Wireless Algorithms, Systems, and Applications: 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I

Author:   Dongxiao Yu ,  Falko Dressler ,  Jiguo Yu
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12384
ISBN:  

9783030590154


Pages:   838
Publication Date:   10 September 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $232.85 Quantity:  
Add to Cart

Share |

Wireless Algorithms, Systems, and Applications: 15th International Conference, WASA 2020, Qingdao, China, September 13–15, 2020, Proceedings, Part I


Add your own review!

Overview

Full Product Details

Author:   Dongxiao Yu ,  Falko Dressler ,  Jiguo Yu
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12384
Weight:   1.288kg
ISBN:  

9783030590154


ISBN 10:   3030590151
Pages:   838
Publication Date:   10 September 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Full Papers.- Reinforcement Learning based Group Event Invitation Algorithm.- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness.- Maximizing The Expected In uence in Face of The Non-Progressive Adversary.- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain.- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System.- A Novel Blockchain Network Structure Based on Logical Nodes.- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks.- Learning-Aided Mobile Charging for Rechargeable Sensor Networks.- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications.- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing.- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union.- Approximation Algorithm for the Offloading Problem in Edge Computing.- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning.- Camera Style Guided Feature Generation for Person Re-Identification.- Sync or Fork: Node-Level Synchronization Analysis of Blockchain.- Multi-user Cooperative Computation Offloading in Mobile Edge Computing.- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER.- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System.- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation.- Multiset Synchronization with Counting Cuckoo Filters.- Privacy-Aware Online Task Offloading for Mobile-Edge Computing.- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition.- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks.- Optimizing Motion Estimation With an ReRAM-based PIM Architecture.- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM.- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning.- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT.- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks.- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks.- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction.- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation.- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data.- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game.- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks.- An improved parallel network tra c anomaly detection method based on Bagging and GRU.- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs.- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing.- A Survey: Applications of Blockchains in the Internet of Vehicles.- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography.- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage.- A New Fully Homomorphic Signatures from Standard Lattices.- An Efficient Malicious User Detection Mechanism for Crowdsensing System.- Implementation of Video Transmission over Maritime Ad Hoc Network.- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing.- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme.- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs.- Consensus in Wireless Blockchain System.- Blockchain-based Service Recommendation Supporting Data Sharing.- Multi-objective disaster backup in inter-datacenter using reinforcement learning.- Detecting Internet-scale NATs for IoT Devices Based on Tri-net.- Data integrity checking supporting reliable data migration in cloud storage.- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks.- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing.- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION.- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2.- SEM: App Usage Prediction with Session-based Embedding.- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning.- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries.- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation.- GaitID: Robust Wi-Fi Based Gait Recognition.- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network.- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients.- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation.- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation.- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments.- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model.- Distributed Data Aggregation in Dynamic Sensor Networks.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List