Ubiquitous Networking : Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers /
Autor Corporativo: | |
---|---|
Otros Autores: | , , , |
Formato: | eBook |
Lenguaje: | English |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Edición: | 1st ed. 2017. |
Colección: | Computer Communication Networks and Telecommunications ;
10542 |
Materias: |
Tabla de Contenidos:
- Context-Awareness and Autonomy Paradigms
- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks
- Routing Game On the Line: The Case Of Multiple Players
- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks
- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks
- Quality of Experience in HTTP Adaptive Video Streaming Systems
- Community Detection through Topic Modeling in Social Networks
- A Formal Framework for Adaptation
- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance
- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks
- A new Data Forwarding Scheme for DTNs based on Coalition Game
- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks
- Mobile Edge Networking and Virtualization
- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development
- A Simulation Framework for IT Governance in the Context of Corporate Relocation
- NGN Management with NGOSS Framework-Based IMS Use Case
- Migration from Web Services to Cloud Services
- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing
- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems
- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing
- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage
- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model
- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation
- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs
- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship
- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid
- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID
- Group Authentication with Fault Tolerance for Internet of Things
- Fully Distributed Indexing over a Distributed Hash Table
- IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System
- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks
- Adopting Fuzzy Technique to Save Energy in Smart Home Control System
- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks
- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol
- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications
- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach
- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment
- Toward a new extension of IPv6 addressing to connect non IP objects
- Enablers, Challenges and Applications
- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems
- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link
- Robust Trajectory Planning for Robotic Communications under Fading Channels
- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel
- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS
- Implementation and Performance Evaluation of Network Intrusion Detection Systems
- An Efficient Authentication Protocol for 5G Heterogeneous Networks
- An Agreement graph-based-authentication scheme for 5G networks
- Green Base Station Placement for Microwave Backhaul Links
- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems
- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems
- An Improved Bernoulli Sensing Matrix For Compressive Sensing
- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix
- Adaptive Mapping for Multiple Applications on Parallel Architectures
- Verification of SystemC Components using the Method of Deduction
- Image Segmentation by Deep Community Detection Approach
- Data Mining Approaches for Alzheimer's Disease Diagnosis
- Image Search Engine based on Color Histogram and Zernike Moment
- Risk Assessment and Alert Prioritization for Intrusion Detection Systems.