Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Ren Kui (Directeur de publication), Liu Xue (Directeur de publication), Liang Weifa (Directeur de publication), Xu Ming (Directeur de publication), Jia Xiaohua (Directeur de publication), Xing Kai (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, Kai Xing.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , [20..]
Cham : Springer Nature
Collection : Theoretical computer science and general issues (Online) ; 7992
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme de l'éditeur (Springer)
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : https://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Wireless Algorithms, Systems, and Applications
Autre format: Wireless Algorithms, Systems, and Applications
LEADER 09660clm a2200769 4500
001 PPN172428491
003 http://www.sudoc.fr/172428491
005 20241001155400.0
010 |a 978-3-642-39701-1 
017 7 0 |a 10.1007/978-3-642-39701-1  |2 DOI 
035 |a (OCoLC)862150781 
035 |a Springer978-3-642-39701-1 
035 |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-39701-1 
035 |a Springer-11645-978-3-642-39701-1 
100 |a 20131018f20 k |0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
105 |a y z 100yy 
106 |a s 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Wireless Algorithms, Systems, and Applications  |e 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings  |f edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, Kai Xing. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d [20..] 
225 0 |a Theoretical Computer Science and General Issues  |x 2512-2029  |v 7992 
330 |a This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks. 
359 1 |a Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization. 
371 0 |a Accès en ligne pour les établissements français bénéficiaires des licences nationales 
371 0 |a Accès soumis à abonnement pour tout autre établissement 
371 1 |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales  |c https://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 
410 | |0 200114832  |t Theoretical computer science and general issues (Online)  |x 2512-2029  |v 7992 
452 | |t Wireless Algorithms, Systems, and Applications  |y 9783642397004 
452 | |t Wireless Algorithms, Systems, and Applications  |y 9783642397028 
608 |3 PPN02886431X  |a Actes de congrès  |2 rameau 
610 2 |a Computer Science, general 
610 2 |a Algorithm Analysis and Problem Complexity 
610 2 |a Information Systems Applications (incl. Internet) 
610 2 |a Computer Science, general 
610 1 |a Computer Science 
610 2 |a Computer Communication Networks 
610 2 |a System Performance and Evaluation 
610 2 |a Computer and Information Systems Applications 
610 1 |a Algorithms 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.1  |v 23 
680 |a QA76.9.A43 
700 1 |a Ren  |b Kui  |4 651 
701 1 |a Liu  |b Xue  |4 651 
701 1 |a Liang  |b Weifa  |4 651 
701 1 |a Xu  |b Ming  |4 651 
701 1 |a Jia  |b Xiaohua  |4 651 
701 1 |a Xing  |b Kai  |4 651 
801 3 |a FR  |b Abes  |c 20231126  |g AFNOR 
801 1 |a DE  |b Springer  |c 20230502  |g AACR2 
856 4 |q PDF  |u https://doi.org/10.1007/978-3-642-39701-1  |z Accès sur la plateforme de l'éditeur 
856 4 |u https://doi.org/10.1007/978-3-642-39701-1  |z Accès sur la plateforme de l'éditeur (Springer) 
856 4 |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-V726B6DB-G  |z Accès sur la plateforme Istex 
856 4 |5 441099901:83086055X  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-39701-1 
915 |5 441099901:83086055X  |b SPRING13-01041 
930 |5 441099901:83086055X  |b 441099901  |j g 
991 |5 441099901:83086055X  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:16 
997 |a NUM  |b SPRING13-01041  |d NUMpivo  |e EM  |s d 
998 |a 978886