Muutke küpsiste eelistusi

E-raamat: Wireless Algorithms, Systems, and Applications: 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part III

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.
The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
Event-based American Sign Language Recognition Using Dynamic Vision
Sensor.- Multi-step domain adaption image classification network via
attention mechanism and multi-level feature alignment.-Automated Honey
Document Generation Using Genetic Algorithm.- Image encryption for Wireless
Sensor Networks with modified Logistic Map and new Hash algorithm.- Design
and implementation of a real-time distributed precise point positioning
platform.- Deployment of UAV-BS for Congestion Alleviation in Cellular
Networks.- Robust Estimator for NLOS Error Mitigation in TOA-based
Localization.- Effectiveness Analysis of UAV Offensive Strategy with Unknown
Adverse Trajectory.- Delivery Optimization for Unmanned Aerial Vehicles Based
on Minimum Cost Maximum Flow With Limited Battery Capacity.- Optimized
Segment Routing Traffic Engineeringwith Multiple Segments.- Robust and
Efficient Mechanism Design for Heterogeneous Task Crowdsensing.- Lightweight
Threshold Private Set Intersection via Oblivious Transfer.- Person
Re-identification Algorithm Based on Spatial Attention Network.- OFDMA-based
Asymmetric Full-duplex Media Access Control for the Next Generation WLANs.-
Equitable Valuation of Crowdsensing for Machine Learning via Game Theory.-
AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism.-
Application of Matrix-NMS in face detection and autonomous driving.-
Blockchain-based verifiable DSSE with forward security in multi-server
environments.- GGCAD: A Novel Method of Adversarial Detection by Guided
Grad-CAM.- Online Task Scheduling for DNN-based Applications over Cloud, Edge
and End Devices.- An SDN-based Self-adaptive Resource Allocation Mechanism
for Service Customization.- Privacy Risk Assessment for Text Data Based on
Semantic Correlation Learning.- Multi-dimensional LSTM:A Model of NetworkText
Classification.- Incentive Cooperation with Computation Delay Concerns for
Socially-aware Parked Vehicle Edge Computing.- Complex Task Allocation in
Spatial Crowdsourcing:A Task Graph Perspective.- Jointly Optimizing
Throughput and Cost of IoV based on Coherent Beamforming and Successive
Interference Cancellation Technology.- Deep Reinforcement Learning based
Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles.-
A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite
Constellations.- An Efficient Multi-Link Concurrent Transmission MAC Protocol
for Long-delay Underwater Acoustic Sensor Networks.- An Advanced Cache
Retransmission Mechanism for Wireless Mesh Network.- Efficient
Budget-Distance-Aware Influence Maximization in Geo-Social Network.- Deep
Learning-Based Task Offloading for Vehicular Edge Computing.- Hacks Hit the
Phish: Phishing Attack Detection based on Hacks Search.- The sensor-cloud
system and node reliability analysis.- Reinforcement Learning Based Seamless
Handover Algorithm in SDN-enabled WLAN.- Attack traffic detection based on
LetNet-5 and GRU hierarchical deep neural network.- Real-time and Consistent
Route Update Based on Segment Routing for NFV-enabled Networks .-
Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device
Clouds.- Deep Reinforcement Learning for DAG-based Concurrent Requests
Scheduling in Edge Networks.- Generative Adversarial Scheme Based GNSS
Spoofing Detection for Digital Twin Vehicular Networks.- Spatial Sketch
Configuration for Traffic Measurement in Software Defined Networks.-
Estimating Clustering Coefficient of Multiplex Graphs with Local Differential
Privacy.- New Rectangle Attack Against SKINNY Block Cipher.- Optimal
convergence nodes deployment in hierarchical wireless sensor networks: an
SMA-based approach.- A Virtual-Potential-Field-based Cooperative
Opportunistic Routing Protocol for UAV Swarms.- Social-Interaction GAN:
Pedestrian Trajectory Prediction.- An Intelligent Wallpaper Based on Ambient
Light for Human Activity Sensing.- Adaptive Data Transmission and Task
Scheduling for High-Denition Map Update.- Research on Path Planning for
Relay Drones with Multiple Constraints.- A Reinforcement Model based
Prioritized Replay to Solve the Offloading Problem in Edge Computing.- 
Authentication System Based on Fuzzy Extractors.- Performance Analysis of
V2V-Based Vehicular Platoon with Modified CACC Scheme.- Leveraging
Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions.-
Blockchain Oracle-Based Privacy Preservation and Reliable Identification for
Vehicles.- Objects Perceptibility Prediction Model Based on Machine Learning
for V2I Communication Load Reduction.- KESAR: A High-Accuracy Prediction
Algorithm and Solar-Aware Routing Strategy for Outdoor WSN.- Blockchain
Empowered Federated Learning for Medical Data Sharing Model.- A Deep Learning
Based Intelligent Transceiver Structure for Multiuser MIMO.-  GreenAP: An
Energy-saving Protocol for Mobile Access Points.- A Robust Multi-Tenant
Server Consolidation Algorithm.- PM2.5 and PM10 Concentration Estimation
based on the Top-of-Atmosphere Reflectance.- A Secure Sensing Data Collection
Mechanism based on Perturbed Compressed Sensing.- An Edge-Cloud Collaborative
Object Detection System.- Underwater Acoustic signal Modulation recognition
Technology based on Deep Learning.