Wireless Algorithms, Systems, and Applications

Wireless Algorithms, Systems, and Applications

13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings

Li, Wei; Cheng, Wei; Chellappan, Sriram

Springer International Publishing AG

06/2018

910

Mole

Inglês

9783319942674

15 a 20 dias

1395

Descrição não disponível.
Hypergraph Based Radio Resource Management in 5G Fog Cell.- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism.- Interest-aware next POI Recommendation for Mobile Social Networks.- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs.- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval.- An Open Security-enhanced Compatible OpenFlow Platform.- Hop-constrained Relay Node Placement in Wireless Sensor Networks.- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications.- Delay-constraint Throughput Maximization in UAV-assisted VANETs.- Smart Device Fingerprinting based on Webpage Loading.- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain.- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality.- AnEfficient Privacy-Preserving Data Aggregation Scheme for IoT.- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder.- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System.- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation.- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data.- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data.- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks.- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model.- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments.- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques.- Massive MIMO Power Allocation in Millimeter Wave Networks.- A detection-resistant covert timing channel based on Geometric Huffman Coding.- Spark: A Smart Parking Lot Monitoring System.- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection.- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users.- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning.- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation.- Household Electrical Load Scheduling Algorithms with Renewable Energy.- An Empirical Study of OAuth-based SSO System on Web.- Turning Legacy IR Devices into Smart IoT Devices.- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy.- Data Uploading Mechanism for Internet of Things with Energy Harvesting.- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference.- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines.- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination.- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks.- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks.- Privacy-preserving Personal Sensitive Data in Crowdsourcing.- A First Step Towards Combating Fake News Over Online Social Media.- Predicting Smartphone App Usage with Recurrent Neural Networks.- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games.- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network.- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks.- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings.- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing.- HEVC Lossless Compression Coding basedon Hadamard Buttery Transformation.- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks.- Localization of Thyroid Nodules in Ultrasonic Images.- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices.- An Information Classification Collection Protocol for Large-scale RFID Systems.- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks.- On Association Study of Scalp EEG Data Channels Under Different Circumstances.- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain.- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network.- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query.- KrackCover: A Wireless Security Framework for Covering KRACK Attacks.- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network.- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays.- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks.- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing.- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET.- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way.- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems.- A Novel Capability-Aware SIC-based Protocol for Wireless Networks.- A Supervised Learning Approach to Link Prediction in Dynamic Networks.- Mining Mobile Users' Interests through Cellular Network Browsing Profiles.- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System.- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers.- Network Control for Large-Scale Container Clusters.- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks.- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals.- A Recognition Approach for the Groups with Interactions.- Security Enhancement of Over-the-Air Update for Connected Vehicles.- Resilient SDN-based Communication in Vehicular Network.- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check.- Understanding Data Breach: A Visualization Aspect.- A Novel Recommendation-based Trust Inference Model for MANETs.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;authentication;cloud computing;computer networks;data mining;data path algorithms;data security;energy efficiency;mobile computing;network protocol design;network security;privacy;Quality of Service (QoS);radio;routers;sensor nodes;signal processing;user interfaces;wireless sensor networks;wireless telecommunication systems