Wireless Algorithms, Systems, and Applications
Home > Computing and Information Technology > Computer programming / software engineering > Algorithms and data structures > Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)

Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)

|
     0     
5
4
3
2
1




International Edition


About the Book

This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.

Table of Contents:
Hypergraph Based Radio Resource Management in 5G Fog Cell.- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism.- Interest-aware next POI Recommendation for Mobile Social Networks.- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs.- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval.- An Open Security-enhanced Compatible OpenFlow Platform.- Hop-constrained Relay Node Placement in Wireless Sensor Networks.- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications.- Delay-constraint Throughput Maximization in UAV-assisted VANETs.- Smart Device Fingerprinting based on Webpage Loading.- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain.- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality.- AnEfficient Privacy-Preserving Data Aggregation Scheme for IoT.- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder.- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System.- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation.- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data.- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data.- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks.- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model.- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments.- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques.- Massive MIMO Power Allocation in Millimeter Wave Networks.- A detection-resistant covert timing channel based on Geometric Huffman Coding.- Spark: A Smart Parking Lot Monitoring System.- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection.- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users.- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning.- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation.- Household Electrical Load Scheduling Algorithms with Renewable Energy.- An Empirical Study of OAuth-based SSO System on Web.- Turning Legacy IR Devices into Smart IoT Devices.- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy.- Data Uploading Mechanism for Internet of Things with Energy Harvesting.- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference.- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines.- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination.- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks.- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks.- Privacy-preserving Personal Sensitive Data in Crowdsourcing.- A First Step Towards Combating Fake News Over Online Social Media.- Predicting Smartphone App Usage with Recurrent Neural Networks.- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games.- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network.- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks.- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings.- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing.- HEVC Lossless Compression Coding basedon Hadamard Buttery Transformation.- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks.- Localization of Thyroid Nodules in Ultrasonic Images.- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices.- An Information Classification Collection Protocol for Large-scale RFID Systems.- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks.- On Association Study of Scalp EEG Data Channels Under Different Circumstances.- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain.- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network.- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query.- KrackCover: A Wireless Security Framework for Covering KRACK Attacks.- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network.- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays.- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks.- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing.- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET.- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way.- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems.- A Novel Capability-Aware SIC-based Protocol for Wireless Networks.- A Supervised Learning Approach to Link Prediction in Dynamic Networks.- Mining Mobile Users' Interests through Cellular Network Browsing Profiles.- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System.- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers.- Network Control for Large-Scale Container Clusters.- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks.- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals.- A Recognition Approach for the Groups with Interactions.- Security Enhancement of Over-the-Air Update for Connected Vehicles.- Resilient SDN-based Communication in Vehicular Network.- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check.- Understanding Data Breach: A Visualization Aspect.- A Novel Recommendation-based Trust Inference Model for MANETs.


Best Sellers


Product Details
  • ISBN-13: 9783319942674
  • Publisher: Springer International Publishing AG
  • Publisher Imprint: Springer International Publishing AG
  • Height: 235 mm
  • No of Pages: 910
  • Returnable: Y
  • Series Title: Theoretical Computer Science and General Issues
  • Width: 155 mm
  • ISBN-10: 3319942670
  • Publisher Date: 13 Jun 2018
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Series Title: 10874 Lecture Notes in Computer Science
  • Sub Title: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)
Springer International Publishing AG -
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings(10874 Lecture Notes in Computer Science)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!