Wireless Algorithms, Systems, and Applications 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings /

This book constitutes the refereed proceedings of the 4th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009, held in Boston, MA, USA, in August 2009. The 36 revised full papers presented together with 15 invited papers and 7 workshop papers were carefully r...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Liu, Benyuan (Επιμελητής έκδοσης), Bestavros, Azer (Επιμελητής έκδοσης), Du, Ding-Zhu (Επιμελητής έκδοσης), Wang, Jie (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Lecture Notes in Computer Science, 5682
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 07835nam a22006015i 4500
001 978-3-642-03417-6
003 DE-He213
005 20170118034002.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642034176  |9 978-3-642-03417-6 
024 7 |a 10.1007/978-3-642-03417-6  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Wireless Algorithms, Systems, and Applications  |h [electronic resource] :  |b 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings /  |c edited by Benyuan Liu, Azer Bestavros, Ding-Zhu Du, Jie Wang. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XV, 594 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5682 
505 0 |a Applications, Experimentation, Power Management -- Long-Term Animal Observation by Wireless Sensor Networks with Sound Recognition -- Experimental Study on Mobile RFID Performance -- Experimental Study on Secure Data Collection in Vehicular Sensor Networks -- Experimental Study of Independent and Dominating Sets in Wireless Sensor Networks Using Graph Coloring Algorithms -- A Comparison of Block-Based and Clip-Based Cooperative Caching Techniques for Streaming Media in Wireless Home Networks -- Dynamic Power Management for Sensor Node in WSN Using Average Reward MDP -- Energy Consumption of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies -- Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks -- RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks -- Coverage, Detection, and Topology Control -- Energy-Efficient Composite Event Detection in Wireless Sensor Networks -- ?-Net Approach to Sensor k-Coverage -- Biologically-Inspired Target Recognition in Radar Sensor Networks -- Stochastic k-Coverage in Wireless Sensor Networks -- Herd-Based Target Tracking Protocol in Wireless Sensor Networks -- Minimum Interference Planar Geometric Topology in Wireless Sensor Networks -- Topology Inference in Wireless Mesh Networks -- Maximum Independent Set of Links under Physical Interference Model -- Routing, Querying, and Data Collection -- CSR: Constrained Selfish Routing in Ad-Hoc Networks -- Multicast Extensions to the Location-Prediction Based Routing Protocol for Mobile Ad Hoc Networks -- AGSMR: Adaptive Geo-Source Multicast Routing for Wireless Sensor Networks -- On the Capacity of Hybrid Wireless Networks with Opportunistic Routing -- NQAR: Network Quality Aware Routing in Wireless Sensor Networks -- A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks -- Workload-Driven Compressed Skycube Queries in Wireless Applications -- Routing-Aware Query Optimization for Conserving Energy in Wireless Sensor Networks -- In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks -- Throughput Potential of Overlay Cognitive Wireless Mesh Networks -- Data Collection with Multiple Sinks in Wireless Sensor Networks -- Communication in Naturally Mobile Sensor Networks -- Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks -- Localization, Security, and Services -- Distributed Range-Free Localization Algorithm Based on Self-Organizing Maps -- Location Discovery in SpeckNets Using Relative Direction Information -- Providing Source-Location Privacy in Wireless Sensor Networks -- Fully Decentralized, Collaborative Multilateration Primitives for Uniquely Localizing WSNs -- Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks -- A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs -- Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding -- A Secure Framework for Location Verification in Pervasive Computing -- to Mobile Trajectory Based Services: A New Direction in Mobile Location Based Services -- Spectrally Efficient Frequency Hopping System Design under Hostile Jamming -- A QoS Framework with Traffic Request in Wireless Mesh Network -- Scheduling and Resource Management -- An Approximation Algorithm for Conflict-Aware Many-to-One Data Aggregation Scheduling in Wireless Sensor Networks -- On Approximation Algorithms for Interference-Aware Broadcast Scheduling in 2D and 3D Wireless Sensor Networks -- Dynamic Scheduling of Pigeons for Delay Constrained Applications -- Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks -- Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks -- Traffic-Aware Channel Assignment in Wireless Sensor Networks -- Sniffer Channel Selection for Monitoring Wireless LANs -- Uplink Resource Management Design in Multi-access Wireless Networks -- Throughput Measurement-Based Access Point Selection for Multi-rate Wireless LANs -- Online Social Networks, Applications, and Systems -- Latency-Bounded Minimum Influential Node Selection in Social Networks -- Design and Implementation of Davis Social Links OSN Kernel -- Information Extraction as Link Prediction: Using Curated Citation Networks to Improve Gene Detection -- Social Network Privacy via Evolving Access Control -- Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment -- Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services -- Social-Stratification Probabilistic Routing Algorithm in Delay-Tolerant Network. 
520 |a This book constitutes the refereed proceedings of the 4th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009, held in Boston, MA, USA, in August 2009. The 36 revised full papers presented together with 15 invited papers and 7 workshop papers were carefully reviewed and selected from numerous submissions. Providing a forum for researchers and practitioners worldwide, the papers address current research and development efforts of various issues in the area of algorithms, systems and applications for current and next generation infrastructure and wireless networks. They are divided in topical sections on applications, experimentation, power management; coverage, detection, and topology control; routing, querying, and data collection; localization, security, and services; scheduling and resource management; and online social networks, applications, and systems. 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Computers. 
650 0 |a Algorithms. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Software Engineering. 
700 1 |a Liu, Benyuan.  |e editor. 
700 1 |a Bestavros, Azer.  |e editor. 
700 1 |a Du, Ding-Zhu.  |e editor. 
700 1 |a Wang, Jie.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642034169 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5682 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-03417-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)