Mobile Ad-hoc and Sensor Networks: 13th International Conference Front Cover

Mobile Ad-hoc and Sensor Networks: 13th International Conference

  • Length: 524 pages
  • Edition: 1st ed. 2018
  • Publisher:
  • Publication Date: 2018-05-03
  • ISBN-10: 9811088896
  • ISBN-13: 9789811088896
Description

Mobile Ad-hoc and Sensor Networks: 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers (Communications in Computer and Information Science)

This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017.

The 39 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers address issues such as multi-hop wireless networks and wireless mesh networks; sensor and actuator networks; vehicle ad hoc networks; mobile social network; delay tolerant networks and opportunistic networking; cyber-physical systems; internet of things; system modeling and performance analysis; routing and network protocols; data transport and management in mobile networks; resource management and wireless QoS provisioning; security and privacy; cross layer design and optimization; novel applications and architectures.

Table of Contents

Chapter 1. An Efficient and Secure Range Query Scheme for Encrypted Data in Smart Grid
Chapter 2. Receive Buffer Pre-division Based Flow Control for MPTCP
Chapter 3. On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks
Chapter 4. A Hierarchical Framework for Evaluation of Cloud Service Qualities
Chapter 5. Facility Location Selection Using Community-Based Single Swap: A Case Study
Chapter 6. Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks
Chapter 7. An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping
Chapter 8. Co-saliency Detection Based on Siamese Network
Chapter 9. An Efficient Privacy-Preserving Fingerprint-Based Localization Scheme Employing Oblivious Transfer
Chapter 10. An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid
Chapter 11. Achieving Communication Effectiveness of Web Authentication Protocol with Key Update
Chapter 12. Placement Fraud Detection on Smart Phones: A Joint Crowdsourcing and Data Analyzing Based Approach
Chapter 13. A Reinforcement Learning Approach of Data Forwarding in Vehicular Networks
Chapter 14. Privacy-Assured Large-Scale Navigation from Encrypted Approximate Shortest Path Recommendation
Chapter 15. An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle
Chapter 16. Research of Task Scheduling Mechanism Based on Prediction of Memory Utilization
Chapter 17. An Effective Method for Community Search in Large Directed Attributed Graphs
Chapter 18. EPAF: An Efficient Pseudonymous-Based Inter-vehicle Authentication Framework for VANET
Chapter 19. CHAR-HMM: An Improved Continuous Human Activity Recognition Algorithm
Chapter 20. A Prediction Method Based on Complex Event Processing for Cyber Physical System
Chapter 21. A Fast Handover Scheme for SDN Based Vehicular Network
Chapter 22. Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks
Chapter 23. Understanding Trajectory Data Based on Heterogeneous Information Network Using Visual Analytics
Chapter 24. Automatic Prediction of Traffic Flow Based on Deep Residual Networks
Chapter 25. Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network
Chapter 26. Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things
Chapter 27. Enhancing Software Reliability Against Soft Error Using Critical Data Model
Chapter 28. APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices
Chapter 29. Barrier Coverage Lifetime Maximization in a Randomly Deployed Bistatic Radar Network
Chapter 30. On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users
Chapter 31. Gesture Recognition System Based on RFID
Chapter 32. Understanding Data Partition for Applications on CPU-GPU Integrated Processors
Chapter 33. Privacy-Preserving and Traceable Data Aggregation in Energy Internet
Chapter 34. Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS)
Chapter 35. Modeling and Evaluation of the Incentive Scheme in “E-photo”
Chapter 36. Intelligent Environment Monitoring and Control System for Plant Growth
Chapter 37. TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN
Chapter 38. Simulation Standardization: Current State and Cross-Platform System for Network Simulators
Chapter 39. Task Offloading with Execution Cost Minimization in Heterogeneous Mobile Cloud Computing

To access the link, solve the captcha.