top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial intelligence and mobile services - AIMS 2021 : 10th International Conference, held as part of the Services Conference Federation, SCF 2021, Virtual event, December 10-14, 2021, proceedings / / editors, Yi Pan [and four others]
Artificial intelligence and mobile services - AIMS 2021 : 10th International Conference, held as part of the Services Conference Federation, SCF 2021, Virtual event, December 10-14, 2021, proceedings / / editors, Yi Pan [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (123 pages)
Disciplina 006.3
Collana Lecture notes in computer science
Soggetto topico Artificial intelligence
Mobile computing
Computer engineering
ISBN 3-030-96033-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910544877503321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence and mobile services - AIMS 2021 : 10th International Conference, held as part of the Services Conference Federation, SCF 2021, Virtual event, December 10-14, 2021, proceedings / / editors, Yi Pan [and four others]
Artificial intelligence and mobile services - AIMS 2021 : 10th International Conference, held as part of the Services Conference Federation, SCF 2021, Virtual event, December 10-14, 2021, proceedings / / editors, Yi Pan [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (123 pages)
Disciplina 006.3
Collana Lecture notes in computer science
Soggetto topico Artificial intelligence
Mobile computing
Computer engineering
ISBN 3-030-96033-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464550403316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational intelligence in bioinformatics / / edited by Gary B. Fogel, David W. Corne, Yi Pan
Computational intelligence in bioinformatics / / edited by Gary B. Fogel, David W. Corne, Yi Pan
Pubbl/distr/stampa New York, : Wiley-IEEE, c2008
Descrizione fisica 1 online resource (377 p.)
Disciplina 572.028563
572.80285
Altri autori (Persone) CorneDavid
FogelGary <1968->
PanYi <1960->
Collana IEEE Press series on computational intelligence
Soggetto topico Bioinformatics
Computational intelligence
ISBN 0-470-65215-2
1-281-22169-4
9786611221690
0-470-19909-1
0-470-19908-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Contributors -- Part One Gene Expression Analysis and Systems Biology -- 1. Hybrid of Neural Classifi er and Swarm Intelligence in Multiclass Cancer Diagnosis with Gene Expression Signatures (Rui Xu, Georgios C. Anagnostopoulos, and Donald C. Wunsch II) -- 1.1 Introduction -- 1.2 Methods and Systems -- 1.3 Experimental Results -- 1.4 Conclusions -- 2. Classifying Gene Expression Profi les with Evolutionary Computation (Jin-Hyuk Hong and Sung-Bae Cho) -- 2.1 DNA Microarray Data Classifi cation -- 2.2 Evolutionary Approach to the Problem -- 2.3 Gene Selection with Speciated Genetic Algorithm -- 2.4 Cancer Classifi ction Based on Ensemble Genetic Programming -- 2.5 Conclusion -- 3. Finding Clusters in Gene Expression Data Using EvoCluster (Patrick C. H. Ma, Keith C. C. Chan, and Xin Yao) -- 3.1 Introduction -- 3.2 Related Work -- 3.3 Evolutionary Clustering Algorithm -- 3.4 Experimental Results -- 3.5 Conclusions -- 4. Gene Networks and Evolutionary Computation (Jennifer Hallinan) -- 4.1 Introduction -- 4.2 Evolutionary Optimization -- 4.3 Computational Network Modeling -- 4.4 Extending Reach of Gene Networks -- 4.5 Network Topology Analysis -- 4.6 Summary -- Part Two Sequence Analysis and Feature Detection -- 5. Fuzzy-Granular Methods for Identifying Marker Genes from Microarray Expression Data (Yuanchen He, Yuchun Tang, Yan-Qing Zhang, and Rajshekhar Sunderraman) -- 5.1 Introduction -- 5.2 Traditional Algorithms for Gene Selection -- 5.3 New Fuzzy-Granular-Based Algorithm for Gene Selection -- 5.4 Simulation -- 5.5 Conclusions -- 6. Evolutionary Feature Selection for Bioinformatics (Laetitia Jourdan, Clarisse Dhaenens, and El-Ghazali Talbi) -- 6.1 Introduction -- 6.2 Evolutionary Algorithms for Feature Selection -- 6.3 Feature Selection for Clustering in Bioinformatics -- 6.4 Feature Selection for Classifi cation in Bioinformatics -- 6.5 Frameworks and Data Sets -- 6.6 Conclusion -- 7. Fuzzy Approaches for the Analysis CpG Island Methylation Patterns (Ozy Sjahputera, Mihail Popescu, James M. Keller, and Charles W. Caldwell).
