000 07476nam a22006135i 4500
001 978-3-030-23597-0
003 DE-He213
005 20240730165601.0
007 cr nn 008mamaa
008 190620s2019 sz | s |||| 0|eng d
020 _a9783030235970
_9978-3-030-23597-0
024 7 _a10.1007/978-3-030-23597-0
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aWireless Algorithms, Systems, and Applications
_h[electronic resource] :
_b14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings /
_cedited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXV, 649 p. 276 illus., 195 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v11604
505 0 _aFull Paper -- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems -- Model based Adaptive Data Acquisition for Internet of Things -- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System -- Automated and Personalized Privacy Policy Extraction under GDPR Consideration -- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks -- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs -- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing -- Massive MIMO Cognitive Cooperative Relaying -- Minimum Control Cost of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model -- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance -- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access -- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage -- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking -- Spatiotemporal Feature Extraction for Pedestrian Re-identification -- Detecting Android Side Channel Probing Attacks Based on System States -- Online DAG Scheduling with On-demand Function Configuration in Edge Computing -- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer -- Self-attention Based Collaborative Neural Network For Recommendation -- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage -- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy -- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee -- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements -- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient -- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing -- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System -- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids -- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction -- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain -- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM -- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation -- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring -- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions -- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints -- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks -- Building Trustful Crowdsensing Service on the Edge -- User Identity De-Anonymization Based on Attributes -- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks -- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation -- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation -- A Hybrid Approach for Recognizing Web Crawlers -- Contextual Combinatorial Cascading Thompson Sampling -- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory -- Short Paper -- Utility Aware Task Offloading for Mobile Edge Computing -- Analysis of Best Network Routing Structure for IoT -- Parallel Multicast Information Propagation Based on Social Influence -- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications -- Optimal Routing of tight optimal Bidirectional Double-loop Networks -- DDSEIR: a dynamic rumor spreading model in online social networks -- Data Forwarding and Caching Strategy for RSU Aided V-NDN -- Lightweight IoT Malware Visualization Analysis via Two-Bits Networks -- Privacy Protection Sensing Data Aggregation for Crowd Sensing -- A new outsourced data deletion scheme with public verifiability -- DPSR: A Differentially Private Social Recommender System for Mobile Users. .
520 _aThis book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks. .
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 0 _aArtificial intelligence.
_93407
650 0 _aComputers.
_98172
650 0 _aComputer simulation.
_95106
650 1 4 _aComputer Communication Networks.
_989679
650 2 4 _aData and Information Security.
_931990
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aComputing Milieux.
_955441
650 2 4 _aComputer Modelling.
_989680
700 1 _aBiagioni, Edoardo S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989681
700 1 _aZheng, Yao.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989682
700 1 _aCheng, Siyao.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_989683
710 2 _aSpringerLink (Online service)
_989684
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030235963
776 0 8 _iPrinted edition:
_z9783030235987
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v11604
_989685
856 4 0 _uhttps://doi.org/10.1007/978-3-030-23597-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86409
_d86409