feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (16)
  • Computer Science  (16)
  • Comparative Studies. Non-European Languages/Literatures
  • Konferenzschrift  (16)
  • 1
    UID:
    almahu_9947936560502882
    Format: XVIII, 910 p. 398 illus. , online resource.
    ISBN: 9783319942681
    Series Statement: Lecture Notes in Computer Science, 10874
    Content: This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
    Note: Hypergraph Based Radio Resource Management in 5G Fog Cell -- A Novel Energy Harvesting Aware IEEE 802.11 Power Saving Mechanism -- Interest-aware next POI Recommendation for Mobile Social Networks -- Approximate Minimum-Transmission Broadcasting in Duty-Cycled WSNs -- Robust Network-based Binary-to-vector Encoding for Scalable IoT Binary File Retrieval -- An Open Security-enhanced Compatible OpenFlow Platform -- Hop-constrained Relay Node Placement in Wireless Sensor Networks -- Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection -- A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications -- Delay-constraint Throughput Maximization in UAV-assisted VANETs -- Smart Device Fingerprinting based on Webpage Loading -- Trajectory Prediction for Ocean Vessels Base on K-order Multivariate Markov Chain -- Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality -- An Efficient Privacy-Preserving Data Aggregation Scheme for IoT -- Improving Security and Stability of AODV with Fuzzy Neural Network in VANET -- Exploiting Aerial Heterogeneous Network for Implementing Wireless Flight Recorder -- TOA Estimation Algorithm Based on Noncoherent Detection in IR-UWB System -- Max-Min Fairness Scheme in Wireless Powered Communication Networks with Multi-User Cooperation -- Cancer-Drug Interaction network construction and drug target prediction based on multi-source data -- Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data -- Sampling Based delta-Approximate Data Aggregation in Sensor Equipped IoT Networks -- Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model -- Signal-Selective Time Difference of Arrival Estimation Based on Generalized Cyclic Correntropy in Impulsive Noise Environments -- iKey:An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques -- Massive MIMO Power Allocation in Millimeter Wave Networks -- A detection-resistant covert timing channel based on Geometric Huffman Coding -- Spark: A Smart Parking Lot Monitoring System -- A Hybrid Model based on Multi-Dimensional Features for Insider Threat Detection -- Throughput Analysis for Energy Harvesting Cognitive Radio Networks with Unslotted Users -- A Crowdsourcing-based Wi-Fi Fingerprinting Mechanism Using Un-Supervised Learning -- Secure and Verifiable Outsourcing of Large-Scale Matrix Inverse Computation -- Household Electrical Load Scheduling Algorithms with Renewable Energy -- An Empirical Study of OAuth-based SSO System on Web -- Turning Legacy IR Devices into Smart IoT Devices -- Solving Data Trading Dilemma with Asymmetric Incomplete Information using Zero-Determinant Strategy -- Data Uploading Mechanism for Internet of Things with Energy Harvesting -- Enabling ZigBee Link Performance Robust Under Cross-Technology Interference -- Quadrant-based Weighted Centroid Algorithm for Localization in Underground Mines -- Exploration of Human Activities Using Sensing Data via Deep Embedded Determination -- Reinforcement Learning for a Novel Mobile Charging Strategy in Wireless Rechargeable Sensor networks -- A Multi-objective Algorithm for Joint Energy Replenishment and Data Collection in Wireless Rechargeable Sensor Networks -- Privacy-preserving Personal Sensitive Data in Crowdsourcing -- A First Step Towards Combating Fake News Over Online Social Media -- Predicting Smartphone App Usage with Recurrent Neural Networks -- A Self-Organizing Base Station Sleeping Strategy in Small Cell Networks Using Local Stable Matching Games -- Dealing with Dynamic-scale of Events: Compressive Data Gathering for Wireless