7.1 Introduction -- 7.2 Methods -- 7.3 Biological Signifi cance -- 7.4 Conclusions -- Part Three Molecular Structure and Phylogenetics -- 8. Protein-Ligand Docking with Evolutionary Algorithms(Rene Thomsen) -- 8.1 Introduction -- 8.2 Biochemical Background -- 8.3 The Docking Problem -- 8.4 Protein-Ligand Docking Algorithms -- 8.5 Evolutionary Algorithms -- 8.6 Effect of Variation Operators -- 8.7 Differential Evolution -- 8.8 Evaluating Docking Methods -- 8.9 Comparison between Docking Methods -- 8.10 Summary -- 8.11 Future Research Topics -- 9. RNA Secondary Structure Prediction Employing Evolutionary Algorithms (Kay C. Wiese, Alain A. Deschanes, and Andrew G. Hendriks) -- 9.1 Introduction -- 9.2 Thermodynamic Models -- 9.3 Methods -- 9.4 Results -- 9.5 Conclusion -- 10. Machine Learning Approach for Prediction of Human Mitochondrial Proteins (Zhong Huang, Xuheng Xu, and Xiaohua Hu) -- 10.1 Introduction -- 10.2 Methods and Systems -- 10.3 Results and Discussion -- 10.4 Conclusions -- 11. Phylogenetic Inference Using Evolutionary Algorithms(Clare Bates Congdon) -- 11.1 Introduction -- 11.2 Background in Phylogenetics -- 11.3 Challenges and Opportunities for Evolutionary Computation -- 11.4 One Contribution of Evolutionary Computation: Graphyl -- 11.5 Some Other Contributions of Evolutionary computation -- 11.6 Open Questions and Opportunities -- Part Four Medicine -- 12. Evolutionary Algorithms for Cancer Chemotherapy Optimization (John McCall, Andrei Petrovski, and Siddhartha Shakya) -- 12.1 Introduction -- 12.2 Nature of Cancer -- 12.3 Nature of Chemotherapy -- 12.4 Models of Tumor Growth and Response -- 12.5 Constraints on Chemotherapy -- 12.6 Optimal Control Formulations of Cancer Chemotherapy -- 12.7 Evolutionary Algorithms for Cancer Chemotherapy Optimization -- 12.8 Encoding and Evaluation -- 12.9 Applications of EAs to Chemotherapy Optimization Problems -- 12.10 Related Work -- 12.11 Oncology Workbench -- 12.12 Conclusion -- 13. Fuzzy Ontology-Based Text Mining System for Knowledge Acquisition, Ontology Enhancement, and Query Answering from Biomedical Texts (Lipika Dey and Muhammad Abulaish).
13.1 Introduction -- 13.2 Brief Introduction to Ontologies -- 13.3 Information Retrieval form Biological Text Documents: Related Work -- 13.4 Ontology-Based IE and Knowledge Enhancement System -- 13.5 Document Processor -- 13.6 Biological Relation Extractor -- 13.7 Relation-Based Query Answering -- 13.8 Evaluation of the Biological Relation Extraction Process -- 13.9 Biological Relation Characterizer -- 13.10 Determining Strengths of Generic Biological Relations -- 13.11 Enhancing GENIA to Fuzzy Relational Ontology -- 13.12 Conclusions and Future Work -- References -- Appendix Feasible Biological Relations -- Index.
Record Nr. UNINA-9910876976303321
New York, : Wiley-IEEE, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao, Yi Pan
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao, Yi Pan
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , c2009
Descrizione fisica 1 online resource (648 p.)
Disciplina 004.6/8
004.68
621.384
Altri autori (Persone) XiaoYang <1966->
PanYi <1960->
Collana Wiley series on parallel and distributed computing
Soggetto topico IEEE 802.11 (Standard)
IEEE 802.16 (Standard)
Wireless LANs - Standards
Personal communication service systems - Standards
Wireless metropolitan area networks - Standards
ISBN 1-282-11283-X
9786612112836
0-470-40368-3
0-470-40367-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PREFACE -- CONTRIBUTORS -- PART I: IEEE 802.11 WIRELESS LANs -- Chapter 1 IEEE 802.11 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Matti Latva-aho, and Yang Xiao) -- Chapter 2 Framework for Decentralized Wireless LAN Resource Management (Jiang Xie, Ivan Howitt, and Anita Raja) -- Chapter 3 Incentive Issues in IEEE 802.11x Wireless Networks (Yu-Kwong Kwok) -- Chapter 4 Capacity and Rate Adaptation in IEEE 802.11 Wireless LANs (Ming Li and Yang Xiao) -- PART II IEEE 802.15.1 BLUETOOTH AND IEEE 802.15.2 -- Chapter 5 Overview of IEEE 802.15.1 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Yang Xiao, and Jeff J. Robertson) -- Chapter 6 Overview of IEEE 802.15.2: Coexistence of Wireless Personal Area Networks with Other Unlicensed Frequency Bands Operating Wireless Devices (Kaveh Ghaboosi, Yang Xiao, Matti Latva-aho, and Babak H. Khalaj) -- Chapter 7 Coexistence of Bluetooth Piconets and Wireless LAN (Jingli Li and Xiangqian Liu) -- PART III IEEE 802.15.3 WIRELESS PANs -- Chapter 8 Frame Format, Channel Access, and Piconet Operation of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 9 Power Management and Security of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 10 Performance Evaluation and Optimization of IEEE 802.15.3 Piconets (Zhanping Yin and Victor C. M. Leung) -- Chapter 11 Performance Analysis of MB-OFDM UWB Systems (Chris Snow, Lutz Lampe, and Robert Schoberg) -- Chapter 12 Distributed Solution for Resource Allocation in Ultra-Wideband Wireless PANs (Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, and Xuemin (Sherman) Shen) -- PART IV IEEE 802.15.4 AND 802.15.5 WIRELESS PANs -- Chapter 13 IEEE 802.15.4 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Ming Li, and Fei Hu) -- Chapter 14 Performance Analysis for IEEE 802.15.4 Wireless Personal Area Networks (Hsueh-Wen Tseng, Yu-Kai Huang, and Ai-Chun Pang) -- Chapter 15 Data Transmission and Beacon Scheduling in Low Rate Wireless Mesh Personal Area Networks (Jianliang Zheng).
