Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Preface; Organization; General Chairs; Steering Committee; Publicity Chairs; Workshop Chair; Publication Chair; Program Chair; Financial Chairs; Organizers and Supporters ; Program Committee; Contents; Ubiquitous Computing; Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMP; Abstract; 1 Introduction; 2 CoMP and Semi-smart Antennas; 3 Genetic Algorithm Configuration; 3.1 Encoding and Decoding; 3.2 Fitness Function; 3.3 Constraint Handling; 3.4 Simulation Parameters; 4 Simulation Result; 5 Conclusion; References

Privacy in Location Based Services: Protection Strategies, Attack Models and Open ChallengesAbstract; 1 Introduction; 1.1 Location Privacy and Its Need; 2 Privacy Protection Strategies and Mechanisms; 2.1 Regulatory Strategies; 2.2 Policy Based; 2.3 Location Obfuscation; 2.4 Data Transformation; 2.5 PIR Based Location Privacy; 3 Common Attacks and Challenges in Location Privacy; 4 Open Challenges and Future Research Directions; 5 Conclusion; References; An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor Networks; 1 Introduction; 2 The Details of DUOR

2.1 Every Node Updates Its Own Hop-Count2.2 The Sensor Node Sends the Packet; 2.3 The Intermediate Nodes Forward the Packet; 2.4 The Sink Node Receives the Packet; 3 Simulations and Discussions; References; A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone Sensors; Abstract; 1 Introduction; 2 The Mobile Online Vehicle Status Awareness System (MOVSAS); 2.1 Data Preprocessing; 2.2 Using PCA for Feature Selection; 2.3 Online Training Model; 3 Experiment and Results; 3.1 Experiment Environment; 3.2 Data Collection; 3.3 The Accuracy of Vehicle Status Awareness

3.4 The Processing Time4 The Conclusion and Future Work; References; A Study on OPNET State Machine Model Based IoT Network Layer Test; Abstract; 1 Introduction; 2 OPNET Modelling for Test Case Generation; 2.1 IoT Network Layer and OPNET Simulation; 2.2 Network Layer State Machine for Test Case Generation; 3 Experiment Result and Analysis; 4 Conclusions; References; A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks; Abstract; 1 Introduction; 2 Confidence Constraint Based Secure Localization Algorithm

2.1 Confidence Constraint of Reference Nodes2.2 Confidence Constraint Satisfaction Problem; 3 Performance Evaluation; Acknowledgment; References; Networks and Information Systems; Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian Network; Abstract; 1 Introduction; 2 Method; 2.1 Preliminaries; 2.2 Algorithm; 3 Result; 4 Conclusion; Acknowledgement; References; AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure Network; Abstract; 1 Introduction; 2 AMI Network Architecture; 3 The Design of AMI Network Simulator

Browse Subjects

Show more subjects...

Statistics

from
to
Export