000 09020nam a22006495i 4500
001 978-3-642-39701-1
003 DE-He213
005 20240730165542.0
007 cr nn 008mamaa
008 130704s2013 gw | s |||| 0|eng d
020 _a9783642397011
_9978-3-642-39701-1
024 7 _a10.1007/978-3-642-39701-1
_2doi
050 4 _aQA76.9.A43
072 7 _aUMB
_2bicssc
072 7 _aCOM051300
_2bisacsh
072 7 _aUMB
_2thema
082 0 4 _a518.1
_223
245 1 0 _aWireless Algorithms, Systems, and Applications
_h[electronic resource] :
_b8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings /
_cedited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING.
250 _a1st ed. 2013.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2013.
300 _aXIV, 536 p. 231 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v7992
505 0 _aImproving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient's Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cyclein Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient's Motion RecognitionBased on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization.
520 _aThis book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
650 0 _aAlgorithms.
_93390
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_989522
650 0 _aElectronic digital computers
_xEvaluation.
_921495
650 0 _aComputer science.
_99832
650 1 4 _aAlgorithms.
_93390
650 2 4 _aComputer Communication Networks.
_989523
650 2 4 _aComputer and Information Systems Applications.
_989524
650 2 4 _aSystem Performance and Evaluation.
_932047
650 2 4 _aComputer Science.
_99832
700 1 _aRen, Kui.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989525
700 1 _aLiu, Xue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989526
700 1 _aLiang, Weifa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989527
700 1 _aXu, Ming.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989528
700 1 _aJia, Xiaohua.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989529
700 1 _aXING, KAI.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989530
710 2 _aSpringerLink (Online service)
_989531
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642397004
776 0 8 _iPrinted edition:
_z9783642397028
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v7992
_989532
856 4 0 _uhttps://doi.org/10.1007/978-3-642-39701-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86390
_d86390