Chapter 16 Impact of Reliable and Secure Sensing on Cluster Lifetime in IEEE 802.15.4 Networks (Jelena Misic) -- Chapter 17 IEEE 802.15.5: Recommended Practice for WPAN Mesh Network (Low Data Rate) (Chunhui Zhu and Myung J. Lee) -- Chapter 18 Power-Saving Algorithms on IEEE 802.15.4 for Wireless Sensor Networks (Tae Rim Park and Myung J. Lee) -- PART V IEEE 802.16 WIRELESS MANs -- Chapter 19 IEEE 802.16 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Tianji Li, and Fei Hu) -- Chapter 20 QoS Support for WiMAX (Usman A. Ali, Qiang Ni, Yang Xiao, Wenbing Yao, and Dionysios Skordoulis) -- Chapter 21 Subchannel Allocation and Connection Admission Control in OFDMA-Based IEEE 802.16/WiMAX-Compliant Infrastructure Wireless Mesh Networks (Dusit Niyato and Ekram Hossain) -- Chapter 22 Universal Authentication and Billing Architecture for Wireless MANs (Xiaodong Lin, Haojin Zhu, Minghui Shi, Rongxing Lu, Pin-Han Ho, and Xuemin (Sherman) Shen) -- Chapter 23 Scheduling Algorithms for WiMAX Networks: Simulator Development and Performance Study (Sai Suhas Kolukula, M. Sai Rupak, K. S. Sridharan, and Krishna M. Sivalingam) -- INDEX -- ABOUT THE EDITORS.
Record Nr. UNINA-9910145957703321
Hoboken, New Jersey : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao, Yi Pan
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao, Yi Pan
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , c2009
Descrizione fisica 1 online resource (648 p.)
Disciplina 004.6/8
004.68
621.384
Altri autori (Persone) XiaoYang <1966->
PanYi <1960->
Collana Wiley series on parallel and distributed computing
Soggetto topico IEEE 802.11 (Standard)
IEEE 802.16 (Standard)
Wireless LANs - Standards
Personal communication service systems - Standards
Wireless metropolitan area networks - Standards
ISBN 1-282-11283-X
9786612112836
0-470-40368-3
0-470-40367-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PREFACE -- CONTRIBUTORS -- PART I: IEEE 802.11 WIRELESS LANs -- Chapter 1 IEEE 802.11 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Matti Latva-aho, and Yang Xiao) -- Chapter 2 Framework for Decentralized Wireless LAN Resource Management (Jiang Xie, Ivan Howitt, and Anita Raja) -- Chapter 3 Incentive Issues in IEEE 802.11x Wireless Networks (Yu-Kwong Kwok) -- Chapter 4 Capacity and Rate Adaptation in IEEE 802.11 Wireless LANs (Ming Li and Yang Xiao) -- PART II IEEE 802.15.1 BLUETOOTH AND IEEE 802.15.2 -- Chapter 5 Overview of IEEE 802.15.1 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Yang Xiao, and Jeff J. Robertson) -- Chapter 6 Overview of IEEE 802.15.2: Coexistence of Wireless Personal Area Networks with Other Unlicensed Frequency Bands Operating Wireless Devices (Kaveh Ghaboosi, Yang Xiao, Matti Latva-aho, and Babak H. Khalaj) -- Chapter 7 Coexistence of Bluetooth Piconets and Wireless LAN (Jingli Li and Xiangqian Liu) -- PART III IEEE 802.15.3 WIRELESS PANs -- Chapter 8 Frame Format, Channel Access, and Piconet Operation of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 9 Power Management and Security of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 10 Performance Evaluation and Optimization of IEEE 802.15.3 Piconets (Zhanping Yin and Victor C. M. Leung) -- Chapter 11 Performance Analysis of MB-OFDM UWB Systems (Chris Snow, Lutz Lampe, and Robert Schoberg) -- Chapter 12 Distributed Solution for Resource Allocation in Ultra-Wideband Wireless PANs (Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, and Xuemin (Sherman) Shen) -- PART IV IEEE 802.15.4 AND 802.15.5 WIRELESS PANs -- Chapter 13 IEEE 802.15.4 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Ming Li, and Fei Hu) -- Chapter 14 Performance Analysis for IEEE 802.15.4 Wireless Personal Area Networks (Hsueh-Wen Tseng, Yu-Kai Huang, and Ai-Chun Pang) -- Chapter 15 Data Transmission and Beacon Scheduling in Low Rate Wireless Mesh Personal Area Networks (Jianliang Zheng).
