menu
{ "item_title" : "Wireless Algorithms, Systems, and Applications", "item_author" : [" Edoardo S. Biagioni", "Yao Zheng", "Siyao Cheng "], "item_description" : "Full Paper.- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems.- Model based Adaptive Data Acquisition for Internet of Things.- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System.- Automated and Personalized Privacy Policy Extraction under GDPR Consideration.- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks.- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs.- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing.- Massive MIMO Cognitive Cooperative Relaying.- Minimum Control Cost of Weighted Linear Dynamic Networks.- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model.- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance.- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access.- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage.- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking.- Spatiotemporal Feature Extraction for Pedestrian Re-identification.- Detecting Android Side Channel Probing Attacks Based on System States.- Online DAG Scheduling with On-demand Function Configuration in Edge Computing.- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer.- Self-attention Based Collaborative Neural Network For Recommendation.- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage.- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy.- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements.- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient.- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing.- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System.- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids.- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM.- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation.- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring.- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions.- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints.- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks.- Building Trustful Crowdsensing Service on the Edge.- User Identity De-Anonymization Based on Attributes.- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks.- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation.- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation.- A Hybrid Approach for Recognizing Web Crawlers.- Contextual Combinatorial Cascading Thompson Sampling.- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory.- Short Paper.- Utility Aware Task Offloading for Mobile Edge Computing.- Analysis of Best Network Routing Structure for IoT.- Parallel Multicast Information Propagation Based on Social Influence.- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications.- Optimal Routing of tight optimal Bidirectional Double-loop Networks", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/023/596/3030235963_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Wireless Algorithms, Systems, and Applications|Edoardo S. Biagioni

Wireless Algorithms, Systems, and Applications : 14th International Conference, Wasa 2019, Honolulu, Hi, Usa, June 24-26, 2019, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Full Paper.- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems.- Model based Adaptive Data Acquisition for Internet of Things.- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System.- Automated and Personalized Privacy Policy Extraction under GDPR Consideration.- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks.- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs.- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing.- Massive MIMO Cognitive Cooperative Relaying.- Minimum Control Cost of Weighted Linear Dynamic Networks.- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model.- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance.- Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access.- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage.- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking.- Spatiotemporal Feature Extraction for Pedestrian Re-identification.- Detecting Android Side Channel Probing Attacks Based on System States.- Online DAG Scheduling with On-demand Function Configuration in Edge Computing.- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer.- Self-attention Based Collaborative Neural Network For Recommendation.- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage.- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy.- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee.- Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements.- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient.- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing.- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System.- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids.- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM.- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation.- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring.- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions.- OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints.- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks.- Building Trustful Crowdsensing Service on the Edge.- User Identity De-Anonymization Based on Attributes.- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks.- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation.- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation.- A Hybrid Approach for Recognizing Web Crawlers.- Contextual Combinatorial Cascading Thompson Sampling.- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory.- Short Paper.- Utility Aware Task Offloading for Mobile Edge Computing.- Analysis of Best Network Routing Structure for IoT.- Parallel Multicast Information Propagation Based on Social Influence.- Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications.- Optimal Routing of tight optimal Bidirectional Double-loop Networks

This item is Non-Returnable

Details

  • ISBN-13: 9783030235963
  • ISBN-10: 3030235963
  • Publisher: Springer
  • Publish Date: June 2019
  • Dimensions: 9.21 x 6.14 x 1.34 inches
  • Shipping Weight: 2.03 pounds
  • Page Count: 649

Related Categories

You May Also Like...

    1

BAM Customer Reviews