Mobile Networks and Management
Editat de Jiankun Hu, Ibrahim Khalil, Zahir Tari, Sheng Wenen Limba Engleză Paperback – 9 mai 2018
The 30 revised full papers were carefully reviewed and selected from 43 submissions. The papers handle topics in the area of mobile computing, wireless networking and management.
Preț: 326.70 lei
Preț vechi: 408.37 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.81€ • 67.79$ • 50.77£
57.81€ • 67.79$ • 50.77£
Carte tipărită la comandă
Livrare economică 14-28 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319907741
ISBN-10: 3319907743
Pagini: 408
Ilustrații: XIII, 392 p. 112 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:1st ed. 2018
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319907743
Pagini: 408
Ilustrații: XIII, 392 p. 112 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:1st ed. 2018
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications.- Persistent vs Service IDs in Android: Session Fingerprinting from Apps.- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques.- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework.- Robust Fingerprint Matching Based on Convolutional Neural Networks.- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data.- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling.- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring.- Estimating public opinion in social media content using aspect-based opinion mining.- A Robust Contactless Fingerprint Enhancement Algorithm.- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning.- A Variant of BLS Signature Scheme With Tight Security Reduction.- Quantum authentication scheme based on fingerprintencoded graph states.- Cooperative Information Security/ Cybersecurity Curriculum Development.- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks.- Homomorphic Evaluation of Database Queries.- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- The Public Verifiability of Public Key Encryption with Keyword Search.- Malicious Bitcoin Transaction Tracing Using Incidence.- Relation Clustering.- Cryptanalysis of Salsa and ChaCha: Revisited.- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.- Probability Risk Identification Based Intrusion Detection System for SCADA Systems.- Anonymizing k-NN Classification on MapReduce.- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.