Wireless algorithms, systems, and applications : 15th international conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings. Part II / Dongxiao Yu, Falko Dressler, Jiguo Yu, (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 12385. | LNCS sublibrary. SL 1, Theoretical computer science and general issues.Publisher: Cham, Switzerland : Springer, [2020]Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783030590192
- 3030590194
- WASA 2020
- Wireless communication systems -- Management -- Congresses
- Mobile computing -- Congresses
- Transmission sans fil -- Gestion -- Congrès
- Informatique mobile -- Congrès
- Information technology: general issues
- Computer security
- Expert systems -- knowledge-based systems
- Information retrieval
- Network hardware
- Computers -- Social Aspects -- Human-Computer Interaction
- Computers -- Security -- General
- Computers -- Expert Systems
- Computers -- Information Technology
- Computers -- Hardware -- Network Hardware
- Wireless communication systems -- Management
- Mobile computing
- Application software
- Computer networks
- Computers
- Computers, Special purpose
- Data protection
- 621.3845/6 23
- TK5103.2 .W38 2020
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
Includes author index.
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. The papers focus on data path algorithms; control path algorithms; network protocol design; network security; network services; and cloud computing.
Online resource; title from digital title page (viewed on October 30, 2020).
References
Intro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Short Papers -- Cluster-Based Basic Safety Message Dissemination in VANETs -- 1 Introduction -- 2 System Model and Problem Description -- 3 Cluster Formation Algorithm -- 4 Cluster-Based BSM Dissemination Scheme -- 5 Performance Evaluation -- 6 Conclusion -- References -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- 1 Introduction -- 2 Problem Definition -- 3 Algorithm of Vehicle Detection -- 3.1 Moving Vehicle Detection -- 3.2 Static Vehicle Detection -- 3.3 Pseudo Code of Algorithm
4 Experiment -- 5 Conclusion -- References -- Estimation of Short-Term Online Taxi Travel Time Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 4 Model Architecture -- 4.1 The External Factors Part -- 4.2 The Spatio-Temporal Learning Part -- 4.3 The Auxiliary Learning Part -- 4.4 Model Training -- 5 Experiments -- 6 Conclusion -- References -- Research on Algorithms for Finding Top-K Nodes in Campus Collaborative Learning Community Under Mobile Social Network -- 1 Introduction -- 2 Research Status -- 3 Correlation Theory -- 3.1 Node Correlation
3.2 Node Accessibility -- 3.3 Node Contact Centrality CV -- 4 Algorithm Design -- 4.1 General Update Algorithm(Ye) -- 4.2 Update Algorithm Based on Accessibility(Tua) -- 4.3 Update Algorithm Based on Accessibility and Learning Centrality (Nla) -- 4.4 Evolutionary Algorithm(NC) -- 5 Experiment -- 5.1 Description of the Experiment -- 5.2 Experimental Results and Analysis -- 5.3 Outlook -- References -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- 1 Introduction -- 2 Background and Preliminary Knowledge -- 2.1 Version Strings in Components
2.2 Function Calling Convention -- 2.3 Intermediate Representation -- 3 Framework and Algorithm -- 3.1 Method Overview -- 3.2 Pre-processing -- 3.3 Data-Flow of Arguments -- 3.4 Version Arguments Extraction -- 3.5 Stack Space Recover -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy and Efficiency -- 4.3 Implement in Real-World -- 5 Related Work -- 6 Conclusion -- References -- Virtual Location Generation for Location Privacy Protection in VANET -- 1 Introduction -- 2 Problem Description and Virtual Location Generation -- 2.1 Problem Description -- 2.2 PDF of d -- 2.3 PDF of
2.4 Virtual Location Generation -- 3 Attack Model of Adversaries -- 4 Performance Evaluation Metrics -- 4.1 Qos Loss Metric -- 4.2 Location Privacy Metric -- 5 Numerical Analysis -- 6 Conclusion -- References -- Reliable Visible Light-Based Underground Localization Utilizing a New Mechanism: Reverse Transceiver Position -- 1 Introduction -- 2 Algorithm Overview -- 3 Locate Miners by Base Station -- 3.1 Frequency Selection -- 3.2 Frequency Identification -- 3.3 Frequency Power Tracking -- 4 Algorithm Experiments -- 4.1 Experimental Device and Environment -- 4.2 Algorithm Evaluation -- 5 Conclusion