語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireless Algorithms, Systems, and Ap...
~
Biagioni, Edoardo S.
Wireless Algorithms, Systems, and Applications = 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Wireless Algorithms, Systems, and Applications/ edited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng.
其他題名:
14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
其他作者:
Biagioni, Edoardo S.
面頁冊數:
XV, 649 p. 276 illus., 195 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer communication systems. -
電子資源:
https://doi.org/10.1007/978-3-030-23597-0
ISBN:
9783030235970
Wireless Algorithms, Systems, and Applications = 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
Wireless Algorithms, Systems, and Applications
14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /[electronic resource] :edited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng. - 1st ed. 2019. - XV, 649 p. 276 illus., 195 illus. in color.online resource. - Theoretical Computer Science and General Issues ;11604. - Theoretical Computer Science and General Issues ;9163.
Full Paper -- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems -- Model based Adaptive Data Acquisition for Internet of Things -- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System -- Automated and Personalized Privacy Policy Extraction under GDPR Consideration -- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks -- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs -- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing -- Massive MIMO Cognitive Cooperative Relaying -- Minimum Control Cost of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model -- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance -- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access -- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage -- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking -- Spatiotemporal Feature Extraction for Pedestrian Re-identification -- Detecting Android Side Channel Probing Attacks Based on System States -- Online DAG Scheduling with On-demand Function Configuration in Edge Computing -- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer -- Self-attention Based Collaborative Neural Network For Recommendation -- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage -- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy -- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee -- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements -- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient -- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing -- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System -- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids -- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction -- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain -- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM -- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation -- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring -- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions -- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints -- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks -- Building Trustful Crowdsensing Service on the Edge -- User Identity De-Anonymization Based on Attributes -- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks -- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation -- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation -- A Hybrid Approach for Recognizing Web Crawlers -- Contextual Combinatorial Cascading Thompson Sampling -- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory -- Short Paper -- Utility Aware Task Offloading for Mobile Edge Computing -- Analysis of Best Network Routing Structure for IoT -- Parallel Multicast Information Propagation Based on Social Influence -- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications -- Optimal Routing of tight optimal Bidirectional Double-loop Networks -- DDSEIR: a dynamic rumor spreading model in online social networks -- Data Forwarding and Caching Strategy for RSU Aided V-NDN -- Lightweight IoT Malware Visualization Analysis via Two-Bits Networks -- Privacy Protection Sensing Data Aggregation for Crowd Sensing -- A new outsourced data deletion scheme with public verifiability -- DPSR: A Differentially Private Social Recommender System for Mobile Users. .
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks. .
ISBN: 9783030235970
Standard No.: 10.1007/978-3-030-23597-0doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Wireless Algorithms, Systems, and Applications = 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
LDR
:06541nam a22004095i 4500
001
1006731
003
DE-He213
005
20200707021728.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030235970
$9
978-3-030-23597-0
024
7
$a
10.1007/978-3-030-23597-0
$2
doi
035
$a
978-3-030-23597-0
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
Wireless Algorithms, Systems, and Applications
$h
[electronic resource] :
$b
14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings /
$c
edited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XV, 649 p. 276 illus., 195 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Theoretical Computer Science and General Issues ;
$v
11604
505
0
$a
Full Paper -- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems -- Model based Adaptive Data Acquisition for Internet of Things -- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System -- Automated and Personalized Privacy Policy Extraction under GDPR Consideration -- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks -- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs -- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing -- Massive MIMO Cognitive Cooperative Relaying -- Minimum Control Cost of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model -- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance -- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access -- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage -- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking -- Spatiotemporal Feature Extraction for Pedestrian Re-identification -- Detecting Android Side Channel Probing Attacks Based on System States -- Online DAG Scheduling with On-demand Function Configuration in Edge Computing -- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer -- Self-attention Based Collaborative Neural Network For Recommendation -- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage -- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy -- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee -- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements -- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient -- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing -- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System -- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids -- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction -- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain -- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM -- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation -- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring -- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions -- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints -- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks -- Building Trustful Crowdsensing Service on the Edge -- User Identity De-Anonymization Based on Attributes -- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks -- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation -- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation -- A Hybrid Approach for Recognizing Web Crawlers -- Contextual Combinatorial Cascading Thompson Sampling -- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory -- Short Paper -- Utility Aware Task Offloading for Mobile Edge Computing -- Analysis of Best Network Routing Structure for IoT -- Parallel Multicast Information Propagation Based on Social Influence -- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications -- Optimal Routing of tight optimal Bidirectional Double-loop Networks -- DDSEIR: a dynamic rumor spreading model in online social networks -- Data Forwarding and Caching Strategy for RSU Aided V-NDN -- Lightweight IoT Malware Visualization Analysis via Two-Bits Networks -- Privacy Protection Sensing Data Aggregation for Crowd Sensing -- A new outsourced data deletion scheme with public verifiability -- DPSR: A Differentially Private Social Recommender System for Mobile Users. .
520
$a
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks. .
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer simulation.
$3
560190
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Simulation and Modeling.
$3
669249
700
1
$a
Biagioni, Edoardo S.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1228039
700
1
$a
Zheng, Yao.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1228040
700
1
$a
Cheng, Siyao.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1228041
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030235963
776
0 8
$i
Printed edition:
$z
9783030235987
830
0
$a
Theoretical Computer Science and General Issues ;
$v
9163
$3
1253524
856
4 0
$u
https://doi.org/10.1007/978-3-030-23597-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入