Ubiquitous Networking: Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers: Lecture Notes in Computer Science, cartea 10542
Editat de Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbahen Limba Engleză Paperback – 9 noi 2017
The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications.
Din seria Lecture Notes in Computer Science
- 15% Preț: 549.48 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 256.27 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 315.19 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 554.59 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 560.32 lei
- 20% Preț: 548.35 lei
- 20% Preț: 319.10 lei
- 20% Preț: 611.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 315.78 lei
- 20% Preț: 172.69 lei
- 20% Preț: 1339.86 lei
- Preț: 361.23 lei
- 20% Preț: 969.58 lei
- 20% Preț: 722.40 lei
- 20% Preț: 782.28 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 722.90 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 550.29 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.64 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 333.23 lei
Preț vechi: 416.54 lei
-20% Nou
Puncte Express: 500
Preț estimativ în valută:
63.78€ • 68.58$ • 53.17£
63.78€ • 68.58$ • 53.17£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319681788
ISBN-10: 3319681788
Pagini: 663
Ilustrații: XXV, 659 p. 278 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.95 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications
Locul publicării:Cham, Switzerland
ISBN-10: 3319681788
Pagini: 663
Ilustrații: XXV, 659 p. 278 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.95 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications
Locul publicării:Cham, Switzerland
Cuprins
Context-Awareness and Autonomy Paradigms.- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks.- Routing Game On the Line: The Case Of Multiple Players.- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks.- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks.- Quality of Experience in HTTP Adaptive Video Streaming Systems.- Community Detection through Topic Modeling in Social Networks.- A Formal Framework for Adaptation.- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance.- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks.- A new Data Forwarding Scheme for DTNs based on Coalition Game.- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks.- Mobile Edge Networking and Virtualization.- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development.- A Simulation Framework for IT Governance in the Context of Corporate Relocation.- NGN Management with NGOSS Framework-Based IMS Use Case.- Migration from Web Services to Cloud Services.- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing.- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems.- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing.- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage.- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model.- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation.- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs.- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship.- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid.- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID.- Group Authentication with Fault Tolerance for Internet of Things.- Fully Distributed Indexing over a Distributed Hash Table.- IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System.- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks.- Adopting Fuzzy Technique to Save Energy in Smart Home Control System.- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks.- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol.- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications.- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach.- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment.- Toward a new extension of IPv6 addressing to connect non IP objects.- Enablers, Challenges and Applications.- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems.- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link.- Robust Trajectory Planning for Robotic Communications under Fading Channels.- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel.- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS.- Implementation and Performance Evaluation of Network Intrusion Detection Systems.- An Efficient Authentication Protocol for 5G Heterogeneous Networks.- An Agreement graph-based-authentication scheme for 5G networks.- Green Base Station Placement for Microwave Backhaul Links.- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems.- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems.- An Improved Bernoulli Sensing Matrix For Compressive Sensing.- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix.- Adaptive Mapping for Multiple Applications on Parallel Architectures.- Verification of SystemC Components using the Method of Deduction.- Image Segmentation by Deep Community Detection Approach.- Data Mining Approaches for Alzheimer's Disease Diagnosis.- Image Search Engine based on Color Histogram and Zernike Moment.- Risk Assessment and Alert Prioritization for Intrusion Detection Systems.
Caracteristici
Includes supplementary material: sn.pub/extras