Limit search to available items
Book Cover
E-book
Author UNet (Symposium) (3rd : 2017 : Casablanca, Morocco)

Title Ubiquitous networking : third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised selected papers / Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbah (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xxv, 659 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10542
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science ; 10542. 0302-9743
LNCS sublibrary. SL 5, Computer communication networks and telecommunications.
Contents Context-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization -- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing -- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage -- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model -- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation -- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs -- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship -- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid -- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID -- Group Authentication with Fault Tolerance for Internet of Things -- Fully Distributed Indexing over a Distributed Hash Table -- IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System -- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks -- Adopting Fuzzy Technique to Save Energy in Smart Home Control System -- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks -- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol -- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications -- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach -- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment -- Toward a new extension of IPv6 addressing to connect non IP objects -- Enablers, Challenges and Applications -- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems -- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link -- Robust Trajectory Planning for Robotic Communications under Fading Channels -- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel -- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS -- Implementation and Performance Evaluation of Network Intrusion Detection Systems -- An Efficient Authentication Protocol for 5G Heterogeneous Networks -- An Agreement graph-based-authentication scheme for 5G networks -- Green Base Station Placement for Microwave Backhaul Links -- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems -- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems -- An Improved Bernoulli Sensing Matrix For Compressive Sensing -- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix -- Adaptive Mapping for Multiple Applications on Parallel Architectures -- Verification of SystemC Components using the Method of Deduction -- Image Segmentation by Deep Community Detection Approach -- Data Mining Approaches for Alzheimer's Disease Diagnosis -- Image Search Engine based on Color Histogram and Zernike Moment -- Risk Assessment and Alert Prioritization for Intrusion Detection Systems
Summary This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications
Notes Includes author index
Online resource; title from PDF title page (SpringerLink, viewed November 20, 2017)
Subject Ubiquitous computing -- Congresses
Computer networks -- Congresses
Computer security.
Information retrieval.
Business applications.
Coding theory & cryptology.
Artificial intelligence.
Network hardware.
Computers -- Security -- General.
Computers -- Information Technology.
Computers -- Electronic Commerce.
Computers -- Intelligence (AI) & Semantics.
Computers -- Hardware -- Network Hardware.
Computer networks
Ubiquitous computing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Sabir, Essaid, editor.
García Armada, Ana, editor
Ghogho, Mounir, editor
Debbah, Merouane, 1975- editor.
ISBN 9783319681795
3319681796
Other Titles UNet 2017