Chapter 16 Impact of Reliable and Secure Sensing on Cluster Lifetime in IEEE 802.15.4 Networks (Jelena Misic) -- Chapter 17 IEEE 802.15.5: Recommended Practice for WPAN Mesh Network (Low Data Rate) (Chunhui Zhu and Myung J. Lee) -- Chapter 18 Power-Saving Algorithms on IEEE 802.15.4 for Wireless Sensor Networks (Tae Rim Park and Myung J. Lee) -- PART V IEEE 802.16 WIRELESS MANs -- Chapter 19 IEEE 802.16 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Tianji Li, and Fei Hu) -- Chapter 20 QoS Support for WiMAX (Usman A. Ali, Qiang Ni, Yang Xiao, Wenbing Yao, and Dionysios Skordoulis) -- Chapter 21 Subchannel Allocation and Connection Admission Control in OFDMA-Based IEEE 802.16/WiMAX-Compliant Infrastructure Wireless Mesh Networks (Dusit Niyato and Ekram Hossain) -- Chapter 22 Universal Authentication and Billing Architecture for Wireless MANs (Xiaodong Lin, Haojin Zhu, Minghui Shi, Rongxing Lu, Pin-Han Ho, and Xuemin (Sherman) Shen) -- Chapter 23 Scheduling Algorithms for WiMAX Networks: Simulator Development and Performance Study (Sai Suhas Kolukula, M. Sai Rupak, K. S. Sridharan, and Krishna M. Sivalingam) -- INDEX -- ABOUT THE EDITORS.
Record Nr. UNINA-9910831052303321
Hoboken, New Jersey : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao and Yi Pan
Emerging wireless LANs, wireless PANs, and wireless MANs : IEEE 802.11, IEEE 802.15, IEEE 802.16 wireless standard family / / edited by Yang Xiao and Yi Pan
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2008
Descrizione fisica 1 online resource (648 p.)
Disciplina 004.6/8
Altri autori (Persone) PanYi <1960->
XiaoYang <1966->
Collana Wiley series on parallel and distributed computing
Soggetto topico IEEE 802.11 (Standard)
IEEE 802.16 (Standard)
Wireless LANs - Standards
Personal communication service systems - Standards
Wireless metropolitan area networks - Standards
ISBN 1-282-11283-X
9786612112836
0-470-40368-3
0-470-40367-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PREFACE -- CONTRIBUTORS -- PART I: IEEE 802.11 WIRELESS LANs -- Chapter 1 IEEE 802.11 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Matti Latva-aho, and Yang Xiao) -- Chapter 2 Framework for Decentralized Wireless LAN Resource Management (Jiang Xie, Ivan Howitt, and Anita Raja) -- Chapter 3 Incentive Issues in IEEE 802.11x Wireless Networks (Yu-Kwong Kwok) -- Chapter 4 Capacity and Rate Adaptation in IEEE 802.11 Wireless LANs (Ming Li and Yang Xiao) -- PART II IEEE 802.15.1 BLUETOOTH AND IEEE 802.15.2 -- Chapter 5 Overview of IEEE 802.15.1 Medium Access Control and Physical Layers (Kaveh Ghaboosi, Yang Xiao, and Jeff J. Robertson) -- Chapter 6 Overview of IEEE 802.15.2: Coexistence of Wireless Personal Area Networks with Other Unlicensed Frequency Bands Operating Wireless Devices (Kaveh Ghaboosi, Yang Xiao, Matti Latva-aho, and Babak H. Khalaj) -- Chapter 7 Coexistence of Bluetooth Piconets and Wireless LAN (Jingli Li and Xiangqian Liu) -- PART III IEEE 802.15.3 WIRELESS PANs -- Chapter 8 Frame Format, Channel Access, and Piconet Operation of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 9 Power Management and Security of IEEE 802.15.3 Wireless PANs (Yang Xiao, Michael J. Plyler, Bo Sun, and Yi Pan) -- Chapter 10 Performance Evaluation and Optimization of IEEE 802.15.3 Piconets (Zhanping Yin and Victor C. M. Leung) -- Chapter 11 Performance Analysis of MB-OFDM UWB Systems (Chris Snow, Lutz Lampe, and Robert Schoberg) -- Chapter 12 Distributed Solution for Resource Allocation in Ultra-Wideband Wireless PANs (Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, and Xuemin (Sherman) Shen) -- PART IV IEEE 802.15.4 AND 802.15.5 WIRELESS PANs -- Chapter 13 IEEE 802.15.4 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Ming Li, and Fei Hu) -- Chapter 14 Performance Analysis for IEEE 802.15.4 Wireless Personal Area Networks (Hsueh-Wen Tseng, Yu-Kai Huang, and Ai-Chun Pang) -- Chapter 15 Data Transmission and Beacon Scheduling in Low Rate Wireless Mesh Personal Area Networks (Jianliang Zheng).
