Wireless Algorithms, Systems, and Applications

15th International Conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings, Part I

Dongxiao Yu (Redaktør) ; Falko Dressler (Redaktør) ; Jiguo Yu (Redaktør)

Serie: Lecture Notes in Computer Science 12384

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. Les mer
Vår pris
1519,-

(Paperback) Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.

Vår pris: 1519,-

(Paperback) Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.

Om boka

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. These submissions cover many hot research topics, including machine-learning algorithms for wireless systems and applications, Internet of Things (IoTs) and related wireless solutions, wireless networking for cyber-physical systems (CPSs), security and privacy solutions for wireless applications, blockchain solutions for mobile applications, mobile edge computing, wireless sensor networks, distributed and localized algorithm design and analysis, wireless crowdsourcing, mobile cloud computing, vehicular networks, wireless solutions for smart cities, wireless algorithms for smart grids, mobile social networks, mobile system security, storage systems for mobile applications, etc.

Fakta

Innholdsfortegnelse

Full Papers.- Reinforcement Learning based Group Event Invitation Algorithm.- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness.- Maximizing The Expected In uence in Face of The Non-Progressive Adversary.- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain.- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System.- A Novel Blockchain Network Structure Based on Logical Nodes.- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks.- Learning-Aided Mobile Charging for Rechargeable Sensor Networks.- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications.- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing.- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union.- Approximation Algorithm for the Offloading Problem in Edge Computing.- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning.- Camera Style Guided Feature Generation for Person Re-Identification.- Sync or Fork: Node-Level Synchronization Analysis of Blockchain.- Multi-user Cooperative Computation Offloading in Mobile Edge Computing.- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER.- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System.- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation.- Multiset Synchronization with Counting Cuckoo Filters.- Privacy-Aware Online Task Offloading for Mobile-Edge Computing.- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition.- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks.- Optimizing Motion Estimation With an ReRAM-based PIM Architecture.- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM.- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning.- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT.- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks.- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks.- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction.- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation.- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data.- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game.- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks.- An improved parallel network tra c anomaly detection