Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 583 p. 260 illus.) |
Disciplina | 621.3821 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-42836-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline. 3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies. 3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction. 2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol. 3.1 Analysis on Impersonation Attacks. |
Record Nr. | UNISA-996466058703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 583 p. 260 illus.) |
Disciplina | 621.3821 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-42836-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline. 3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies. 3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction. 2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol. 3.1 Analysis on Impersonation Attacks. |
Record Nr. | UNINA-9910483867303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|