Chapter 16 Impact of Reliable and Secure Sensing on Cluster Lifetime in IEEE 802.15.4 Networks (Jelena Misic) -- Chapter 17 IEEE 802.15.5: Recommended Practice for WPAN Mesh Network (Low Data Rate) (Chunhui Zhu and Myung J. Lee) -- Chapter 18 Power-Saving Algorithms on IEEE 802.15.4 for Wireless Sensor Networks (Tae Rim Park and Myung J. Lee) -- PART V IEEE 802.16 WIRELESS MANs -- Chapter 19 IEEE 802.16 Medium Access Control and Physical Layers (Yang Xiao, Michael J. Plyler, Tianji Li, and Fei Hu) -- Chapter 20 QoS Support for WiMAX (Usman A. Ali, Qiang Ni, Yang Xiao, Wenbing Yao, and Dionysios Skordoulis) -- Chapter 21 Subchannel Allocation and Connection Admission Control in OFDMA-Based IEEE 802.16/WiMAX-Compliant Infrastructure Wireless Mesh Networks (Dusit Niyato and Ekram Hossain) -- Chapter 22 Universal Authentication and Billing Architecture for Wireless MANs (Xiaodong Lin, Haojin Zhu, Minghui Shi, Rongxing Lu, Pin-Han Ho, and Xuemin (Sherman) Shen) -- Chapter 23 Scheduling Algorithms for WiMAX Networks: Simulator Development and Performance Study (Sai Suhas Kolukula, M. Sai Rupak, K. S. Sridharan, and Krishna M. Sivalingam) -- INDEX -- ABOUT THE EDITORS.
Record Nr. UNINA-9910877808303321
Hoboken, N.J., : Wiley, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910465694603321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910791821503321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From problem toward solution : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- FROM PROBLEM TOWARD SOLUTION:WIRELESS SENSOR NETWORKSSECURITY -- Distributed, Cluster and Grid Computing -- FROM PROBLEM TOWARD SOLUTION:WIRELESS SENSOR NETWORKSSECURITY -- CONTENTS -- PREFACE -- PART 1.ATTACKS AND COUNTERMEASURES -- PRESERVING DATA AUTHENTICITY IN WIRELESSSENSOR NETWORKS: ATTACKS ANDCOUNTERMEASURES -- Abstract -- 1. Introduction -- 2. Models and Approaches -- 2.1. System Model -- 2.2. Threat Model -- 2.3. Solution Approaches -- 3. Passive Approaches -- 3.1. Secure Report Generation -- 3.2. Filtering with Uniform Key Sharing -- 3.3. Filtering with Route-specific Key Sharing -- 3.3.1. Interleaved Hop-by-hop Authentication -- 3.3.2. Other Solutions with Route-specific Key Sharing -- 3.4. Filtering with Location-based Key Sharing -- 3.4.1. Location-Based Resilient Security -- 3.4.2. Location-aware End-to-End Data Security -- 4. Proactive Approaches -- 4.1. Group Re-keying -- 4.2. Packet Traceback -- 4.3. Correlation among Data Content -- 4.3.1. Correlation Analysis and Modified t-test -- 5. Conclusion -- References -- LOCATION TRACKING ATTACK IN AD HOCNETWORKS BASED ON TOPOLOGY INFORMATION -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Localization Using Geometric Constraints -- 3.1. Constraint Solving Definitions -- 3.2. The Localization Algorithm -- 3.2.1. Phase 1-Deterministic Constraint Solving -- 3.2.2. Phase 2-Constraint Relaxation and Heuristic Improvements -- 3.3. Experimental Results -- 4. Localization Using DSR Protocol Information -- 4.1. Dynamic Source Routing -- 4.2. Scenario and Assumptions -- 4.3. Localization Approach -- 4.3.1. "Hop to Route Length Ratio" (HL) Heuristics -- 4.3.2. Derivation of Node Distribution along the Route from the HL Metric -- 4.3.3. Probability Based Position Estimation -- 4.4. Analysis -- 5. Conclusion -- Acknowledgement -- References.
