Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings

This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with...

Full description

Bibliographic Details
Other Authors: Biagioni, Edoardo S. (Editor), Zheng, Yao (Editor), Cheng, Siyao (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2019, 2019
Edition:1st ed. 2019
Series:Theoretical Computer Science and General Issues
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 06549nmm a2200445 u 4500
001 EB001869474
003 EBX01000000000000001032848
005 00000000000000.0
007 cr|||||||||||||||||||||
008 190716 ||| eng
020 |a 9783030235970 
100 1 |a Biagioni, Edoardo S.  |e [editor] 
245 0 0 |a Wireless Algorithms, Systems, and Applications  |h Elektronische Ressource  |b 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedings  |c edited by Edoardo S. Biagioni, Yao Zheng, Siyao Cheng 
250 |a 1st ed. 2019 
260 |a Cham  |b Springer International Publishing  |c 2019, 2019 
300 |a XV, 649 p. 276 illus., 195 illus. in color  |b online resource 
505 0 |a Full Paper -- Decomposable Atomic Norm Minimization Channel Estimation for Millimeter Wave MIMO-OFDM Systems -- Model based Adaptive Data Acquisition for Internet of Things -- Hybrid Low Frequency Electromagnetic Field and Solar Energy Harvesting Architecture for Self-Powered Wireless Sensor System -- Automated and Personalized Privacy Policy Extraction under GDPR Consideration -- Cooperative BSM dissemination in DSRC/WAVE based Vehicular Networks -- TIDS: Trust Intrusion Detection System based on Double Cluster Heads for WSNs -- An Efficient Revocable Attribute-based Signcryption Scheme with Outsourced Designcryption in Cloud Computing -- Massive MIMO Cognitive Cooperative Relaying -- Minimum Control Cost of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model -- Who leaks my privacy: Towards Automatic and Association Detection with GDPR Compliance --  
505 0 |a Trustroam: A Novel Blockchain-based Cross-Domain Authentication Scheme for Wi-Fi Access -- Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks towards Reliable Data Storage -- Fusing RFID and Computer Vision for Occlusion-Aware Object Identifying and Tracking -- Spatiotemporal Feature Extraction for Pedestrian Re-identification -- Detecting Android Side Channel Probing Attacks Based on System States -- Online DAG Scheduling with On-demand Function Configuration in Edge Computing -- Magnetic Beamforming Algorithm for Hybrid Relay and MIMO Wireless Power Transfer -- Self-attention Based Collaborative Neural Network For Recommendation -- An Efficient and Recoverable Data Sharing Mechanism for Edge Storage -- Trajectory Comparison in a Vehicular Network II: Eliminating the Redundancy -- Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee --  
505 0 |a OWLS: Opportunistic Wireless Link Scheduling with SINR Constraints -- Distributed Real-time Data Aggregation Scheduling in Duty-Cycled Multi-hop Sensor Networks -- Building Trustful Crowdsensing Service on the Edge -- User Identity De-Anonymization Based on Attributes -- Detecting Anomalies in Communication Packet Streams based on Generative Adversarial Networks -- Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation -- Deep Neural Model for Point-of-interest Recommendation Fused with Graph Embedding Representation -- A Hybrid Approach for Recognizing Web Crawlers -- Contextual Combinatorial Cascading Thompson Sampling -- Trajectory Comparison in a Vehicular Network I: Computing a Consensus Trajectory -- Short Paper -- Utility Aware Task Offloading for Mobile Edge Computing -- Analysis of Best Network Routing Structure for IoT -- Parallel Multicast Information Propagation Based on Social Influence --  
505 0 |a Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements -- Optimal Transportation Network Company Vehicle Dispatching via Deep Deterministic Policy Gradient -- Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing -- Evolutionary Game Based Gateway Selection Algorithm in Cyber-Physical System -- Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids -- ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction -- Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain -- A Location Predictive Model Based on 2D Angle data for HAPS Using LSTM -- Cross-layer Optimization on Charging Strategy for Wireless Sensor Networks Based on Successive Interference Cancellation -- An Integrated UAV Platform for Real-time and Efficient Environmental Monitoring -- CXNet-m2: A Deep Model with Visual and Clinical Contexts for Image-based Detection of Multiple Lesions --  
505 0 |a Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications -- Optimal Routing of tight optimal Bidirectional Double-loop Networks -- DDSEIR: a dynamic rumor spreading model in online social networks -- Data Forwarding and Caching Strategy for RSU Aided V-NDN -- Lightweight IoT Malware Visualization Analysis via Two-Bits Networks -- Privacy Protection Sensing Data Aggregation for Crowd Sensing -- A new outsourced data deletion scheme with public verifiability -- DPSR: A Differentially Private Social Recommender System for Mobile Users. 
653 |a Computer Communication Networks 
653 |a Computer simulation 
653 |a Artificial Intelligence 
653 |a Computer Modelling 
653 |a Computers 
653 |a Computer networks  
653 |a Data protection 
653 |a Artificial intelligence 
653 |a Data and Information Security 
653 |a Computing Milieux 
700 1 |a Zheng, Yao  |e [editor] 
700 1 |a Cheng, Siyao  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Theoretical Computer Science and General Issues 
028 5 0 |a 10.1007/978-3-030-23597-0 
856 4 0 |u https://doi.org/10.1007/978-3-030-23597-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.