Items related to Wireless Algorithms, Systems, and Applications: 10th...

Wireless Algorithms, Systems, and Applications: 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings - Softcover

 
9783319218380: Wireless Algorithms, Systems, and Applications: 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings

This specific ISBN edition is currently not available.

Synopsis

Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments.- Multi-proxy Multi-signature Binding Positioning Protocol.- Efficient Network Structure of 5G Mobile Communications.- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs.- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks.- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks.- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams.- Radio Signal Based Device-Free Velocity Recognition.- Minimum-Cost Information Dissemination in Social Networks.- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity.- Computing an Optimal Path with the Minimum Number of Distinct Sensors.- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs.- Impact of a Deterministic Delay in the DCA Protocol.- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET.- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired.- Estimation Based Adaptive ACB Scheme for M2M Communications.- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit.- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP.- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks.- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks.- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network.- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs.- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs.- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering.- DRL: A New Mobility Model in Mobile Social Networks.- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme.- A Secure Multi-unit Sealed First-Price Auction Mechanism.- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks.- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks.- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control.- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection.- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks.- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication.- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network.- Serial Number Based Encryption and Its Application for Mobile Networks.- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds.- Big-Little-Cell Based "Handprint" Positioning System.- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks.- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks.- Rogue Access Point Detection in Vehicular Environments.- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture.- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service.- iProtect: Detecting Physical Assault Using Smartphone.- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework.- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO

"synopsis" may belong to another edition of this title.

  • PublisherSpringer
  • Publication date2015
  • ISBN 10 3319218387
  • ISBN 13 9783319218380
  • BindingPaperback
  • LanguageEnglish

(No Available Copies)

Search Books:



Create a Want

Can't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!

Create a Want

Other Popular Editions of the Same Title

9783319218366: Wireless Algorithms, Systems, and Applications: 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings: 9204 (Lecture Notes in Computer Science, 9204)

Featured Edition

ISBN 10:  3319218360 ISBN 13:  9783319218366
Publisher: Springer, 2015
Softcover