//]]>

Wireless Algorithms, Systems, and Applications (Record no. 14262)

000 -LEADER
fixed length control field 12574nam a22005535i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310144108.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120810s2012 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642318696
978-3-642-31869-6
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A43
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.1
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2012.
912 ## -
-- ZDB-2-SCS
-- ZDB-2-LNC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wang, Xinbing.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Wireless Algorithms, Systems, and Applications
Medium [electronic resource] :
Remainder of title 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012. Proceedings /
Statement of responsibility, etc edited by Xinbing Wang, Rong Zheng, Tao Jing, Kai Xing.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 680 p. 295 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 7405
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: A Global Perspective -- HERO – A Home Based Routing in Pocket Switched Networks -- Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks -- AMPLE: A Novel Incentive Approach to Adaptive-Width Channel  Allocation in Multi-hop, Non-cooperative Wireless Networks -- Characterizing Home Network Traffic: An Inside View -- SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks -- A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks -- Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling -- SPSA Based Packet Size Optimization Algorithm in Wireless Sensor Networks -- Lower Bounds on Data Collection Time in Sensor Networks -- Minimum Total Communication Power Connected Dominating Set inWireless Networks -- Supporting Multi-level Quality of Services in Data Broadcast Systems -- Maximizing Network Topology Lifetime Using Mobile Node Rotation -- Joint Beamforming and Power Allocation Algorithm for Cognitive MIMO Systems via Game Theory -- Bit Allocation Scheme with Primary Base Station Cooperation in Cognitive Radio Network -- Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks -- Fast Group Communication Scheduling in Duty-Cycled Multihop Wireless Sensor Networks -- Reliable Cooperative Sensing in Cognitive Networks -- Heterogeneous Multicast Networks with Wireless Helping Networks -- Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic Truthful Multi-unit Double Auction for Spectrum Allocation inWireless Communications -- Joint Mobility and Heterogeneity for Connected k-Coverage in Sparsely Deployed Wireless Sensor Nets -- LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks -- Enhancing Performance and Reliability of RFID Middleware Using Mobile Agents -- An Improved Stochastic Decoding Algorithm of LTE Turbo Codes -- Robust Distributed Estimators for Wireless Sensor Networks withOne-Bit Quantized Data Robust Energy-Efficient Power Loading for MIMO System under Imperfect CSI -- Opportunistic Channel-Hopping Based Effective Rendezvous Establishment in Cognitive Radio Networks -- The Modeling and Analysis of Context and Cardinality Constraints -- Role-Based Authorization Mechanism -- A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement -- Forced Spectrum Access Termination Probability Analysis under Restricted Channel Handoff -- Energy-Efficient Robust Coverage under Uncertainty in Wireless Sensor Networks -- Optimizing Cauchy Reed-Solomon Codes for P2P Storage Cloud Aerial Localization with Smartphone -- A Framework of Fire Monitoring System Based on Sensor Networks -- Synchronized Flow-Based Evacuation Route Planning -- Group Multicast Capacity in Large Scale Wireless Networks -- Efficient Information Exchange in Single-Hop Multi-Channel Radio -- A Cache Based Multi-join Query Method with Two-Phase Processingin MANET -- Security Analysis of Opportunistic Networks Using Complex NetworkProperties -- Joint Optimization of Interface Assignment and Channel Allocation inCognitive Radio Mesh Networks -- MPSL: A Mobile Phone-Based Physical-Social Location Verification System -- Location Proof via Passive RFID Tags A New Complementary Code Set with Zero Correlation Window -- Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems -- On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks -- Active User Authentication for Mobile Devices -- Adaptive Power Controlled Routing for Underwater Sensor Networks -- Aqua-OS: An Operating System for Underwater Acoustic Networks -- Spectrum Efficiency of Nested Sparse HMPR: Forwarding Based on History Meeting Prediction Routing inOpportunistic Networks -- Bloom Filter-Based Ad Hoc Multicast Communication in Cyber-Physical Systems and Computational Materials -- On Wireless Network Infrastructure Optimization for Cyber-Physical Systems in Future Smart Buildings -- Building a Microscope for the Data Center -- Probabilistic Bandwidth Assignment in Wireless Sensor -- Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models -- Design and Spectrum Efficiency of a New Waveform Exploiting Spectrum Spatial Reusability for Routing in Multi-hop Wireless Networks -- Human Tracking for Daily Life Surveillance Based on a Wireless Sensor Network -- The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks -- Two Connected Dominating Set Algorithms for Wireless Sensor Networks -- A Cross-Layer Approach for Congestion Control in Real-Time Transmission in Wireless Sensor Networks -- A Theoretical Study on the Orientation Problem in Linear Wireless Sensor Networks -- Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domainWireless Networks -- Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: A Global Perspective -- HERO – A Home Based Routing in Pocket Switched Networks -- Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks -- AMPLE: A Novel Incentive Approach to Adaptive-Width Channel  Allocation in Multi-hop, Non-cooperative Wireless Networks -- Characterizing Home Network Traffic: An Inside View -- SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks -- A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks -- Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling -- SPSA Based Packet Size Optimization Algorithm in Wireless Sensor Networks -- Lower Bounds on Data Collection Time in Sensor Networks -- Minimum Total Communication Power Connected Dominating Set inWireless Networks -- Supporting Multi-level Quality of Services in Data Broadcast Systems -- Maximizing Network Topology Lifetime Using Mobile Node Rotation -- Joint Beamforming and Power Allocation Algorithm for Cognitive MIMO Systems via Game Theory -- Bit Allocation Scheme with Primary Base Station Cooperation in Cognitive Radio Network -- Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks -- Fast Group Communication Scheduling in Duty-Cycled Multihop Wireless Sensor Networks -- Reliable Cooperative Sensing in Cognitive Networks -- Heterogeneous Multicast Networks with Wireless Helping Networks -- Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic Truthful Multi-unit Double Auction for Spectrum Allocation inWireless Communications -- Joint Mobility and Heterogeneity for Connected k-Coverage in Sparsely Deployed Wireless Sensor Nets -- LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks -- Enhancing Performance and Reliability of RFID Middleware Using Mobile Agents -- An Improved Stochastic Decoding Algorithm of LTE Turbo Codes -- Robust Distributed Estimators for Wireless Sensor Networks withOne-Bit Quantized Data Robust Energy-Efficient Power Loading for MIMO System under Imperfect CSI -- Opportunistic Channel-Hopping Based Effective RendezvousEstablishment in Cognitive Radio Networks The Modeling and Analysis of Context and Cardinality Constraints -- Role-Based Authorization Mechanism -- A Multiple Access Game Based MAC Protocol for Fairness Provisioning and Throughput Enhancement -- Forced Spectrum Access Termination Probability Analysis under Restricted Channel Handoff -- Energy-Efficient Robust Coverage under Uncertainty in Wireless Sensor Networks -- Optimizing Cauchy Reed-Solomon Codes for P2P Storage Cloud Aerial Localization with Smartphone -- A Framework of Fire Monitoring System Based on Sensor Networks -- Synchronized Flow-Based Evacuation Route Planning -- Group Multicast Capacity in Large Scale Wireless Networks -- Efficient Information Exchange in Single-Hop Multi-Channel Radio -- A Cache Based Multi-join Query Method with Two-Phase Processingin MANET -- Security Analysis of Opportunistic Networks Using Complex NetworkProperties -- Joint Optimization of Interface Assignment and Channel Allocation inCognitive Radio Mesh Networks -- MPSL: A Mobile Phone-Based Physical-Social Location Verification System -- Location Proof via Passive RFID Tags A New Complementary Code Set with Zero Correlation Window -- Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems -- On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks -- Active User Authentication for Mobile Devices -- Adaptive Power Controlled Routing for Underwater Sensor Networks -- Aqua-OS: An Operating System for Underwater Acoustic Networks,- Spectrum Efficiency of Nested Sparse HMPR: Forwarding Based on History Meeting Prediction Routing inOpportunistic Networks.-.Bloom Filter-Based Ad Hoc Multicast Communication in Cyber-Physical Systems and Computational Materials -- On Wireless Network Infrastructure Optimization for Cyber-Physical Systems in Future Smart Buildings -- Building a Microscope for the Data Center -- Probabilistic Bandwidth Assignment in Wireless Sensor -- Secondary User Monitoring in Unslotted Cognitive Radio Networks with Unknown Models -- Design and Spectrum Efficiency of a New Waveform Exploiting Spectrum Spatial Reusability for Routing in Multi-hop Wireless Networks -- Human Tracking for Daily Life Surveillance Based on a Wireless Sensor Network -- The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks -- Two Connected Dominating Set Algorithms for Wireless Sensor Networks -- A Cross-Layer Approach for Congestio.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2012, held in Yellow Mountains, China, in August 2012. The 24 revised full papers presented together with 32 invited papers were carefully reviewed and selected from 116 submissions. The papers cover a wide range of topics such as cognitive radio networks, cyber-physical network systems, mobile handset networking systems, underwater and radar wireless networks, and wireless and mobile security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Computer system performance.
Topical term or geographic name as entry element Software engineering.
Topical term or geographic name as entry element Computer software.
Topical term or geographic name as entry element Information storage and retrieval systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Information Systems Applications (incl. Internet).
Topical term or geographic name as entry element Software Engineering.
Topical term or geographic name as entry element System Performance and Evaluation.
Topical term or geographic name as entry element Information Storage and Retrieval.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zheng, Rong.
Relator term editor.
Personal name Jing, Tao.
Relator term editor.
Personal name Xing, Kai.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642318689
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-31869-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-03-31AUM Main Library2014-03-31 2014-03-31 E-Book   AUM Main Library005.1

Languages: 
English |
العربية