Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.) |
Disciplina | 621.384 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59016-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks. |
Record Nr. | UNISA-996418312703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.) |
Disciplina | 004.6 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59019-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. . |
Record Nr. | UNISA-996418320003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part II / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 134 p. 57 illus., 45 illus. in color.) |
Disciplina |
004.6
621.38456 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59019-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Short Papers -- Cluster-based Routine Basic Safety Message dissemination in VANETs -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- Estimation of Short-term Online Taxi Travel Time Based on Neural Network -- Research on Algorithms for Finding Top-k Nodes in Campus Collaborative Learning Community under Mobile Social Network -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- Virtual Location Generation for Location Privacy Protection in VANET -- Reliable Visible Light-Based Underground Positioning Algorithm Utilizing a New Mechanism: Reverse Transceiver Position -- Research on 5G Internet of Vehicles Facilities based on Coherent Beamforming -- LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs -- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs -- The Throughput Optimization for Multi-hop MIMO Networks Based on Joint IA and SIC -- A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems 100 -- C-DAG: Community-assisted DAG Mechanism with High throughput and Eventual Consistency -- Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor box. . |
Record Nr. | UNINA-9910427716603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications : 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I / / edited by Dongxiao Yu, Falko Dressler, Jiguo Yu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVIII, 838 p. 332 illus., 257 illus. in color.) |
Disciplina | 621.384 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers Data protection Computers, Special purpose Application software Computer Communication Networks Computing Milieux Data and Information Security Special Purpose and Application-Based Systems Computer and Information Systems Applications |
ISBN | 3-030-59016-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks. |
Record Nr. | UNINA-9910427716703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|