Wireless algorithms, systems, and applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings /

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from...

Full description

Corporate Authors: WASA (Conference) Zhangjiajie Shi, China)
Other Authors: WASA (Conference), Ren, Kui,, Liu, Xue,, Liang, Weifa,, Xu, Ming (Computer scientist),, Jia, Xiaohua,, Xing, Kai,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Heidelberg : Springer, [2013]
Physical Description: 1 online resource (xiv, 536 pages) : illustrations (black and white).
Series: Lecture notes in computer science ; 7992.
LNCS sublibrary. Theoretical computer science and general issues.
Subjects:
LEADER 12317cam a2201429 i 4500
001 852967473
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 130717s2013 gw a o 101 0 eng d
019 |a 934987782  |a 936312526  |a 1204013343  |a 1259217562 
020 |a 9783642397011  |q (electronic bk.) 
020 |a 3642397018  |q (electronic bk.) 
020 |z 9783642397004 
024 7 |a 10.1007/978-3-642-39701-1  |2 doi 
035 |a (OCoLC)852967473  |z (OCoLC)934987782  |z (OCoLC)936312526  |z (OCoLC)1204013343  |z (OCoLC)1259217562 
037 |b Springer 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d YDXCP  |d COO  |d NUI  |d OHS  |d VLB  |d OCLCO  |d OHS  |d VT2  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d DIBIB  |d OCLCO  |d YDX  |d DGU  |d ESU  |d IOG  |d BUF  |d OCLCO  |d MERER  |d OCLCO  |d CEF  |d U3W  |d AU@  |d OCLCO  |d WYU  |d YOU  |d TKN  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCA  |d SNK  |d OCLCO  |d COM  |d OCLCO  |d DCT  |d DKDLA  |d OCLCQ  |d OCL  |d OCLCQ  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCL 
049 |a COM6 
050 4 |a TK5103.2  |b .W37 2013 
060 4 |a TK 5103.2 
072 7 |a UMB  |2 bicssc 
072 7 |a COM051300  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
084 |a DAT 256f  |2 stub 
084 |a SS 4800  |2 rvk 
111 2 |a WASA (Conference)  |n (8th :  |d 2013 :  |c Zhangjiajie Shi, China) 
245 1 0 |a Wireless algorithms, systems, and applications :  |b 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings /  |c Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, Kai Xing (eds.). 
246 3 |a WASA 2013. 
264 1 |a Heidelberg :  |b Springer,  |c [2013] 
264 4 |c ©2013. 
300 |a 1 online resource (xiv, 536 pages) :  |b illustrations (black and white). 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a image files. 
347 |d PNG. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7992. 
490 1 |a LNCS sublibrary. SL 1, Theoretical computer science and general issues. 
500 |a International conference proceedings. 
500 |a Includes author index. 
520 |a This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks. 
588 0 |a Print version record. 
505 0 |a Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient's Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient's Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization. 
504 |a Includes bibliographical references and author index. 
546 |a English. 
650 0 |a Wireless communication systems  |x Management  |v Congresses. 
650 0 |a Mobile computing  |v Congresses. 
650 0 |a Computer networks. 
650 0 |a Computer security. 
650 2 |a Computer Communication Networks. 
650 2 |a Wireless Technology. 
650 2 |a Algorithms. 
650 2 |a Computer Security. 
650 6 |a Transmission sans fil  |x Gestion  |v Congrès. 
650 6 |a Informatique mobile  |v Congrès. 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Algorithmes. 
650 6 |a Sécurité informatique. 
650 7 |a algorithms.  |2 aat. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Computer networks.  |2 fast. 
650 7 |a Mobile computing.  |2 fast. 
650 7 |a Wireless communication systems  |x Management.  |2 fast. 
653 4 |a Computer science. 
653 4 |a Computer Communication Networks. 
653 4 |a Computer system performance. 
653 4 |a Computer software. 
653 4 |a Algorithm Analysis and Problem Complexity. 
653 4 |a Information Systems Applications (incl. Internet) 
653 4 |a System Performance and Evaluation. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Ren, Kui,  |e editor. 
700 1 |a Liu, Xue,  |e editor. 
700 1 |a Liang, Weifa,  |e editor. 
700 1 |a Xu, Ming  |c (Computer scientist),  |e editor. 
700 1 |a Jia, Xiaohua,  |e editor. 
700 1 |a Xing, Kai,  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks. 
776 0 8 |i Print version:  |a WASA (Conference) (8th : 2013 : Zhangjiajie Shi, China).  |t Wireless algorithms, systems, and applications.  |d Heidelberg : Springer, [2013]  |z 364239700X  |w (OCoLC)861313127. 
830 0 |a Lecture notes in computer science ;  |v 7992. 
830 0 |a LNCS sublibrary.  |n SL 1,  |p Theoretical computer science and general issues. 
907 |a .b39159334  |b multi  |c -  |d 130814  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.12 
948 |a MARCIVE Comp, 2018.08 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
933 |a Marcive found issue: "700 1   |a Liang, Weifa,  |e editor." 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.12 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.ltiac in 2016 
995 |a OCLC offline update by CMU 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150350338  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-642-39701-1  |3 SpringerLink  |z Click here for access