| TÃtulo : |
Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Chellappan, Sriram, ; Cheng, Wei, ; Li, Wei, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2018 |
| Número de páginas: |
XVIII, 910 p. 398 ilustraciones |
| ISBN/ISSN/DL: |
978-3-319-94268-1 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Algoritmos Red de computadoras Software de la aplicacion Protección de datos Inteligencia artificial Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Seguridad de datos e información |
| Ãndice Dewey: |
518.1 |
| Resumen: |
Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Algoritmos, Sistemas y Aplicaciones Inalámbricas, WASA 2018, celebrada en Tianjin, China, en junio de 2018. Los 59 artÃculos completos y 18 artÃculos breves presentados en este libro fueron cuidadosamente revisados ​​y seleccionados de 197 presentaciones. Los artÃculos cubren diversos temas como redes de radio cognitivas; sensor de redes inalámbricas; sistemas ciberfÃsicos; diseño y análisis de algoritmos distribuidos y localizados; teorÃa de la información y codificación para redes inalámbricas; localización; computación en la nube móvil; control y cobertura de topologÃa; seguridad y privacidad; redes submarinas y subterráneas; redes vehiculares; Internet de las Cosas; procesamiento de información y gestión de datos; interfaces de servicio programables; algoritmos de eficiencia energética; diseño de sistemas y protocolos; soporte de sistema operativo y middleware; y bancos de pruebas experimentales, modelos y estudios de casos. |
| Nota de contenido: |
Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- AnEfficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding basedon Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings [documento electrónico] / Chellappan, Sriram, ; Cheng, Wei, ; Li, Wei, . - 1 ed. . - [s.l.] : Springer, 2018 . - XVIII, 910 p. 398 ilustraciones. ISBN : 978-3-319-94268-1 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Algoritmos Red de computadoras Software de la aplicacion Protección de datos Inteligencia artificial Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Seguridad de datos e información |
| Ãndice Dewey: |
518.1 |
| Resumen: |
Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Algoritmos, Sistemas y Aplicaciones Inalámbricas, WASA 2018, celebrada en Tianjin, China, en junio de 2018. Los 59 artÃculos completos y 18 artÃculos breves presentados en este libro fueron cuidadosamente revisados ​​y seleccionados de 197 presentaciones. Los artÃculos cubren diversos temas como redes de radio cognitivas; sensor de redes inalámbricas; sistemas ciberfÃsicos; diseño y análisis de algoritmos distribuidos y localizados; teorÃa de la información y codificación para redes inalámbricas; localización; computación en la nube móvil; control y cobertura de topologÃa; seguridad y privacidad; redes submarinas y subterráneas; redes vehiculares; Internet de las Cosas; procesamiento de información y gestión de datos; interfaces de servicio programables; algoritmos de eficiencia energética; diseño de sistemas y protocolos; soporte de sistema operativo y middleware; y bancos de pruebas experimentales, modelos y estudios de casos. |
| Nota de contenido: |
Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- AnEfficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding basedon Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |