top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part I / / edited by Zhe Liu, Fan Wu, Sajal K. Das
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part I / / edited by Zhe Liu, Fan Wu, Sajal K. Das
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (653 pages)
Disciplina 621.384
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Application software
Computer systems
Artificial intelligence
Computers, Special purpose
Software engineering
Computer Communication Networks
Computer and Information Systems Applications
Computer System Implementation
Artificial Intelligence
Special Purpose and Application-Based Systems
Software Engineering
ISBN 3-030-85928-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless Communications -- Blockchain -- Algorithms -- IoT and Edge Computing -- Scheduling & Optimization I.
Record Nr. UNISA-996464512303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.)
Disciplina 621.384
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computers
Data protection
Computers, Special purpose
Application software
Computer Communication Networks
Computing Milieux
Data and Information Security
Special Purpose and Application-Based Systems
Computer and Information Systems Applications
ISBN 3-030-59016-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks.
Record Nr. UNISA-996418312703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computers
Data protection
Computers, Special purpose
Application software
Computer Communication Networks
Computing Milieux
Data and Information Security
Special Purpose and Application-Based Systems
Computer and Information Systems Applications
ISBN 3-030-59019-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. .
Record Nr. UNISA-996418320003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computers
Data protection
Computers, Special purpose
Application software
Computer Communication Networks
Computing Milieux
Data and Information Security
Special Purpose and Application-Based Systems
Computer and Information Systems Applications
ISBN 3-030-59019-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. .
Record Nr. UNINA-9910427716603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.)
Disciplina 621.384
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computers
Data protection
Computers, Special purpose
Application software
Computer Communication Networks
Computing Milieux
Data and Information Security
Special Purpose and Application-Based Systems
Computer and Information Systems Applications
ISBN 3-030-59016-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks.
Record Nr. UNINA-9910427716703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVIII, 910 p. 398 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Data protection
Artificial intelligence
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
Artificial Intelligence
ISBN 3-319-94268-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs.
Record Nr. UNISA-996465693203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings / / edited by Sriram Chellappan, Wei Cheng, Wei Li
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVIII, 910 p. 398 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Data protection
Artificial intelligence
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
Artificial Intelligence
ISBN 3-319-94268-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs.
Record Nr. UNINA-9910349432103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 912 p. 405 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-60033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies.
Record Nr. UNISA-996466285803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 912 p. 405 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-60033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies.
Record Nr. UNINA-9910483056603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 583 p. 260 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-42836-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline.
3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies.
3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction.
2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol.
3.1 Analysis on Impersonation Attacks.
Record Nr. UNISA-996466058703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui