Mobile intelligence / (Record no. 74111)

000 -LEADER
fixed length control field 09738nam a2201765 i 4500
001 - CONTROL NUMBER
control field 5732776
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712205752.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2010 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780470579398
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 004.16
245 00 - TITLE STATEMENT
Title Mobile intelligence /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xx, 695 pages) :
490 1# - SERIES STATEMENT
Series statement Wiley series on parallel and distributed computing ;
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface -- Contributors -- Part I Mobile Data and Intelligence -- 1. A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks -- 2. Connected Dominating Set for Topology Control in Ad Hoc Networks -- 3. An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad Hoc Networks, -- 4. Mobility in Publish/Subscribe Systems, -- 5. Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks -- 6. Recent Advances in Mobile Agent-Oriented Applications -- Part II Location-Based Mobile Information Services -- 7. KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks -- 8. Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks -- 9. An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments -- 10. Next Generation Location-based Services: Merging Positioning and Web 2.0 -- Part III Mobile Mining -- 11. Data Mining for Moving Object Databases -- 12. Mobile Data Mining on Small Devices Through Web Services -- Part IV Mobile Context-Aware and Applications -- 13. Context Awareness: A Formal Foundation -- 14. Experiences with a Smart Office Project 294 -- 15. An Agent-Based Architecture for Providing Enhanced Communication Services.Part V Mobile Intelligence Security -- 16. MANET Routing Security -- 17. An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks -- 18. SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue -- 19. Managing Privacy in Location-based Access Control Systems -- Part VI Mobile Multimedia -- 20. VoiceXML-Enabled Intelligent Mobile Services -- 21. User Adaptive Video Retrieval on Mobile Devices -- 22. A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment -- 23. Energy Efficiency for Mobile Multimedia Replay -- Part VII Intelligent Network -- 24. Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks -- 25. Tracking in Wireless Sensor Networks.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 26. DDoS Attack Modeling and Detection in Wireless Sensor Networks -- 27. Energy-Efficient Pattern Recognition for Wireless Sensor Networks -- Index.
520 ## - SUMMARY, ETC.
Summary, etc Cutting-edge research and application issues on computational intelligence in the mobile environment. The combination of mobile computing and computational intelligence, Mobile Intelligence focuses on learning patterns and knowledge from data generated by mobile users and mobile technology. As a very new area of research, mobile intelligence has created a wide range of opportunities for researchers, engineers, and developers to create new applications for both end users and businesses. Mobile Intelligence covers the comprehensive state-of-the-art in various applications of computational intelligence to the mobile paradigm, including mobile data intelligence, mobile mining, mobile intelligence security, mobile agent, location-based mobile information services, mobile context-aware and applications, intelligent networks, and mobile multimedia. Readers will not only learn different areas of mobile computing and its issues but also various intelligent approaches that contribute in addressing these issues, as well as discover other potential elements in the mobile paradigm.. Explains how to deliver benefits to a wide range of applications, including database query processing, multimedia, commerce systems, e-mail systems, search engines, and Web browsers. Covers efficient and effective mobile data retrieval by various advanced techniques and protocols. Describes intelligent approaches to resolving location-based query processing in the mobile environment. Discusses learning interesting patterns and knowledge out from data generated by mobile users. Investigates the deployment of mobile agents to support context-aware mobile applications. Presents intelligent solutions to the security issues in mobile networks. Evaluates advanced optimization methods for mobile multimedia retrieval. Reveals the latest techniques in solving various issues in wireless sensor network (WSN)Mobile Intelligence is geared for upper-level undergraduate and graduate students in computer science and data mining courses, as well as telecommunication engineers, mobile communication and networking engineers, computer scientists, computer engineers, mobile database specialists, and data mining specialists.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Mobile computing
General subdivision Research.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Computational intelligence
General subdivision Research.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Wireless communication systems
General subdivision Research.