PREVENTION OF DOS ATTACK IN SENSORNETWORKS USING REPEATED GAME THEORY -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Game Formulation of the Proposed Protocol -- 3.1. Equilibrium -- 3.2. Payoff and Reputation -- 3.3. Protocol Description -- 4. Performance Evaluation -- 4.1. Metrics -- 4.2. Implementation -- References -- IMPACT OF PACKET INJECTION MODELSON MISBEHAVIOR DETECTION PERFORMANCEIN WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Wireless Ad-Hoc Networks and the Concept of Misbehavior -- 1.2. Overview on Misbehavior in Wireless Ad-Hoc Networks -- 1.3. Intrusion Detection Systems - Detecting Misbehavior -- 1.4. Human Immune System - Inspiration for AIS -- 1.4.1. Adaptive Immune System -- 1.4.2. Innate Immune System -- 1.5. Translating Features of the HIS to AIS -- 2. Packet Injection Experiment - Problem Statement -- 2.1. Experimental Setup -- 2.2. Scenario Description -- 2.3. Network Topology -- 2.4. Node Misbehavior -- 2.5. Artificial Immune System - Details -- 3. Packet Injection Experiment - Results -- 4. AIS in Ad-Hoc Networks - RelatedWork -- 5. Conclusions and FutureWork -- Acknowledgments -- References -- PART 2.SECURED ROUTING AND LOCALIZATION -- SECURITY AWARE ROUTING IN HIERARCHICALOPTICAL SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Motivation for Directional Optical Sensor Networks and Challenges -- 2. RelatedWork -- 3. Cluster-Based Directional Sensor Networks -- 3.1. Assumptions and Security Threat Model -- 4. The Security-Aware Base Station Circuit-Based Routing forCluster-based DOSN -- 4.1. Secure Neighborhood Discovery Protocol -- 5. Security Analysis -- 5.1. Per Hop Authentication and Alteration of Routing Beacons -- 5.2. Broadcast Authentication and Spoofed Routing Beacons -- 5.3. Beacon Freshness -- 6. Conclusion -- References -- SECURE MULTI-PATH DATA DELIVERY IN SENSORNETWORKS.
Abstract -- 1. Introduction -- 2. System Models -- 2.1. Network Model -- 2.2. Attack Model -- 3. Node-disjoint Multi-path Encoding/Decoding -- 3.1. Multi-path Source Routing Encoding -- 3.2. Multi-path Data Encoding -- 3.3. Multi-path Data Decoding -- 3.4. Communication Overhead -- 4. Path Selection -- 4.1. v(≥ 3)-node-disjoint Shortest Paths -- 4.2. Path Rating Algorithm -- 4.3. Path Selection Algorithm -- 5. Robustness Analysis -- 5.1. General Evaluation Formulas -- 5.2. Uniform Block Allocation and Uniform Success Probability Distribution -- 5.3. Evaluate Success Probability for Multi-path Routing -- 6. Conclusion -- Appendices -- A. Encoding of Reed-Solomon Codes -- B. Decoding of Reed-Solomon Codes -- C. Proof of (21) -- References -- SELOC: SECURE LOCALIZATION FOR WIRELESSSENSOR AND ACTOR NETWORK -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Network Model -- 3.1. Attack Models -- 3.2. Features of Secure Localization -- 4. SeLoc Secure Scheme -- 4.1. Brief Review of SeLoc Scheme -- 4.2. SeLoc Scheme -- 4.3. Location Verification -- 5. Security Analysis -- 5.1. Robustness -- 5.2. Sensitivity of SeLoc Scheme -- 6. Conclusion -- References -- PART 3.CRYPTOGRAPHY AND ENCRYPTION -- SECURITY IN WIRELESS SENSOR NETWORKS:A FORMAL APPROACH∗ -- Abstract -- 1. Introduction -- 2. Model Checking for the Analysis of Security Protocols -- 3. Sensor Network Encryption Protocol: SNEP -- 4. Verification of SNEP -- 5. RelatedWork -- Security Network Protocols -- Simulators of Sensor Networks -- Analysis with Model Checking Techniques -- 6. Conclusion -- References -- C4W: AN ENERGY EFFICIENT PUBLIC KEYCRYPTOSYSTEM FOR LARGE-SCALE WIRELESSSENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Related Work -- 1.2. Contributions -- 2. Combined Public Key Scheme for Wireless Sensor Networks -- 2.1. Basic Scheme -- 2.2. Security-Enhanced Scheme (SES).
