Wireless Algorithms, Systems, and Applications [electronic resource] : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings / edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, Kai Xing.
Record details
- ISBN: 9783642397011
- Physical Description: XIV, 536 p. 231 illus. online resource.
- Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : 2013.
Search for related items by subject
Search for related items by series
Electronic resources
| Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems | ||
| Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD | ||
| Buffer Occupation in Wireless Social Networks | ||
| Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices | ||
| A Network Forensics System for Information Leak Events | ||
| Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment | ||
| An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems | ||
| A Novel Delay-Resilient Remote Memory Attestation for Smart Grid | ||
| A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines | ||
| Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks | ||
| SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation | ||
| A Context-Aware MAC Protocol for VANETs | ||
| ^ | ||
| A Balance Storage Nodes Assignment for Wireless Sensor Networks | ||
| A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory | ||
| UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs | ||
| A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks | ||
| Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks | ||
| Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks | ||
| ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals | ||
| From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View | ||
| Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels | ||
| Patientâs Motion Recognition Based on SOM-Decision Tree | ||
| Range-Free Mobile Node Localization Using Static Anchor | ||
| ^ | ||
| ^^ | ||
| Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network | ||
| Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation | ||
| An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems | ||
| Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD | ||
| Buffer Occupation in Wireless Social Networks | ||
| Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices | ||
| A Network Forensics System for Information Leak Events | ||
| Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment | ||
| An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems | ||
| A Novel Delay-Resilient Remote Memory Attestation for Smart Grid | ||
| A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines | ||
| ^ | ||
| ^^ | ||
| Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks | ||
| SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation | ||
| A Context-Aware MAC Protocol for VANETs | ||
| A Balance Storage Nodes Assignment for Wireless Sensor Networks | ||
| A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory | ||
| UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs | ||
| A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks | ||
| Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks | ||
| Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks | ||
| ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals | ||
| From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View | ||
| ^ | ||
| ^^ | ||
| Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels | ||
| Patientâs Motion Recognition Based on SOM-Decision Tree | ||
| Range-Free Mobile Node Localization Using Static Anchor | ||
| Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network | ||
| Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation | ||
| An Urban Area-Oriented Traffic Information Query Strategy in VANETs | ||
| Navigation for Indoor Mobile Robot Based on Wireless Sensor Network | ||
| iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing | ||
| Social Welfare Maximization in Participatory Smartphone Sensing | ||
| An Optimal Solution for Round Rotation Time Setting in LEACH | ||
| UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks | ||
| FMAC for Coexisting Ad Hoc Cognitive Radio Networks | ||
| Effective RSS Sampling for Forensic Wireless Localization | ||
| ^ | ||
| ^^ | ||
| An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks | ||
| Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks | ||
| Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming | ||
| Photo Forensics on Shanzhai Mobile Phone | ||
| Local Information Storage Protocol for Urban Vehicular Networks | ||
| Maximum Independent Set of Links with Power Control | ||
| Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes | ||
| The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network | ||
| Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks | ||
| Social Communications Assisted Epidemic Disease Influence Minimization. | ||
| ^^ |