700 1# - AUTHOR 2
Author 2 Yang, Laurence Tianruo.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5732776
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- Wiley,
-- c2010.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2010]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/21/2015.
695 ## -
-- Spread spectrum communication
695 ## -
-- Streaming media
695 ## -
-- Subscriptions
695 ## -
-- Technological innovation
695 ## -
-- Topology
695 ## -
-- Tracking
695 ## -
-- Transform coding
695 ## -
-- Tuning
695 ## -
-- Unified modeling language
695 ## -
-- User interfaces
695 ## -
-- Video codecs
695 ## -
-- Wearable computers
695 ## -
-- Web sites
695 ## -
-- Wireless LAN
695 ## -
-- Wireless communication
695 ## -
-- Wireless networks
695 ## -
-- Wireless sensor networks
695 ## -
-- Zigbee
695 ## -
-- centralized attack detection
695 ## -
-- efficient datacentric storage mechanisms in wireless sensor networks
695 ## -
-- hierarchical management mechanisms
695 ## -
-- intelligent network
695 ## -
-- threshold pattern modeling
695 ## -
-- tracking in WHSNs
695 ## -
-- tracking in wireless sensor networks
695 ## -
-- tracking scenarios in WSNs
695 ## -
-- Access control
695 ## -
-- Accuracy
695 ## -
-- Ad hoc networks
695 ## -
-- Adaptive systems
695 ## -
-- Advertising
695 ## -
-- Approximation algorithms
695 ## -
-- Architecture
695 ## -
-- Arrays
695 ## -
-- Associative memory
695 ## -
-- Base stations
695 ## -
-- Books
695 ## -
-- Buildings
695 ## -
-- Clothing
695 ## -
-- Clustering algorithms
695 ## -
-- Collaboration
695 ## -
-- Communities
695 ## -
-- Companies
695 ## -
-- Compass
695 ## -
-- Computational modeling
695 ## -
-- Computer architecture
695 ## -
-- Computers
695 ## -
-- Connectors
695 ## -
-- Context
695 ## -
-- Context modeling
695 ## -
-- Context-aware services
695 ## -
-- Cooperative caching
695 ## -
-- DDoS attack modeling and detection in wireless sensor networks
695 ## -
-- DVD
695 ## -
-- Data mining
695 ## -
-- Database systems
695 ## -
-- Databases
695 ## -
-- Dictionaries
695 ## -
-- Distributed databases
695 ## -
-- GSM
695 ## -
-- Global Positioning System
695 ## -
-- Handheld computers
695 ## -
-- Hidden Markov models
695 ## -
-- History
695 ## -
-- IEEE 802.11 Standards
695 ## -
-- IEEE 802.16 Standards
695 ## -
-- Indexes
695 ## -
-- Indexing
695 ## -
-- Information retrieval
695 ## -
-- Internet
695 ## -
-- Java
695 ## -
-- Load modeling
695 ## -
-- Markov processes
695 ## -
-- Media
695 ## -
-- Middleware
695 ## -
-- Mobile ad hoc networks
695 ## -
-- Mobile agents
695 ## -
-- Mobile communication
695 ## -
-- Mobile computing
695 ## -
-- Mobile handsets
695 ## -
-- Multiaccess communication
695 ## -
-- Multimedia communication
695 ## -
-- Network topology
695 ## -
-- Neurons
695 ## -
-- Next generation networking
695 ## -
-- Pattern matching
695 ## -
-- Peer to peer computing
695 ## -
-- Performance evaluation
695 ## -
-- Predictive models
695 ## -
-- Privacy
695 ## -
-- Proposals
695 ## -
-- Protocols
695 ## -
-- Quality of service
695 ## -
-- Radiation detectors
695 ## -
-- Recommender systems
695 ## -
-- Routing
695 ## -
-- Routing protocols
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Semantics
695 ## -
-- Sensors
695 ## -
-- Servers
695 ## -
-- Service oriented architecture
695 ## -
-- Software systems
695 ## -
-- Spatial databases

No items available.