Ubiquitous networking : third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers /: third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers. (2017)
- Record Type:
- Book
- Title:
- Ubiquitous networking : third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers /: third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers. (2017)
- Main Title:
- Ubiquitous networking : third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers
- Other Titles:
- UNet 2017
- Further Information:
- Note: Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbah (eds.).
- Editors:
- Sabir, Essaid
García Armada, Ana
Ghogho, Mounir
Debbah, Merouane, 1975- - Other Names:
- UNet (Symposium), 3rd
- Contents:
- Context-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization -- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of HomomorphicContext-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization -- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing -- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage -- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model -- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation -- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs -- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship -- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid -- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID -- Group Authentication with Fault Tolerance for Internet of Things -- Fully Distributed Indexing over a Distributed Hash Table -- IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System -- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks -- Adopting Fuzzy Technique to Save Energy in Smart Home Control System -- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks -- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol -- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications -- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach -- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment -- Toward a new extension of IPv6 addressing to connect non IP objects -- Enablers, Challenges and Applications -- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems -- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link -- Robust Trajectory Planning for Robotic Communications under Fading Channels -- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel -- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS -- Implementation and Performance Evaluation of Network Intrusion Detection Systems -- An Efficient Authentication Protocol for 5G Heterogeneous Networks -- An Agreement graph-based-authentication scheme for 5G networks -- Green Base Station Placement for Microwave Backhaul Links -- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems -- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems -- An Improved Bernoulli Sensing Matrix For Compressive Sensing -- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix -- Adaptive Mapping for Multiple Applications on Parallel Architectures -- Verification of SystemC Components using the Method of Deduction -- Image Segmentation by Deep Community Detection Approach -- Data Mining Approaches for Alzheimer's Disease Diagnosis -- Image Search Engine based on Color Histogram and Zernike Moment -- Risk Assessment and Alert Prioritization for Intrusion Detection Systems. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xxv, 659 pages), illustrations
- Subjects:
- 004
Computer science
Ubiquitous computing -- Congresses
Computer networks -- Congresses
Computer networks
Ubiquitous computing
Computers -- Security -- General
Computers -- Information Technology
Computers -- Electronic Commerce
Computers -- Intelligence (AI) & Semantics
Computer security
Information retrieval
Business applications
Coding theory & cryptology
Artificial intelligence
Computer Communication Networks
Computer security
Data encryption (Computer science)
Artificial intelligence
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319681795
3319681796 - Related ISBNs:
- 9783319681788
3319681788 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed November 20, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366564
- Ingest File:
- 01_343.xml