語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireless Algorithms, Systems, and Ap...
~
Wu, Fan.
Wireless Algorithms, Systems, and Applications = 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Wireless Algorithms, Systems, and Applications/ edited by Zhe Liu, Fan Wu, Sajal K. Das.
其他題名:
16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /
其他作者:
Das, Sajal K.
面頁冊數:
XVI, 601 p. 277 illus., 223 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computing Milieux. -
電子資源:
https://doi.org/10.1007/978-3-030-86137-7
ISBN:
9783030861377
Wireless Algorithms, Systems, and Applications = 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /
Wireless Algorithms, Systems, and Applications
16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /[electronic resource] :edited by Zhe Liu, Fan Wu, Sajal K. Das. - 1st ed. 2021. - XVI, 601 p. 277 illus., 223 illus. in color.online resource. - Theoretical Computer Science and General Issues ;12939. - Theoretical Computer Science and General Issues ;9163.
Event-based American Sign Language Recognition Using Dynamic Vision Sensor -- Multi-step domain adaption image classification network via attention mechanism and multi-level feature alignment.-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing: A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China. The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
ISBN: 9783030861377
Standard No.: 10.1007/978-3-030-86137-7doiSubjects--Topical Terms:
669921
Computing Milieux.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Wireless Algorithms, Systems, and Applications = 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /
LDR
:07446nam a22004095i 4500
001
1049802
003
DE-He213
005
20211209131358.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030861377
$9
978-3-030-86137-7
024
7
$a
10.1007/978-3-030-86137-7
$2
doi
035
$a
978-3-030-86137-7
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
245
1 0
$a
Wireless Algorithms, Systems, and Applications
$h
[electronic resource] :
$b
16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, Proceedings, Part III /
$c
edited by Zhe Liu, Fan Wu, Sajal K. Das.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XVI, 601 p. 277 illus., 223 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Theoretical Computer Science and General Issues ;
$v
12939
505
0
$a
Event-based American Sign Language Recognition Using Dynamic Vision Sensor -- Multi-step domain adaption image classification network via attention mechanism and multi-level feature alignment.-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing: A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.
520
$a
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China. The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Computer Communication Networks.
$3
669310
650
0
$a
Computers.
$3
565115
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
700
1
$a
Das, Sajal K.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
904977
700
1
$a
Wu, Fan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
888622
700
1
$a
Liu, Zhe.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1208197
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030861360
776
0 8
$i
Printed edition:
$z
9783030861384
830
0
$a
Theoretical Computer Science and General Issues ;
$v
9163
$3
1253524
856
4 0
$u
https://doi.org/10.1007/978-3-030-86137-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入