000 07842nam a22006615i 4500
001 978-3-319-68179-5
003 DE-He213
005 20240423125435.0
007 cr nn 008mamaa
008 171107s2017 sz | s |||| 0|eng d
020 _a9783319681795
_9978-3-319-68179-5
024 7 _a10.1007/978-3-319-68179-5
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aUbiquitous Networking
_h[electronic resource] :
_bThird International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers /
_cedited by Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbah.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXXV, 659 p. 278 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v10542
505 0 _aContext-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization -- A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing -- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage -- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model -- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation -- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs -- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship -- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid -- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID -- Group Authentication with Fault Tolerance for Internet of Things -- Fully Distributed Indexing over a Distributed Hash Table --            IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System -- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks -- Adopting Fuzzy Technique to Save Energy in Smart Home Control System -- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks -- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol -- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications -- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach -- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment -- Toward a new extension of IPv6 addressing to connect non IP objects --  Enablers, Challenges and Applications -- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems -- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link -- Robust Trajectory Planning for Robotic Communications under Fading Channels -- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel -- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS -- Implementation and Performance Evaluation of Network Intrusion Detection Systems -- An Efficient Authentication Protocol for 5G Heterogeneous Networks -- An Agreement graph-based-authentication scheme for 5G networks -- Green Base Station Placement for Microwave Backhaul Links -- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems -- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems -- An Improved Bernoulli Sensing Matrix For Compressive Sensing -- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix -- Adaptive Mapping for Multiple Applications on Parallel Architectures -- Verification of SystemC Components using the Method of Deduction -- Image Segmentation by Deep Community Detection Approach -- Data Mining Approaches for Alzheimer's Disease Diagnosis -- Image Search Engine based on Color Histogram and Zernike Moment -- Risk Assessment and Alert Prioritization for Intrusion Detection Systems.
520 _aThis book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications. .
650 0 _aComputer networks .
650 0 _aData protection.
650 0 _aApplication software.
650 0 _aElectronic commerce.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aArtificial intelligence.
650 1 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _ae-Commerce and e-Business.
650 2 4 _aCryptology.
650 2 4 _aArtificial Intelligence.
700 1 _aSabir, Essaid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGarcía Armada, Ana.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGhogho, Mounir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDebbah, Mérouane.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319681788
776 0 8 _iPrinted edition:
_z9783319681801
830 0 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v10542
856 4 0 _uhttps://doi.org/10.1007/978-3-319-68179-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c177956
_d177956