Wireless Algorithms, Systems, and Applications [electronic resource] : 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings / edited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng.
Contributor(s): Biagioni, Edoardo S [editor.] | Zheng, Yao [editor.] | Cheng, Siyao [editor.] | SpringerLink (Online service).
Material type: BookSeries: Theoretical Computer Science and General Issues: 11604Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XV, 649 p. 276 illus., 195 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030235970.Subject(s): Computer networks | Data protection | Artificial intelligence | Computers | Computer simulation | Computer Communication Networks | Data and Information Security | Artificial Intelligence | Computing Milieux | Computer ModellingAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access onlineFull Paper -- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems -- Model based Adaptive Data Acquisition for Internet of Things -- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System -- Automated and Personalized Privacy Policy Extraction under GDPR Consideration -- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks -- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs -- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing -- Massive MIMO Cognitive Cooperative Relaying -- Minimum Control Cost of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model -- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance -- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access -- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage -- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking -- Spatiotemporal Feature Extraction for Pedestrian Re-identification -- Detecting Android Side Channel Probing Attacks Based on System States -- Online DAG Scheduling with On-demand Function Configuration in Edge Computing -- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer -- Self-attention Based Collaborative Neural Network For Recommendation -- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage -- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy -- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee -- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements -- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient -- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing -- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System -- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids -- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction -- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain -- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM -- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation -- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring -- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions -- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints -- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks -- Building Trustful Crowdsensing Service on the Edge -- User Identity De-Anonymization Based on Attributes -- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks -- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation -- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation -- A Hybrid Approach for Recognizing Web Crawlers -- Contextual Combinatorial Cascading Thompson Sampling -- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory -- Short Paper -- Utility Aware Task Offloading for Mobile Edge Computing -- Analysis of Best Network Routing Structure for IoT -- Parallel Multicast Information Propagation Based on Social Influence -- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications -- Optimal Routing of tight optimal Bidirectional Double-loop Networks -- DDSEIR: a dynamic rumor spreading model in online social networks -- Data Forwarding and Caching Strategy for RSU Aided V-NDN -- Lightweight IoT Malware Visualization Analysis via Two-Bits Networks -- Privacy Protection Sensing Data Aggregation for Crowd Sensing -- A new outsourced data deletion scheme with public verifiability -- DPSR: A Differentially Private Social Recommender System for Mobile Users. .
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks. .
There are no comments for this item.