Ubiquitous Networking : Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sabir, Essaid. (Editor ), García Armada, Ana. (Editor ), Ghogho, Mounir. (Editor ), Debbah, Mérouane. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Computer Communication Networks and Telecommunications ; 10542
Materias:
LEADER 06590nam a22004335i 4500
001 000291148
005 20210915144319.0
007 cr nn 008mamaa
008 171107s2017 gw | s |||| 0|eng d
020 |a 9783319681795 
024 7 |a 10.1007/978-3-319-68179-5  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Ubiquitous Networking :  |b Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers /  |c edited by Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbah. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XXV, 659 p. 278 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer Communication Networks and Telecommunications ;  |v 10542 
505 0 |a Context-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization -- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing -- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage -- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model -- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation -- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs -- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship -- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid -- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID -- Group Authentication with Fault Tolerance for Internet of Things -- Fully Distributed Indexing over a Distributed Hash Table --            IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System -- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks -- Adopting Fuzzy Technique to Save Energy in Smart Home Control System -- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks -- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol -- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications -- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach -- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment -- Toward a new extension of IPv6 addressing to connect non IP objects --  Enablers, Challenges and Applications -- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems -- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link -- Robust Trajectory Planning for Robotic Communications under Fading Channels -- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel -- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS -- Implementation and Performance Evaluation of Network Intrusion Detection Systems -- An Efficient Authentication Protocol for 5G Heterogeneous Networks -- An Agreement graph-based-authentication scheme for 5G networks -- Green Base Station Placement for Microwave Backhaul Links -- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems -- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems -- An Improved Bernoulli Sensing Matrix For Compressive Sensing -- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix -- Adaptive Mapping for Multiple Applications on Parallel Architectures -- Verification of SystemC Components using the Method of Deduction -- Image Segmentation by Deep Community Detection Approach -- Data Mining Approaches for Alzheimer's Disease Diagnosis -- Image Search Engine based on Color Histogram and Zernike Moment -- Risk Assessment and Alert Prioritization for Intrusion Detection Systems. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Application software. 
650 0 |a E-commerce. 
650 0 |a Data encryption (Computer science). 
650 0 |a Artificial intelligence. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Cryptology. 
650 2 4 |a Artificial Intelligence. 
700 1 |a Sabir, Essaid.  |e editor.  |0 (orcid)0000-0001-9946-5761  |1 https://orcid.org/0000-0001-9946-5761 
700 1 |a García Armada, Ana.  |e editor.  |0 (orcid)0000-0002-8495-6151  |1 https://orcid.org/0000-0002-8495-6151 
700 1 |a Ghogho, Mounir.  |e editor.  |0 (orcid)0000-0002-0055-7867  |1 https://orcid.org/0000-0002-0055-7867 
700 1 |a Debbah, Mérouane.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks