Wireless Algorithms, Systems, and Applications
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > WAP (wireless) technology > Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings
Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings

Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings

|
     0     
5
4
3
2
1




International Edition


About the Book

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2012, held in Yellow Mountains, China, in August 2012. The 24 revised full papers presented together with 32 invited papers were carefully reviewed and selected from 116 submissions. The papers cover a wide range of topics such as cognitive radio networks, cyber-physical network systems, mobile handset networking systems, underwater and radar wireless networks, and wireless and mobile security.

Table of Contents:
Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: A Global Perspective.- HERO – A Home Based Routing in Pocket Switched Networks.- Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks.- AMPLE: A Novel Incentive Approach to Adaptive-Width Channel  Allocation in Multi-hop, Non-cooperative Wireless Networks.- Characterizing Home Network Traffic: An Inside View.- SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks.- A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks.- Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling.- SPSA Based Packet Size Optimization Algorithm in Wireless Sensor Networks.- Lower Bounds on Data Collection Time in Sensor Networks.- Minimum Total Communication Power Connected Dominating Set inWireless Networks.- Supporting Multi-level Quality of Services in Data Broadcast Systems.- Maximizing Network Topology Lifetime Using Mobile Node Rotation.- Joint Beamforming and Power Allocation Algorithm for Cognitive MIMO Systems via Game Theory.- Bit Allocation Scheme with Primary Base Station Cooperation in Cognitive Radio Network.- Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks.- Fast Group Communication Scheduling in Duty-Cycled Multihop Wireless Sensor Networks.- Reliable Cooperative Sensing in Cognitive Networks.- Heterogeneous Multicast Networks with Wireless Helping Networks.- Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic Truthful Multi-unit Double Auction for Spectrum Allocation inWireless Communications.-Joint Mobility and Heterogeneity for Connected k-Coverage in Sparsely Deployed Wireless Sensor Nets.- LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks.- Enhancing Performance and Reliability of RFID Middleware Using Mobile Agents.- An Improved Stochastic Decoding Algorithm of LTE Turbo Codes.- Robust Distributed Estimators for Wireless Sensor Networks withOne-Bit Quantized Data Robust Energy-Efficient Power Loading for MIMO System under Imperfect CSI.- Opportunistic Channel-Hopping Based Effective Rendezvous Establishment in Cognitive Radio Networks.- The Modeling and Analysis of Context and Cardinality Constraints.- Role-Based Authorization Mechanism.- A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement.- Forced Spectrum Access Termination Probability Analysis under Restricted Channel Handoff.- Energy-Efficient Robust Coverage under Uncertainty in Wireless Sensor Networks.- Optimizing Cauchy Reed-Solomon Codes for P2P Storage Cloud Aerial Localization with Smartphone.- A Framework of Fire Monitoring System Based on Sensor Networks.- Synchronized Flow-Based Evacuation Route Planning.- Group Multicast Capacity in Large Scale Wireless Networks.- Efficient Information Exchange in Single-Hop Multi-Channel Radio.- A Cache Based Multi-join Query Method with Two-Phase Processingin MANET.- Security Analysis of Opportunistic Networks Using Complex NetworkProperties.- Joint Optimization of Interface Assignment and Channel Allocation inCognitive Radio Mesh Networks.- MPSL: A Mobile Phone-Based Physical-Social Location Verification System.- Location Proof via Passive RFID Tags A New Complementary Code Set with Zero Correlation Window.- Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems.- On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad HocNetworks.- Active User Authentication for Mobile Devices.- Adaptive Power Controlled Routing for Underwater Sensor Networks.- Aqua-OS: An Operating System for Underwater Acoustic Networks.- Spectrum Efficiency of Nested Sparse HMPR: Forwarding Based on History Meeting Prediction Routing inOpportunistic Networks.- Bloom Filter-Based Ad Hoc Multicast Communication in Cyber-Physical Systems and Computational Materials.- On Wireless Network Infrastructure Optimization for Cyber-Physical Systems in Future Smart Buildings.- Building a Microscope for the Data Center.- Probabilistic Bandwidth Assignment in Wireless Sensor.- Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models.- Design and Spectrum Efficiency of a New Waveform Exploiting Spectrum Spatial Reusability for Routing in Multi-hop Wireless Networks.- Human Tracking for Daily Life Surveillance Based on a Wireless Sensor Network.- The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks.- Two Connected Dominating Set Algorithms for Wireless Sensor Networks.- A Cross-Layer Approach for Congestion Control in Real-Time Transmission in Wireless Sensor Networks.- A Theoretical Study on the Orientation Problem in Linear Wireless Sensor Networks.- Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domainWireless Networks.- Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: A Global Perspective.- HERO – A Home Based Routing in Pocket Switched Networks.- Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks.- AMPLE: A Novel Incentive Approach to Adaptive-Width Channel  Allocation in Multi-hop, Non-cooperative Wireless Networks.- Characterizing HomeNetwork Traffic: An Inside View.- SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks.- A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks.- Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling.- SPSA Based Packet Size Optimization Algorithm in Wireless Sensor Networks.- Lower Bounds on Data Collection Time in Sensor Networks.- Minimum Total Communication Power Connected Dominating Set inWireless Networks.- Supporting Multi-level Quality of Services in Data Broadcast Systems.- Maximizing Network Topology Lifetime Using Mobile Node Rotation.- Joint Beamforming and Power Allocation Algorithm for Cognitive MIMO Systems via Game Theory.- Bit Allocation Scheme with Primary Base Station Cooperation in Cognitive Radio Network.- Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks.- Fast Group Communication Scheduling in Duty-Cycled Multihop Wireless Sensor Networks.- Reliable Cooperative Sensing in Cognitive Networks.- Heterogeneous Multicast Networks with Wireless Helping Networks.- Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic Truthful Multi-unit Double Auction for Spectrum Allocation inWireless Communications.- Joint Mobility and Heterogeneity for Connected k-Coverage in Sparsely Deployed Wireless Sensor Nets.- LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks.- Enhancing Performance and Reliability of RFID Middleware Using Mobile Agents.- An Improved Stochastic Decoding Algorithm of LTE Turbo Codes.- Robust Distributed Estimators for Wireless Sensor Networks withOne-Bit Quantized Data Robust Energy-Efficient Power Loading for MIMO System under Imperfect CSI.- Opportunistic Channel-Hopping Based Effective RendezvousEstablishment in Cognitive Radio Networks The Modeling and Analysis of Context and Cardinality Constraints.- Role-Based Authorization Mechanism.- A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement.- Forced Spectrum Access Termination Probability Analysis under Restricted Channel Handoff.- Energy-Efficient Robust Coverage under Uncertainty in Wireless Sensor Networks.- Optimizing Cauchy Reed-Solomon Codes for P2P Storage Cloud Aerial Localization with Smartphone.- A Framework of Fire Monitoring System Based on Sensor Networks.- Synchronized Flow-Based Evacuation Route Planning.- Group Multicast Capacity in Large Scale Wireless Networks.- Efficient Information Exchange in Single-Hop Multi-Channel Radio.- A Cache Based Multi-join Query Method with Two-Phase Processingin MANET.- Security Analysis of Opportunistic Networks Using Complex NetworkProperties.- Joint Optimization of Interface Assignment and Channel Allocation inCognitive Radio Mesh Networks.- MPSL: A Mobile Phone-Based Physical-Social Location Verification System.- Location Proof via Passive RFID Tags A New Complementary Code Set with Zero Correlation Window.- Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems.- On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.- Active User Authentication for Mobile Devices.- Adaptive Power Controlled Routing for Underwater Sensor Networks.- Aqua-OS: An Operating System for Underwater Acoustic Networks,- Spectrum Efficiency of Nested Sparse HMPR: Forwarding Based on History Meeting Prediction Routing inOpportunistic Networks.-.Bloom Filter-Based Ad Hoc Multicast Communication in Cyber-Physical Systems and Computational Materials.- On Wireless Network Infrastructure Optimization for Cyber-Physical Systems in Future Smart Buildings.- Building a Microscope for the Data Center.- Probabilistic Bandwidth Assignment in Wireless Sensor.- Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models.- Design and Spectrum Efficiency of a New Waveform Exploiting Spectrum Spatial Reusability for Routing in Multi-hop Wireless Networks.- Human Tracking for Daily Life Surveillance Based on a Wireless Sensor Network.- The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks.- Two Connected Dominating Set Algorithms for Wireless Sensor Networks.- A Cross-Layer Approach for Congestion Control in Real-Time Transmission in Wireless Sensor Networks.- A Theoretical Study on the Orientation Problem in Linear Wireless Sensor Networks.- Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domainWireless Networks.


Best Sellers


Product Details
  • ISBN-13: 9783642318689
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
  • Publisher Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Height: 235 mm
  • No of Pages: 680
  • Returnable: Y
  • Width: 155 mm
  • ISBN-10: 3642318681
  • Publisher Date: 07 Jul 2012
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG -
Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Wireless Algorithms, Systems, and Applications: 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012, Proceedings

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!