top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trustworthy Global Computing : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Trustworthy Global Computing : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 380 p. 72 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 1-280-38883-8
9786613566751
3-642-15640-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services.
Record Nr. UNINA-9910484197103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unconventional Computation and Natural Computation [[electronic resource] ] : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Unconventional Computation and Natural Computation [[electronic resource] ] : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 221 p. 89 illus.)
Disciplina 004
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Software engineering
Artificial intelligence
Electronic data processing—Management
Computer Science Logic and Foundations of Programming
Software Engineering
Artificial Intelligence
IT Operations
ISBN 3-319-58187-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Power of Analogue-digital Machines -- Ways to Compute in Euclidean Frameworks. - Real-Time Computability of Real Numbers by Chemical Reaction Networks -- Temporal logic computation using DNA strand displacement reactions -- Quantum-dot Cellular Automata: a Clocked Architecture for High-speed, Energy-efficient Molecular Computing -- Platform color designs for interactive molecular arrangements -- Self-Assembly of Shapes at Constant Scale using Repulsive Forces -- Verification in Staged Tile Self-Assembly.-Self-Assembly of 4-sided Fractals in the Two-handed Tile Assembly Model.-Self-Assembled DC Resistive Circuits with Voltage Controlled Growth -- Morphogenetic and Homeostatic Self-Assembled Systems -- Superposition as memory: unlocking quantum automatic complexity -- Solving the Bin-Packing Problem by Means of Tissue P System with 2-Division -- Universal Matrix Insertion Grammars with Small Size -- Analysis on the Nested Duplication String System and Its Capacity -- Descrambling Order Analysis in Ciliates.
Record Nr. UNISA-996466232703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Unconventional Computation and Natural Computation : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Unconventional Computation and Natural Computation : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 221 p. 89 illus.)
Disciplina 004
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Software engineering
Artificial intelligence
Electronic data processing—Management
Computer Science Logic and Foundations of Programming
Software Engineering
Artificial Intelligence
IT Operations
ISBN 3-319-58187-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Power of Analogue-digital Machines -- Ways to Compute in Euclidean Frameworks. - Real-Time Computability of Real Numbers by Chemical Reaction Networks -- Temporal logic computation using DNA strand displacement reactions -- Quantum-dot Cellular Automata: a Clocked Architecture for High-speed, Energy-efficient Molecular Computing -- Platform color designs for interactive molecular arrangements -- Self-Assembly of Shapes at Constant Scale using Repulsive Forces -- Verification in Staged Tile Self-Assembly.-Self-Assembly of 4-sided Fractals in the Two-handed Tile Assembly Model.-Self-Assembled DC Resistive Circuits with Voltage Controlled Growth -- Morphogenetic and Homeostatic Self-Assembled Systems -- Superposition as memory: unlocking quantum automatic complexity -- Solving the Bin-Packing Problem by Means of Tissue P System with 2-Division -- Universal Matrix Insertion Grammars with Small Size -- Analysis on the Nested Duplication String System and Its Capacity -- Descrambling Order Analysis in Ciliates.
Record Nr. UNINA-9910483171603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Web Services, Formal Methods, and Behavioral Types : 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers / / edited by Thomas Hildebrandt, António Ravara, Jan Martijn van der Werf, Matthias Weidlich
Web Services, Formal Methods, and Behavioral Types : 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers / / edited by Thomas Hildebrandt, António Ravara, Jan Martijn van der Werf, Matthias Weidlich
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVII, 167 p. 36 illus.)
Disciplina 006
Collana Programming and Software Engineering
Soggetto topico Application software
Software engineering
Computer science
Computer networks
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer and Information Systems Applications
Software Engineering
Computer Science Logic and Foundations of Programming
Computer Communication Networks
System Performance and Evaluation
IT Operations
ISBN 3-319-33612-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Kickstarting Choreographic Programming -- On the Suitability of Behavioral Profiles for Process Model Comparison -- Formal Verification of Petri Nets with Names -- Modeling and formal analysis of a client-server application for Cloud services -- An Event-Based Approach to Runtime Adaptation in Communication-Centric Systems -- Designing Efficient XACML Policies for RESTful Services -- Type Inference for Session Types in the Pi-Calculus -- Type checking purpose-based access control policies in the pi-calculus -- On the decidability of honesty and of its variants.
Record Nr. UNINA-9910483617803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 912 p. 405 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-60033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies.
Record Nr. UNISA-996466285803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Wireless Algorithms, Systems, and Applications : 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings / / edited by Liran Ma, Abdallah Khreishah, Yan Zhang, Mingyuan Yan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 912 p. 405 illus.)
Disciplina 621.382
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-60033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cognitive radio networks -- Wireless sensor networks -- Cyber-physical systems -- Distributed and localized algorithm design and analysis -- Information and coding theory for wireless networks -- Localization -- Mobile cloud computing -- Topology control and coverage -- Security and privacy -- Underwater and underground networks -- Vehicular networks -- Internet of things -- Information processing and data management -- Programmable service interfaces -- Energy-efficient algorithms -- System and protocol design -- Operating system and middle-ware support -- Experimental test-beds, models and case studies.
Record Nr. UNINA-9910483056603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 583 p. 260 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-42836-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline.
3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies.
3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction.
2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol.
3.1 Analysis on Impersonation Attacks.
Record Nr. UNISA-996466058703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Wireless Algorithms, Systems, and Applications : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 583 p. 260 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-42836-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline.
3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies.
3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction.
2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol.
3.1 Analysis on Impersonation Attacks.
Record Nr. UNINA-9910483867303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 858 p. 345 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-21837-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.
Record Nr. UNISA-996215647003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
Wireless Algorithms, Systems, and Applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 858 p. 345 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-21837-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.
Record Nr. UNINA-9910483971403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui