語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireless Algorithms, Systems, and Ap...
~
Yu, Jiguo.
Wireless Algorithms, Systems, and Applications = 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Wireless Algorithms, Systems, and Applications/ edited by Dongxiao Yu, Falko Dressler, Jiguo Yu.
其他題名:
15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
其他作者:
Yu, Jiguo.
面頁冊數:
XVIII, 838 p. 332 illus., 257 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Information Systems Applications (incl. Internet). -
電子資源:
https://doi.org/10.1007/978-3-030-59016-1
ISBN:
9783030590161
Wireless Algorithms, Systems, and Applications = 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
Wireless Algorithms, Systems, and Applications
15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /[electronic resource] :edited by Dongxiao Yu, Falko Dressler, Jiguo Yu. - 1st ed. 2020. - XVIII, 838 p. 332 illus., 257 illus. in color.online resource. - Theoretical Computer Science and General Issues ;12384. - Theoretical Computer Science and General Issues ;9163.
Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks.
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. These submissions cover many hot research topics, including machine-learning algorithms for wireless systems and applications, Internet of Things (IoTs) and related wireless solutions, wireless networking for cyber-physical systems (CPSs), security and privacy solutions for wireless applications, blockchain solutions for mobile applications, mobile edge computing, wireless sensor networks, distributed and localized algorithm design and analysis, wireless crowdsourcing, mobile cloud computing, vehicular networks, wireless solutions for smart cities, wireless algorithms for smart grids, mobile social networks, mobile system security, storage systems for mobile applications, etc.
ISBN: 9783030590161
Standard No.: 10.1007/978-3-030-59016-1doiSubjects--Topical Terms:
881699
Information Systems Applications (incl. Internet).
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Wireless Algorithms, Systems, and Applications = 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
LDR
:08071nam a22004095i 4500
001
1028412
003
DE-He213
005
20200909185650.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030590161
$9
978-3-030-59016-1
024
7
$a
10.1007/978-3-030-59016-1
$2
doi
035
$a
978-3-030-59016-1
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
Wireless Algorithms, Systems, and Applications
$h
[electronic resource] :
$b
15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I /
$c
edited by Dongxiao Yu, Falko Dressler, Jiguo Yu.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVIII, 838 p. 332 illus., 257 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Theoretical Computer Science and General Issues ;
$v
12384
505
0
$a
Full Papers -- Reinforcement Learning based Group Event Invitation Algorithm -- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness -- Maximizing The Expected In uence in Face of The Non-Progressive Adversary -- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain -- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System -- A Novel Blockchain Network Structure Based on Logical Nodes -- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks -- Learning-Aided Mobile Charging for Rechargeable Sensor Networks -- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications -- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing -- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union -- Approximation Algorithm for the Offloading Problem in Edge Computing -- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning -- Camera Style Guided Feature Generation for Person Re-Identification -- Sync or Fork: Node-Level Synchronization Analysis of Blockchain -- Multi-user Cooperative Computation Offloading in Mobile Edge Computing -- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER -- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System -- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation -- Multiset Synchronization with Counting Cuckoo Filters -- Privacy-Aware Online Task Offloading for Mobile-Edge Computing -- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition -- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks -- Optimizing Motion Estimation With an ReRAM-based PIM Architecture -- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices Based on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks.
520
$a
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. These submissions cover many hot research topics, including machine-learning algorithms for wireless systems and applications, Internet of Things (IoTs) and related wireless solutions, wireless networking for cyber-physical systems (CPSs), security and privacy solutions for wireless applications, blockchain solutions for mobile applications, mobile edge computing, wireless sensor networks, distributed and localized algorithm design and analysis, wireless crowdsourcing, mobile cloud computing, vehicular networks, wireless solutions for smart cities, wireless algorithms for smart grids, mobile social networks, mobile system security, storage systems for mobile applications, etc.
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
669833
650
2 4
$a
Security.
$3
1114130
650
2 4
$a
Computing Milieux.
$3
669921
650
1 4
$a
Computer Communication Networks.
$3
669310
650
0
$a
Application software.
$3
528147
650
0
$a
Special purpose computers.
$3
1204562
650
0
$a
Data protection.
$3
557764
650
0
$a
Computers.
$3
565115
650
0
$a
Computer communication systems.
$3
1115394
700
1
$a
Yu, Jiguo.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1322572
700
1
$a
Dressler, Falko.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
588809
700
1
$a
Yu, Dongxiao.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1322571
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030590154
776
0 8
$i
Printed edition:
$z
9783030590178
830
0
$a
Theoretical Computer Science and General Issues ;
$v
9163
$3
1253524
856
4 0
$u
https://doi.org/10.1007/978-3-030-59016-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入