2.3. Protocol -- 3. Analysis -- 3.1. Security -- 3.2. Energy -- 4. Conclusion -- References -- ENERGY CONSUMPTION OF SECURITY ALGORITHMSIN WIRELESS SENSOR NODES -- Abstract -- 1. Introduction -- 2. Cryptographic Algorithms for WSN Nodes -- 2.1. New Method for Reorganization of Cryptographic Algorithms -- 2.2. Related Work -- 2.3. Verification of Results -- 3. Measurement of Energy Consumption for Security -- 3.1. Tradeoff between Security and Energy Consumption -- 3.2. Related Work -- 3.3. Measurement Techniques -- 3.4. Energy Consumption without Security -- 3.4.1. Measurements for CrossBow Nodes -- 3.4.2. Measurements for Ember Nodes -- 3.5. Energy Consumption for Security -- 3.5.1. Energy Consumption for Security in CrossBow Nodes -- 3.5.2. Energy Consumption for Security in Ember Nodes -- 3.5.3. Comparisons of CrossBow & -- Ember Nodes -- 4. Assessment of Life-Time Energy Consumption -- 4.1. Life Time Energy Consumption -- 4.2. Energy Measurements and Profile Analyzer -- 4.2.1. Operational Circuit -- 4.2.2. Measurement Record Program -- 4.2.3. E-Analyzer: Energy Profile Analyzer -- 4.3. Case Study: Security Algorithms in CrossBow MICA2 Nodes -- 5. Guidelines to Apply Security into WSN -- 6. Conclusions -- References -- PART 4.KEY PRE-DISTRIBUTION AND REVOCATION -- DETERMINISTIC AND RANDOMIZED KEYPRE-DISTRIBUTION SCHEMES FOR MOBILEAD-HOC NETWORKS: FOUNDATIONS ANDEXAMPLE CONSTRUCTIONS∗ -- Abstract -- 1. Introduction -- 2. General Considerations for Key Management Schemes -- 3. Techniques -- 3.1. Random Graph Based -- 4. Set System Based -- 4.0.1. Constrained Intersection Matrices -- 4.0.2. The BBR Polynomials -- 5. RandomWalk Based -- 5.1. Approximating the Evolution of Stochastic Processes -- 5.2. Gradual Increase of the Bit-Correlation -- 5.3. The General k-place Elimination Protocol -- 5.4. Assessment of the Elimination Protocol.
6. Probabilistic Technique Based -- 7. Conclusions -- References -- ARPD: ASYNCHRONOUS RANDOM KEYPREDISTRIBUTION IN THE LEAP FRAMEWORKFOR WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 2. RelatedWork -- 2.1. Pairwise Key Establishment in LEAP -- 2.1.1. LEAP Security -- 2.2. Random Pairwise Key Predistribution -- 3. ARPD for Node Additions -- 4. Performance Analysis -- 4.1. Section Notation and Assumptions -- 4.2. Probability of Connectivity -- 4.2.1. Key Reuse -- 4.2.2. Choice of Reuse Factor -- 5. Security Analysis -- 5.1. A Security Threat Model for WSNs -- 5.2. Outside Attacks -- 5.3. Inside Attacks -- 6. Conclusions -- References -- SECURE k-CONNECTIVITY PROPERTIESOF WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 2. The Reference Model -- 3. k-Connectivity of Kryptographs -- 3.1. Survivor Function Pr{connectivity ≥ k} -- 3.2. Expected Connectivity -- 4. Simulation Results -- 5. RelatedWork -- 6. Conclusion -- References -- GATEWAY SUBSET DIFFERENCE REVOCATION -- Abstract -- 1. Introduction -- 2. Subset Difference Revocation -- 3. Gateway Subset Difference Revocation -- 4. Evaluation -- 4.1. Security -- 4.2. Memory -- 4.3. Processing Load -- 5. Related Work -- 6. Conclusion -- References -- PART 5.KEY EXCHANGE AND ACCESS CONTROL -- AUTHENTICATED KEY EXCHANGE WITH GROUPSUPPORT FOR WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Node-Compromise Attacker Model -- 1.2. Secure Link Communication -- 1.2.1. Random Key Pre-distribution -- 1.2.2. Pairwise Key Pre-distribution -- 1.3. Seed-Based Pre-distribution -- 1.3.1. Selective Node Capture Attack -- 1.3.2. Hypercube Pre-distribution -- 2. Group Supported Key Exchange -- 2.1. Authenticated Key Exchange with Group Support -- 2.2. Probabilistic Authentication -- 2.2.1. Probabilistic Authentication with Majority Decision.
2.3. Evaluation of the Communication and Computation Overhead.
Record Nr. UNINA-9910815886303321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Knowledge discovery in bioinformatics [[electronic resource] ] : techniques, methods, and applications / / edited by Xiaohua Hu, Yi Pan
Knowledge discovery in bioinformatics [[electronic resource] ] : techniques, methods, and applications / / edited by Xiaohua Hu, Yi Pan
Pubbl/distr/stampa Hoboken, N.J., : Wiley-Interscience, c2007
Descrizione fisica 1 online resource (405 p.)
Disciplina 570.285
570/.285
572.80285
Altri autori (Persone) HuXiaohua <1960->
PanYi <1960->
Collana Wiley Series in Bioinformatics
Soggetto topico Bioinformatics
Computational biology
Soggetto genere / forma Electronic books.
ISBN 1-280-90018-0
9786610900183
0-470-12464-4
0-470-12463-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto KNOWLEDGE DISCOVERY IN BIOINFORMATICS; CONTENTS; Contributors; Preface; 1 Current Methods for Protein Secondary-Structure Prediction Based on Support Vector Machines; 1.1 Traditional Methods; 1.1.1 Statistical Approaches; 1.1.2 Machine Learning Approaches; 1.2 Support Vector Machine Method; 1.2.1 Introduction to SVM; 1.2.2 Encoding Profile; 1.2.3 Kernel Functions; 1.2.4 Tertiary Classifier Design; 1.2.5 Accuracy Measure of SVM; 1.3 Performance Comparison of SVM Methods; 1.4 Discussion and Conclusions; References; 2 Comparison of Seven Methods for Mining Hidden Links
2.1 Analysis of the Literature on Raynaud's Disease2.2 Related Work; 2.3 Methods; 2.3.1 Information Measures; 2.3.2 Ranking Methods; 2.3.3 Seven Methods; 2.4 Experiment Results and Analysis; 2.4.1 Data Set; 2.4.2 Chi-Square, Chi-Square Association Rule, and Mutual Information Link ABC Methods Compared; 2.4.3 Chi-Square ABC Method: Semantic Check for Mining Implicit Connections; 2.4.4 Chi-Square and Mutual Information Link ABC Methods; 2.5 Discussion and Conclusions; Acknowledgments; References; 3 Voting Scheme-Based Evolutionary Kernel Machines for Drug Activity Comparisons
3.1 Granular Kernel and Kernel Tree Design3.1.1 Definitions; 3.1.2 Granular Kernel Properties; 3.2 GKTSESs; 3.3 Evolutionary Voting Kernel Machines; 3.4 Simulations; 3.4.1 Data Set and Experimental Setup; 3.4.2 Experimental Results and Comparisons; 3.5 Conclusions and Future Work; Acknowledgments; References; 4 Bioinformatics Analyses of Arabidopsis thaliana Tiling Array Expression Data; 4.1 Tiling Array Design and Data Description; 4.1.1 Data; 4.1.2 Tiling Array Expression Patterns; 4.1.3 Tiling Array Data Analysis; 4.2 Ontology Analyses; 4.3 Antisense Regulation Identification
4.3.1 Antisense Silencing4.3.2 Antisense Regulation Identification; 4.4 Correlated Expression Between Two DNA Strands; 4.5 Identification of Nonprotein Coding mRNA; 4.6 Summary; Acknowledgments; References; 5 Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification; 5.1 Feature Selection; 5.1.1 Taxonomy of Feature Selection; 5.1.2 Evaluation Criterion; 5.1.3 Generation Procedure; 5.2 Gene Selection; 5.2.1 Individual Gene Ranking; 5.2.2 Gene Subset Selection; 5.2.3 Summary of Gene Selection; 5.3 Comparative Study of Gene Selection Methods
5.3.1 Microarray Data Descriptions5.3.2 Gene Selection Approaches; 5.3.3 Experimental Results; 5.4 Conclusions and Discussion; Acknowledgments; References; 6 Patient Survival Prediction from Gene Expression Data; 6.1 General Methods; 6.1.1 Kaplan-Meier Survival Analysis; 6.1.2 Cox Proportional-Hazards Regression; 6.2 Applications; 6.2.1 Diffuse Large-B-Cell Lymphoma; 6.2.2 Lung Adenocarcinoma; 6.2.3 Remarks; 6.3 Incorporating Data Mining Techniques to Survival Prediction; 6.3.1 Gene Selection by Statistical Properties; 6.3.2 Cancer Subtype Identification via Survival Information
6.4 Selection of Extreme Patient Samples
Record Nr. UNINA-9910143415403321
Hoboken, N.J., : Wiley-Interscience, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui