment Results -- 4.2 Simulation Results of Behavior Decision Model -- 5 Conclusion -- References -- TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration Prediction -- 1 Introduction -- 2 Related Work. 327 $a2.1 Spatio-temporal Forecasting -- 2.2 Traffic Incident Duration -- 3 Problem Definition -- 4 Model Architecture -- 4.1 Spatial Correlations -- 4.2 External Attributes -- 4.3 Temporal Correlations -- 4.4 Context-Aware Attention Mechanism -- 4.5 Model Training -- 5 Experiments -- 5.1 Implementation -- 5.2 Comparison with Baseline Methods -- 6 Conclusion -- References -- The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETs -- 1 Introduction -- 2 System Model -- 3 Channel Resource Allocation Mechanism -- 3.1 Scenario Marking Based on the Density of Vehicles -- 3.2 V2V Links Clustering -- 3.3 Channel Allocation -- 4 Distributed Power Control Scheme -- 4.1 Power Control Based on the Interior Point Method -- 4.2 Complexity Analysis -- 5 Experiment -- 6 Conclusion -- References -- Socially Acceptable Trajectory Prediction for Scene Pedestrian Gathering Area -- 1 Introduction -- 2 Related Work -- 2.1 Gathering Area -- 2.2 Generative Modeling -- 3 Method -- 3.1 Problem Definition -- 3.2 GA-GAN -- 4 Experiment -- 4.1 Dataset and Implementation Details -- 4.2 Quantitative Analysis -- 4.3 Qualitative Analysis -- 5 Conclusion -- References -- Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices -- 1 Introduction -- 2 Relates Work -- 2.1 Non-Wi-Fi Based Motion Recognition -- 2.2 Wi-Fi Based Motion Recognition -- 3 Related Theories -- 3.1 Channel State Information -- 3.2 Doppler Frequency Shifts -- 4 Systems Design -- 4.1 System Overview -- 4.2 Data Acquisition and Processing -- 4.3 BoCF Feature Extraction -- 4.4 ELM Classification Algorithm -- 5 Set-Up of the Experimental and Analysis of the Experimental -- 5.1 Experimental Setup -- 5.2 Experimental Analysis -- 6 Results -- References -- Security and Privacy -- An Effective Insider Threat Detection Apporoach Based on BPNN. 327 $a1 Introduction. 410 0$aLecture Notes in Computer Science 606 $aWireless communication systems 615 0$aWireless communication systems. 676 $a002 702 $aWang$b Lei 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996500063703316 996 $aWireless Algorithms, Systems, and Applications$9771859 997 $aUNISA LEADER 05533nam 2200817 450 001 9910822040103321 005 20231206215845.0 010 $a1-4426-9177-8 010 $a1-4426-8722-3 024 7 $a10.3138/9781442687226 035 $a(CKB)2550000000019235 035 $a(EBL)3268383 035 $a(SSID)ssj0000478179 035 $a(PQKBManifestationID)11913423 035 $a(PQKBTitleCode)TC0000478179 035 $a(PQKBWorkID)10419952 035 $a(PQKB)10284736 035 $a(CaPaEBR)430755 035 $a(CaBNvSL)slc00224325 035 $a(DE-B1597)465153 035 $a(OCoLC)1002274409 035 $a(OCoLC)1004874597 035 $a(OCoLC)1011475749 035 $a(OCoLC)1013962639 035 $a(OCoLC)944176966 035 $a(OCoLC)999378094 035 $a(DE-B1597)9781442687226 035 $a(Au-PeEL)EBL4672524 035 $a(CaPaEBR)ebr11258190 035 $a(OCoLC)958514624 035 $a(OCoLC)1380428708 035 $a(MdBmJHUP)musev2_105583 035 $a(VaAlCD)20.500.12592/0skr9x 035 $a(MiAaPQ)EBC4672524 035 $a(MiAaPQ)EBC3268383 035 $a(EXLCZ)992550000000019235 100 $a20160923h20092009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aParaphrases on the Epistles to the Corinthians, the Epistles to the Ephesians, Philippians, Colossians, and Thessalonians /$fedited by Robert D. Sider ; translated and annotated by Mechtilde O'Mara and Edward A. Phillips, Jr 205 $aVolume 43 210 1$aToronto, [Ontario] ;$aBuffalo, [New York] ;$aLondon, [England] :$cUniversity of Toronto Press,$d2009. 210 4$d©2009 215 $a1 online resource (565 p.) 225 0 $aCollected Works of Erasmus ;$vVolume 43 300 $aTranslated from the 1532 Froben ed. of Paraphrasis in omnes epistolas Apostolicas. 311 $a0-8020-9296-9 320 $aIncludes bibliographical references and indexes. 327 $a""Contents""; ""Preface""; ""Translatorsa??? Note""; ""Paraphrase on the First Epistle to the Corinthians""; ""Paraphrase on the Second Epistle to the Corinthians""; ""Paraphrase on the Epistle to the Ephesians""; ""Paraphrase on the Epistle to the Philippians""; ""Paraphrase on the Epistle to the Colossians""; ""Paraphrase on the First Epistle to the Thessalonians""; ""Paraphrase on the Second Epistle to the Thessalonians""; ""The Dedicatory Letter [1520] to Cardinal Campeggi""; ""The Sequence and Dates of the Publication of the Paraphrases""; ""Works Frequently Cited"" 327 $a""Short-Title Forms for Erasmusa??? Works""""Index of Scriptural References""; ""Index of Classical References""; ""A""; ""C""; ""D""; ""G""; ""H""; ""J""; ""L""; ""M""; ""O""; ""P""; ""Q""; ""R""; ""S""; ""T""; ""V""; ""X""; ""Index of Patristic and Medieval References""; ""A""; ""C""; ""D""; ""E""; ""G""; ""H""; ""I""; ""J""; ""N""; ""O""; ""P""; ""T""; ""V""; ""Z""; ""Index of Greek and Latin Words Cited""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""L""; ""M""; ""N""; ""O""; ""P""; ""Q""; ""R""; ""S""; ""T""; ""U""; ""V""; ""General Index""; ""A""; ""B""; ""C""; ""D"" 327 $a""E""""f""; ""g""; ""h""; ""i""; ""j""; ""k""; ""l""; ""m""; ""n""; ""o""; ""p""; ""r""; ""s""; ""t""; ""u""; ""v""; ""w""; ""y""; ""z"" 330 $aAs part of his effort to make the Bible an effective instrument of reform in society, church, and everyday life, Erasmus composed the Paraphrases. In these series of texts, the Holy Scripture provides the core of a work that is vastly expanded to embrace the reforming "philosophy of Christ" in all of its forms. This volume contains two sets of Paraphrases, one on the Corinthian letters (circa. 1519), and the other on the group of letters from the Ephesians to the Thessalonians (circa. 1520). The first set presents an epistolary narrative which not only enlivens the events described but revisits them from a sixteenth-century perspective. Together, they form a sharpened portrait of the primitive Corinthian church and an intriguing critique of the church as it was in Erasmus's time. The second set, Ephesians to Thessalonians, offers an interpretation of Pauline theology with humanistic overtones that are distinctively Erasmian. In these Paraphrases, we see the craft of the philologist at work in the articulation of the doctrine of the Trinity, the humanist depicting Christ with an unmistakably human sensibility, and the artist discussing familiar theological virtues of faith and love in a new way. Apart from providing the first complete English translations of these Paraphrases since 1549, this volume gives excellent insight into the fundamentals of Erasmian theology and includes annotations which highlight the historical and linguistic implications of Erasmus's original texts. 606 $aHISTORY / Renaissance$2bisacsh 608 $aEarly works. 608 $aCriticism, interpretation, etc. 615 7$aHISTORY / Renaissance. 676 $a199.492 700 $aErasmus$b Desiderius$f-1536,$0799747 702 $aSider$b Robert D$g(Robert Dick), 702 $aO'Mara$b Mechtilde 702 $aPhillips$b Edward Albert$f1945- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910822040103321 996 $aParaphrases on the Epistles to the Corinthians, the Epistles to the Ephesians, Philippians, Colossians, and Thessalonians$94046919 997 $aUNINA