Wireless Algorithms, Systems, and Applications

Wireless Algorithms, Systems, and Applications

18th International Conference, WASA 2024, Qindao, China, June 21-23, 2024, Proceedings, Part III

Guo, Shaoyong; Takabi, Daniel; Cai, Zhipeng; Zou, Yifei

Springer International Publishing AG

11/2024

300

Mole

9783031714696

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC.

.- CO-LEACH: Cooperative Data Collection Protocol for Data Heterogeneous WSNs.

.- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline.

.- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds.

.- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous Fusion.

.- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles.

.- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.

.- Device-edge-cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement Learning.

.- Consistent Low-latency Scheduling for Microsecond-Scale Tasks in Data Centers.

.- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill Learning.

.- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement Learning.

.- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA Scheme.

.- Variational Autoencoder based Automatic Clustering for Multivariate Time Series Anomaly Detection.

.- Deep Reinforcement Learning based Economic Dispatch with Cost Constraint in Cyber Physical Energy System.

.- InceptionNeXt Network with Relative Position Information for Microexpression Recognition.

.- AdMarks: Image Steganography Based on Adversarial Perturbation.

.- A Review on Binary Code Analysis Datasets.

.- Low-cost Robot Path Planning Mechanism for Escaping from Dead Ends.

.- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge Distillation.

.- Improving Anomaly Scene Recognition with Large Vision-Language Models.

.- ReSU-Net: State Space Model for 3D Abdominal Multi-organ Segmentation.

.- Autocue: Targeted Textual Adversarial Attacks with Adversarial Prompts.

.- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language Model.

.- A High-precision Generality Method for Chinese Nested Named Entity Recognition.

.- Tree of Thought Prompt in Robotic Arm Control.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
networks;network algorithms;network protocols;network performance evaluation;network services;network architectures;security and privacy;network security;systems security;computing methodologies;artificial intelligence;machine learning;distributed computing methodologies