Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings /: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings /: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings. (2018)
- Main Title:
- Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
- Further Information:
- Note: Sriram Chellappan, Wei Cheng, Wei Li.
- Editors:
- Chellappan, Sriram
Cheng, Wei
Li, Wei - Contents:
- Hypergraph Based Radio Resource Management in 5G Fog Cell.- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism.- Interest-aware next POI Recommendation for Mobile Social Networks.- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs.- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval.- An Open Security-enhanced Compatible OpenFlow Platform.- Hop-constrained Relay Node Placement in Wireless Sensor Networks.- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications.- Delay-constraint Throughput Maximization in UAV-assisted VANETs.- Smart Device Fingerprinting based on Webpage Loading.- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain.- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality.- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder.- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System.- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation.- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data.-Hypergraph Based Radio Resource Management in 5G Fog Cell.- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism.- Interest-aware next POI Recommendation for Mobile Social Networks.- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs.- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval.- An Open Security-enhanced Compatible OpenFlow Platform.- Hop-constrained Relay Node Placement in Wireless Sensor Networks.- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications.- Delay-constraint Throughput Maximization in UAV-assisted VANETs.- Smart Device Fingerprinting based on Webpage Loading.- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain.- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality.- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder.- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System.- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation.- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data.- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data.- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks.- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model.- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments.- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques.- Massive MIMO Power Allocation in Millimeter Wave Networks.- A detection-resistant covert timing channel based on Geometric Huffman Coding.- Spark: A Smart Parking Lot Monitoring System.- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection.- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users.- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning.- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation.- Household Electrical Load Scheduling Algorithms with Renewable Energy.- An Empirical Study of OAuth-based SSO System on Web.- Turning Legacy IR Devices into Smart IoT Devices.- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy.- Data Uploading Mechanism for Internet of Things with Energy Harvesting.- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference.- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines.- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination.- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks.- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks.- Privacy-preserving Personal Sensitive Data in Crowdsourcing.- A First Step Towards Combating Fake News Over Online Social Media.- Predicting Smartphone App Usage with Recurrent Neural Networks.- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games.- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network.- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks.- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings.- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing.- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation.- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks.- Localization of Thyroid Nodules in Ultrasonic Images.- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices.- An Information Classification Collection Protocol for Large-scale RFID Systems.- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks.- On Association Study of Scalp EEG Data Channels Under Different Circumstances.- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain.- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network.- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query.- KrackCover: A Wireless Security Framework for Covering KRACK Attacks.- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network.- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays.- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks.- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing.- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET.- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way.- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems.- A Novel Capability-Aware SIC-based Protocol for Wireless Networks.- A Supervised Learning Approach to Link Prediction in Dynamic Networks.- Mining Mobile Users' Interests through Cellular Network Browsing Profiles.- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System.- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers.- Network Control for Large-Scale Container Clusters.- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks.- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals.- A Recognition Approach for the Groups with Interactions.- Security Enhancement of Over-the-Air Update for Connected Vehicles.- Resilient SDN-based Communication in Vehicular Network.- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check.- Understanding Data Breach: A Visualization Aspect.- A Novel Recommendation-based Trust Inference Model for MANETs. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Copyright Date:
- 2018
- Extent:
- 1 online resource (910 pages)
- Subjects:
- Computer science
Computers -- Hardware -- Network Hardware
Computers -- Information Technology
Computers -- Security -- General
Computers -- Intelligence (AI) & Semantics
Network hardware
Information retrieval
Computer security
Artificial intelligence
Computer software
Computer Communication Networks
Computer security
Artificial intelligence
Computers -- Programming -- Algorithms
Algorithms & data structures - Languages:
- English
- ISBNs:
- 9783319942681
- Related ISBNs:
- 9783319942674
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.358910
- Ingest File:
- 01_320.xml