Sensor Network -- Proactive Caching for Transmission Performance in Cooperative Cognitive Radio Networks -- N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings -- Privacy-Preserving Task Assignment in Skill-Aware Spatial Crowdsourcing -- HEVC Lossless Compression Coding based on Hadamard Buttery Transformation -- U-MEC: Energy-efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks -- Localization of Thyroid Nodules in Ultrasonic Images -- Cost Reduction for Micro-grid Powered Dater Center Network with Energy Storage Devices -- An Information Classification Collection Protocol for Large-scale RFID Systems -- An efficient energy-aware probabilistic routing approach for mobile opportunistic networks -- On Association Study of Scalp EEG Data Channels Under Different Circumstances -- A Privacy-Preserving Networked Hospitality Service with the Bitcoin Blockchain -- Trust-distrust-aware Point-of-Interest Recommendation in Location-based Social Network -- Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query -- KrackCover: A Wireless Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean Monitoring Sensor Network -- LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information -- NASR: NonAuditory Speech Recognition with Motion Sensors in Head-mounted Displays -- Energy Harvesting Based Opportunistic Routing for Mobile Wireless Nanosensor Networks -- Synergistic based Social Incentive Mechanism in Mobile Crowdsensing -- SACP:A Signcryption-based Authentication Scheme with Conditional Privacy Preservation for VANET -- DFTinker: Detecting and Fixing Double-fetch Bugs in an Automated Way -- A Quality-Validation Task Assignment Mechanism in Mobile Crowdsensing Systems -- A Novel Capability-Aware SIC-based Protocol for Wireless Networks -- A Supervised Learning Approach to Link Prediction in Dynamic Networks -- Mining Mobile Users' Interests through Cellular Network Browsing Profiles -- A Gradient-Boosting-Regression based Physical Health Evaluation Model for Running Monitoring by Using a Wearable Smartband System -- The Research of Spam Web Page Detection Method Based on Web Page Differentiation and Concrete Cluster Centers -- Network Control for Large-Scale Container Clusters -- Joint Optimization of Flow Entry Aggregation and Routing Selection in Software Defined Wireless Access Networks -- Loc-Knock: Remotely Locating Survivors in Mine Disasters Using Acoustic Signals -- A Recognition Approach for the Groups with Interactions -- Security Enhancement of Over-the-Air Update for Connected Vehicles -- Resilient SDN-based Communication in Vehicular Network -- Authentication Protocol using Error Correcting Codes and Cyclic Redundancy Check -- Understanding Data Breach: A Visualization Aspect -- A Novel Recommendation-based Trust Inference Model for MANETs.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319942674
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948017361502882
    Format: XII, 544 p. 292 illus., 138 illus. in color. , online resource.
    ISBN: 9783030046484
    Series Statement: Theoretical Computer Science and General Issues ; 11280
    Content: This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018. The 44 revised full papers presented in this book toghether with 2 extended abstracts, were carefully reviewed and selected from 106 submissions. The topics cover the fundamental background, theoretical technology development, and real-world applications associated with complex and data network analysis, minimizing in uence of rumors on social networks, blockchain Markov modelling, fraud detection, data mining, internet of things (IoT), internet of vehicles (IoV), and others. .
    Note: Theoretical technology development -- Real-world applications associated with complex and data network analysis -- Minimizing in uence of rumors on social networks -- Blockchain Markov modelling -- Fraud detection -- Data mining -- Internet of Things (IoT) -- Internet of Vehicles (IoV).
