000944854 000__ 07092cam\a2200577Ii\4500 000944854 001__ 944854 000944854 005__ 20230306152312.0 000944854 006__ m\\\\\o\\d\\\\\\\\ 000944854 007__ cr\nn\nnnunnun 000944854 008__ 200925s2020\\\\sz\a\\\\o\\\\\101\0\eng\d 000944854 019__ $$a1197573600$$a1197840675 000944854 020__ $$a9783030590161$$q(electronic book) 000944854 020__ $$a303059016X$$q(electronic book) 000944854 020__ $$z9783030590154 000944854 0247_ $$a10.1007/978-3-030-59016-1$$2doi 000944854 0248_ $$a10.1007/978-3-030-59 000944854 035__ $$aSP(OCoLC)on1198379735 000944854 035__ $$aSP(OCoLC)1198379735$$z(OCoLC)1197573600$$z(OCoLC)1197840675 000944854 040__ $$aLQU$$beng$$cLQU$$dUPM$$dOCLCO$$dEBLCP$$dGW5XE$$dNOC$$dOCLCF$$dNLW 000944854 049__ $$aISEA 000944854 050_4 $$aQA76.9.A43 000944854 08204 $$a004.6$$223 000944854 1112_ $$aWASA (Conference)$$n(15th :$$d2020 :$$cOnline) 000944854 24510 $$aWireless algorithms, systems, and applications :$$b15th International Conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings.$$nPart I /$$cDongxiao Yu, Falko Dressler, Jiguo Yu (eds.). 000944854 2463_ $$aWASA 2020 000944854 264_1 $$aCham :$$bSpringer,$$c2020. 000944854 300__ $$a1 online resource (xviii, 838 pages) :$$billustrations. 000944854 336__ $$atext$$btxt$$2rdacontent 000944854 337__ $$acomputer$$bc$$2rdamedia 000944854 338__ $$aonline resource$$bcr$$2rdacarrier 000944854 4901_ $$aLecture Notes in Computer Science ;$$v12384 000944854 4901_ $$aLNCS sublibrary, SL 1, Theoretical computer science and general issues 000944854 500__ $$aInternational conference proceedings. 000944854 500__ $$a"The 15th International Conference on Wireless Algorithms, Systems, and Applications(WASA 2020) was held virtually during September 13-15, 2020." 000944854 500__ $$aIncludes author index. 000944854 5050_ $$aAsed on Tri-net -- Data integrity checking supporting reliable data migration in cloud storage -- A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks -- A Real-time Recommendation Algorithm for Task Allocation in Mobile Crowd Sensing -- A DUAL SCALE MATCHING MODEL FOR LONG-TERM ASSOCIATION -- A Real-time Vehicle Logo Detection Method Based on Improved YOLOv2 -- SEM: App Usage Prediction with Session-based Embedding -- Intelligent Dynamic Spectrum Access for Uplink Underlay Cognitive Radio Networks Based on Q-Learning -- A Trajectory-Privacy Protection Method based on Location Similarity of Query Destinations in Continuous LBS Queries -- Reliable Potential Friends Identification Based on Trust Circuit for Social Recommendation -- GaitID: Robust Wi-Fi Based Gait Recognition -- Optimal Node Placement for Magnetic Relay and MIMO Wireless Power Transfer Network -- EdgeCC: An authentication framework for the fast migration of edge services under mobile clients -- Attention-based Dynamic Preference Model for Next Point-of-Interest Recommendation -- From When to Where: A Multi-task Learning Approach for Next Point-of-Interest Recommendation -- An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments -- HotDAG: Hybrid Consensus via Sharding in the Permissionless Model -- Distributed Data Aggregation in Dynamic Sensor Networks ssel Networks based on Bi-LSTM -- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning -- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT -- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks -- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks -- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction -- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation -- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data -- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game -- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks -- An improved parallel network tra c anomaly detection method based on Bagging and GRU -- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs -- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing -- A Survey: Applications of Blockchains in the Internet of Vehicles -- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography -- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage -- A New Fully Homomorphic Signatures from Standard Lattices -- An Efficient Malicious User Detection Mechanism for Crowdsensing System -- Implementation of Video Transmission over Maritime Ad Hoc Network -- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing -- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme -- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs -- Consensus in Wireless Blockchain System -- Blockchain-based Service Recommendation Supporting Data Sharing -- Multi-objective disaster backup in inter-datacenter using reinforcement learning -- Detecting Internet-scale NATs for IoT Devices B. 000944854 506__ $$aAccess limited to authorized users. 000944854 520__ $$aThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. These submissions cover many hot research topics, including machine-learning algorithms for wireless systems and applications, Internet of Things (IoTs) and related wireless solutions, wireless networking for cyber-physical systems (CPSs), security and privacy solutions for wireless applications, blockchain solutions for mobile applications, mobile edge computing, wireless sensor networks, distributed and localized algorithm design and analysis, wireless crowdsourcing, mobile cloud computing, vehicular networks, wireless solutions for smart cities, wireless algorithms for smart grids, mobile social networks, mobile system security, storage systems for mobile applications, etc. 000944854 650_0 $$aWireless communication systems$$vCongresses. 000944854 650_0 $$aComputer networks. 000944854 650_0 $$aData protection. 000944854 7001_ $$aYu, Dongxiao. 000944854 7001_ $$aDressler, Falko. 000944854 7001_ $$aYu, Jiguo. 000944854 77608 $$iPrint version:$$aYu, Dongxiao$$tWireless Algorithms, Systems, and Applications : 15th International Conference, WASA 2020, Qingdao, China, September 13-15, 2020, Proceedings, Part I$$dCham : Springer International Publishing AG,c2020$$z9783030590154 000944854 830_0 $$aLecture notes in computer science ;$$v12384. 000944854 830_0 $$aLNCS sublibrary.$$nSL 1,$$pTheoretical computer science and general issues. 000944854 852__ $$bebk 000944854 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-59016-1$$zOnline Access$$91397441.1 000944854 909CO $$ooai:library.usi.edu:944854$$pGLOBAL_SET 000944854 980__ $$aEBOOK 000944854 980__ $$aBIB 000944854 982__ $$aEbook 000944854 983__ $$aOnline 000944854 994__ $$a92$$bISE