Wireless Sensor Networks (eBook, PDF)
18th China Conference, CWSN 2024, Taiyuan, China, September 20-22, 2024, Proceedings, Part I
Redaktion: Sun, Limin; Chen, Yongle
Alle Infos zum eBook verschenken
Wireless Sensor Networks (eBook, PDF)
18th China Conference, CWSN 2024, Taiyuan, China, September 20-22, 2024, Proceedings, Part I
Redaktion: Sun, Limin; Chen, Yongle
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set, CCIS 2341 and CCIS 2342, constitutes the refereed proceedings of the 18th China Conference on Wireless Sensor Networks, CWSN 2024, held in Taiyuan, China, during September 20-22, 2024.
The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows:-
Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology.
Part II: Smart internet of things; Theory and technology of wireless sensor network.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 38.86MB
- Wireless Sensor Networks (eBook, PDF)57,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications -- ICCSA 2015 (eBook, PDF)40,95 €
- Computational Science and Its Applications - ICCSA 2016 (eBook, PDF)69,95 €
-
-
-
The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows:-
Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology.
Part II: Smart internet of things; Theory and technology of wireless sensor network.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 295
- Erscheinungstermin: 28. Februar 2025
- Englisch
- ISBN-13: 9789819621866
- Artikelnr.: 73515393
- Verlag: Springer Nature Singapore
- Seitenzahl: 295
- Erscheinungstermin: 28. Februar 2025
- Englisch
- ISBN-13: 9789819621866
- Artikelnr.: 73515393
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- GL-CrackNet : A lightweight network for cracksegmentation in vehicular systems.
.- Multi-UAV Distributed Incremental Learning for Frequency-Hopping Prediction.
.- Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing based on Double Deep Q-Network.
.- Crowdsourcing task recommendation method based on heterogeneous graph feature anomaly detection.
.- Topology Inference of IoT Edge Network Based on Network Flow Behavior Analysis.
.- SmartTask: Efficient Dispatching for Low-Latency Tasks on Dynamic Edge Networks.
.- BM2 SS: Blockchain-aided Multi-Authority and Multi-Keyword Searchable Scheme for IoT.
.- Fog-Enabled Network Intrusion Detection Based on Variational Autoencoder for Internet of Vehicles.
.- Enabling Sub-Second QoS-Aware Scheduling for Dynamic Serverless Workloads.
.- EdgeMeter: Towards Efficient and Accurate Latency Prediction of Neural Network Model Inference on Edge Devices.
.- Enhancing IoT Compliance Checking with Distributed Process Mining: A Scalable Framework for Log Data Streams.
.- Internet of Things Security and Privacy Protection.
.- EMLogger: Inferring Computer Activities via EM Side-channel of Disks.
.- A Lightweight Authentication Protocol for LAFED.
.- Generalizable and Robust Log Anomaly Detection Based on Transformer.
.- Internet of Things Service and Application Technology.
.- Research on The Method of Face Recognition Based on Attention Mechanism.
.- Lightweight and Efficient Top-down Human Pose Estimation Algorithm Research.
.- Research on Transformer Tracking with Temporal Context and Bounding Box Refinement Module.
.- VibECG: Non-Contact Electrocardiogram Monitoring Based on mmWave Sensing.
.- Human Activity Recognition based on Fine-grained Capture Spatiotemporal Features of Body RFID Skeleton.
.- ChewSense: Real-time Detection of Chewing Counts and Food Types with Reverse Signals from Headphones.
.- Simulated annealing-based routing optimization algorithm for LEO satellite-assisted UAV networks.
.- SimilarBP: Leveraging Similar Samples for Few-Shot PPG-Based Blood Pressure Measurement.
.- GL-CrackNet : A lightweight network for cracksegmentation in vehicular systems.
.- Multi-UAV Distributed Incremental Learning for Frequency-Hopping Prediction.
.- Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing based on Double Deep Q-Network.
.- Crowdsourcing task recommendation method based on heterogeneous graph feature anomaly detection.
.- Topology Inference of IoT Edge Network Based on Network Flow Behavior Analysis.
.- SmartTask: Efficient Dispatching for Low-Latency Tasks on Dynamic Edge Networks.
.- BM2 SS: Blockchain-aided Multi-Authority and Multi-Keyword Searchable Scheme for IoT.
.- Fog-Enabled Network Intrusion Detection Based on Variational Autoencoder for Internet of Vehicles.
.- Enabling Sub-Second QoS-Aware Scheduling for Dynamic Serverless Workloads.
.- EdgeMeter: Towards Efficient and Accurate Latency Prediction of Neural Network Model Inference on Edge Devices.
.- Enhancing IoT Compliance Checking with Distributed Process Mining: A Scalable Framework for Log Data Streams.
.- Internet of Things Security and Privacy Protection.
.- EMLogger: Inferring Computer Activities via EM Side-channel of Disks.
.- A Lightweight Authentication Protocol for LAFED.
.- Generalizable and Robust Log Anomaly Detection Based on Transformer.
.- Internet of Things Service and Application Technology.
.- Research on The Method of Face Recognition Based on Attention Mechanism.
.- Lightweight and Efficient Top-down Human Pose Estimation Algorithm Research.
.- Research on Transformer Tracking with Temporal Context and Bounding Box Refinement Module.
.- VibECG: Non-Contact Electrocardiogram Monitoring Based on mmWave Sensing.
.- Human Activity Recognition based on Fine-grained Capture Spatiotemporal Features of Body RFID Skeleton.
.- ChewSense: Real-time Detection of Chewing Counts and Food Types with Reverse Signals from Headphones.
.- Simulated annealing-based routing optimization algorithm for LEO satellite-assisted UAV networks.
.- SimilarBP: Leveraging Similar Samples for Few-Shot PPG-Based Blood Pressure Measurement.