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030046477
    Additional Edition: Printed edition: ISBN 9783030046491
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV046878237
    Format: 1 Online-Ressource (xi, 640 Seiten) , 151 Illustrationen, 61 in Farbe
    ISBN: 9783030576028
    Series Statement: Lecture notes in computer science 12290
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57601-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57603-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Data Mining ; Algorithmus ; Komplexitätstheorie ; Optimierungsproblem ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV047175099
    Format: 1 Online-Ressource , Illustrationen, Diagramme
    ISBN: 9783030688844
    Series Statement: Lecture notes in computer science 12383
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68883-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68885-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Di Pietro, Roberto
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV047175101
    Format: 1 Online-Ressource , Illustrationen, Diagramme
    ISBN: 9783030688516
    Series Statement: Lecture notes in computer science 12382
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68850-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68852-3
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Di Pietro, Roberto
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1646694929
    Format: Online-Ressource (XVI, 709 p. Also available online, digital)
    ISBN: 9783540371908
    Series Statement: Lecture Notes in Computer Science 4138
    Content: Keynote Speech -- Application Oriented Networking (AON): Adding Intelligence to Next-Generation Internet Routers -- Multi-channel Wireless Networks: Capacity, Protocols, and Experimentation -- Session 2A: Wireless PAN and Wireless LAN -- A Priority Management Scheme for High Rate Wireless Personal Area Network -- Connection Control by Virtual Admission in Wireless LAN Environment -- A Scalable Port Forwarding for P2P-Based Wi-Fi Applications -- An Adaptive Energy Saving Mechanism for the IEEE 802.15.4 LR-WPAN -- Traffic-Aware Power Control Algorithm for Low Rate WPAN -- Session 2B: Wireless MAN and Pervasive Computing -- A Generic Software Partitioning Algorithm for Pervasive Computing -- A New Methodology of QoS Evaluation and Service Selection for Ubiquitous Computing -- An Enhanced Energy Saving Scheme in Mobile Broadband Wireless Access Systems -- Energy Aware Multimedia Messaging Services Across Networks and Across Devices for Mobile Users -- Dynamic Bandwidth Allocation in IEEE 802.16 -- Session 3A: Data Management -- A Memory Efficient Algorithm for Packet Classification -- Energy-Efficient Multi-query Optimization over Large-Scale Sensor Networks -- On the Design of Soft-Decision Fusion Rule for Coding Approach in Wireless Sensor Networks -- Reliable and Real-Time Data Gathering in Multi-hop Linear Wireless Sensor Networks -- Path Selection of Reliable Data Delivery in Wireless Sensor Networks -- An Efficient and Robust Routing Protocol for Data Aggregation -- Session 3B: Mobility, Localization and Topology Control -- An Area-Based Vertical Motion Estimation on Heterogeneous Wireless Networks -- A Density Control Algorithm for Surveillance Sensor Networks -- Adaptive Weighted Clustering for Large Scale Mobile Ad Hoc Networking Systems -- An Interference Free Cluster-Based TDMA Protocol for Wireless Sensor Networks -- Integrated Multi-layer Registration Combining SIP with Mobile IP Schemes -- ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks -- Session 4A: Performance Modeling and Analysis -- Throughput Capacity of UWB Ad-Hoc Networks with Infrastructure Support -- Performance of Tomlinson-Harashima Precoding over Spatially Correlated MIMO Channels -- Upper Bound on Operational Lifetime of Ultra Wide Band Sensor Network -- Single-Actor Selection Algorithms for Wireless Sensor and Actor Networks -- A Genetic Algorithm on Multi-sensor Networks Lifetime Optimization -- Session 4B: MAC -- A Power Efficient MAC Protocol for IEEE 802.11 Multihop Ad Hoc Networks -- A Novel Energy-Aware TDMA Scheduling Algorithm for Wireless Sensor Networks -- A Distributed Code Assignment Algorithm with High Code Reusability for CDMA-Based Ad Hoc Networks -- A Medium Access Control Scheme for Providing Reliability in Wireless Ad Hoc Networks -- An Adaptive Latency-Energy Balance Approach of MAC Layer in Wireless Sensor Networks -- Session 6A: Algorithm and System Design -- A Convex-Hull Based Algorithm to Connect the Maximal Independent Set in Unit-Disk Graphs -- A Pure Localized Algorithm for Finding Connected Dominating Set in MANETs by Classification of Neighbors -- Dependency-Based Dynamic Component Reconfiguration for Wireless Computing Systems -- Non-uniform Information Transmission for Minimum Distortion in Wireless Networks -- A UDP-Based State-Sharing Mechanism of SIP Transaction Stateful Proxy -- A Novel Analog Pre-distorter of TWTA Non-linearity in High Power Satellite Transmitters -- Session 6B: Security -- Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks -- Accusation Resolution Using Security Metrology -- Ring Signature Based on ElGamal Signature -- Key Management in Sensor Networks -- Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy -- A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks -- Session 7A: Broadcast/Multicast Routing -- Minimum Multicast Time Problem in Wireless Sensor Networks -- On Broadcast Authentication in Wireless Sensor Networks -- Tree-Based Multicast Meshes with Variable Density of Redundant Paths on Mobile Ad Hoc Networks -- Low-Latency Broadcast Scheduling in Ad Hoc Networks -- Session 7B: OFDM Networks -- A Study on the CI-OFDM Communication System for the High Quality and High Speed Communication System -- Design and Analysis of Side Information Embedded PTS Scheme in the OFDM Communication System -- Performance Analysis of a Framed ALOHA System with Diversity Frequency Hopping -- Optimized Channel Utilization in Multi-carrier Wireless Mobile Networks -- Session 8A: Algorithms and Protocols -- An Energy-Aware Quality of Services Routing Protocol in Mobile Ad Hoc Networks -- Bandwidth Guaranteed Routing in Wireless Mesh Networks -- An Altitude Based Dynamic Routing Scheme for Ad Hoc Networks -- PREG: A Practical Power Control Algorithm Based on a Novel Proximity Graph for Heterogeneous Wireless Sensor Networks -- Algorithms for Delay Constrained and Energy Efficiently Routing in Wireless Sensor Network -- Session 8B: Modeling and Algorithms -- The Effective Radius Model for Multi-hop Wireless Networks -- Modeling and Analysis for an Enhanced Three-Tier Dynamic Location Management in 3G -- MTSP: Multi-hop Time Synchronization Protocol for IEEE 802.11 Wireless Ad Hoc Network -- Upperbounding End-to-End Throughput of Multihop Wireless Networks -- Dynamicity Aware Graph Relabeling Systems and the Constraint Based Synchronization: A Unifying Approach to Deal with Dynamic Networks -- Studying Rational User Behavior in WCDMA Network and Its Effect on Network Revenue.
    Additional Edition: ISBN 9783540371892
    Additional Edition: Buchausg. u.d.T. Wireless algorithms, systems, and applications Berlin : Springer, 2006 ISBN 9783540371892
    Additional Edition: ISBN 3540371893
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mobile Computing ; Netzwerktopologie ; Ubiquitous Computing ; Funknetz ; Zugangsverfahren ; Ad-hoc-Netz ; Leistungsbewertung ; Funknetz ; Drahtloses Sensorsystem ; Funknetz ; Kommunikationsprotokoll ; Routing ; Mobile Computing ; Netzwerktopologie ; Ubiquitous Computing ; Funknetz ; Zugangsverfahren ; Ad-hoc-Netz ; Leistungsbewertung ; Funknetz ; Drahtloses Sensorsystem ; Funknetz ; Kommunikationsprotokoll ; Routing ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Cheng, Xiuzhen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    edoccha_BV046878237
    Format: 1 Online-Ressource (xi, 640 Seiten) : , 151 Illustrationen, 61 in Farbe.
    ISBN: 978-3-030-57602-8
    Series Statement: Lecture notes in computer science 12290
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57601-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57603-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Data Mining ; Algorithmus ; Komplexitätstheorie ; Optimierungsproblem ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edocfu_BV046878237
    Format: 1 Online-Ressource (xi, 640 Seiten) : , 151 Illustrationen, 61 in Farbe.
    ISBN: 978-3-030-57602-8
    Series Statement: Lecture notes in computer science 12290
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57601-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-57603-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Data Mining ; Algorithmus ; Komplexitätstheorie ; Optimierungsproblem ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edocfu_BV047175099
    Format: 1 Online-Ressource : , Illustrationen, Diagramme.
    ISBN: 978-3-030-68884-4
    Series Statement: Lecture notes in computer science 12383
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68883-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68885-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Di Pietro, Roberto
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    edoccha_BV047175099
    Format: 1 Online-Ressource : , Illustrationen, Diagramme.
    ISBN: 978-3-030-68884-4
    Series Statement: Lecture notes in computer science 12383
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68883-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-68885-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Di Pietro, Roberto
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages