語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Big data computing and communication...
~
Wang, Yu.
FindBook
Google Book
Amazon
博客來
Big data computing and communications = first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Big data computing and communications/ edited by Yu Wang ... [et al.].
其他題名:
first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /
其他題名:
BigCom 2015
其他作者:
Wang, Yu.
出版者:
Cham :Springer International Publishing : : 2015.,
面頁冊數:
xvi, 514 p. :ill., digital ;24 cm.
內容註:
Wireless Communication and Networks -- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes -- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management -- Dynamic Sparse Channel Estimation Using '0-constrained Kalman Filter in OFDM Systems -- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System -- Database and Big Data -- Research on Light-Weight Compression Schemes Based on Simulative Column-Store -- Study of Constructing Data Supply Chain Based on PROV -- Focused Deep Web Entrance Crawling by Form Feature Classification -- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm -- Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission -- Smart Phone and Sensing Application -- Gender Prediction Based on Data Streams of Smartphone Applications -- Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones -- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection -- Parallel Accurate Localization from Cellular Network -- A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors -- Security and Privacy -- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks -- Wireless Device Authentication Using Acoustic Hardware Fingerprints -- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing -- Anomaly Detection of Single Sensors Using OCSVM_KNN -- An Efficient Method on Trajectory Privacy Preservation -- Architecture and Applications -- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores -- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions -- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources -- A Graph Community Approach for Constructing microRNA Networks -- Sensor Networks and RFID -- Distributed Multigrid Technique for Seismic Tomography in Sensor Networks -- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World -- Feedback-Based Reduplicate Complex Event Processing in IoT -- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems -- I Know When to Do the Replenishment -- Social Networks and Recommendation Tag-Based User Interest Discovery Though Keywords Extraction in Social Network -- Implicit Feedback Mining for Recommendation -- The Collaborative Filtering Algorithm with Time Weight Based on MapReduce -- Recommendation Specially for Fanatic Fans in SNS -- Signal Processing and Pattern Recognition In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard -- A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction -- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos -- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia -- An Approach for J Wave Auto-Detection Based on Support Vector Machine -- Routing and Resource Management -- Green and Fault-Tolerant Routing in Data Centers -- A Markov Chain Prediction Model for Routing in Delay Tolerant Networks -- RAM: Resource Allocation in Mobility for Device-to-Device Communications -- Group Signature Based Trace Hiding in Web Query.
Contained By:
Springer eBooks
標題:
Big data - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-22047-5
ISBN:
9783319220475 (electronic bk.)
Big data computing and communications = first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /
Big data computing and communications
first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /[electronic resource] :BigCom 2015edited by Yu Wang ... [et al.]. - Cham :Springer International Publishing :2015. - xvi, 514 p. :ill., digital ;24 cm. - Lecture notes in computer science,91960302-9743 ;. - Lecture notes in computer science ;5353..
Wireless Communication and Networks -- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes -- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management -- Dynamic Sparse Channel Estimation Using '0-constrained Kalman Filter in OFDM Systems -- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System -- Database and Big Data -- Research on Light-Weight Compression Schemes Based on Simulative Column-Store -- Study of Constructing Data Supply Chain Based on PROV -- Focused Deep Web Entrance Crawling by Form Feature Classification -- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm -- Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission -- Smart Phone and Sensing Application -- Gender Prediction Based on Data Streams of Smartphone Applications -- Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones -- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection -- Parallel Accurate Localization from Cellular Network -- A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors -- Security and Privacy -- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks -- Wireless Device Authentication Using Acoustic Hardware Fingerprints -- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing -- Anomaly Detection of Single Sensors Using OCSVM_KNN -- An Efficient Method on Trajectory Privacy Preservation -- Architecture and Applications -- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores -- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions -- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources -- A Graph Community Approach for Constructing microRNA Networks -- Sensor Networks and RFID -- Distributed Multigrid Technique for Seismic Tomography in Sensor Networks -- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World -- Feedback-Based Reduplicate Complex Event Processing in IoT -- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems -- I Know When to Do the Replenishment -- Social Networks and Recommendation Tag-Based User Interest Discovery Though Keywords Extraction in Social Network -- Implicit Feedback Mining for Recommendation -- The Collaborative Filtering Algorithm with Time Weight Based on MapReduce -- Recommendation Specially for Fanatic Fans in SNS -- Signal Processing and Pattern Recognition In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard -- A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction -- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos -- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia -- An Approach for J Wave Auto-Detection Based on Support Vector Machine -- Routing and Resource Management -- Green and Fault-Tolerant Routing in Data Centers -- A Markov Chain Prediction Model for Routing in Delay Tolerant Networks -- RAM: Resource Allocation in Mobility for Device-to-Device Communications -- Group Signature Based Trace Hiding in Web Query.
This book constitutes the proceedings of the First International Conference on Big Data Computing and Communications, BigCom 2015, held in Taiyuan, China, in August 2015. The 41 papers presented in this volume were carefully reviewed and selected from 74 submissions. They were organized in topical sections named: wireless communication and networks; database and big data; smart phone and sensing application; security and privacy; architecture and applications; sensor networks and RFID; social networks and recommendation; signal processing and pattern recognition; and routing and resource management.
ISBN: 9783319220475 (electronic bk.)
Standard No.: 10.1007/978-3-319-22047-5doiSubjects--Topical Terms:
1622247
Big data
--Congresses.
LC Class. No.: QA76.9.D32
Dewey Class. No.: 005.7
Big data computing and communications = first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /
LDR
:05265nmm a2200349 a 4500
001
2008933
003
DE-He213
005
20160225170120.0
006
m d
007
cr nn 008maaau
008
160311s2015 gw s 0 eng d
020
$a
9783319220475 (electronic bk.)
020
$a
9783319220468 (paper)
024
7
$a
10.1007/978-3-319-22047-5
$2
doi
035
$a
978-3-319-22047-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.D32
072
7
$a
UNF
$2
bicssc
072
7
$a
UYQE
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
082
0 4
$a
005.7
$2
23
090
$a
QA76.9.D32
$b
B592 2015
245
1 0
$a
Big data computing and communications
$h
[electronic resource] :
$b
first International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015 : proceedings /
$c
edited by Yu Wang ... [et al.].
246
3
$a
BigCom 2015
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
xvi, 514 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9196
505
0
$a
Wireless Communication and Networks -- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes -- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management -- Dynamic Sparse Channel Estimation Using '0-constrained Kalman Filter in OFDM Systems -- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System -- Database and Big Data -- Research on Light-Weight Compression Schemes Based on Simulative Column-Store -- Study of Constructing Data Supply Chain Based on PROV -- Focused Deep Web Entrance Crawling by Form Feature Classification -- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm -- Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission -- Smart Phone and Sensing Application -- Gender Prediction Based on Data Streams of Smartphone Applications -- Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones -- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection -- Parallel Accurate Localization from Cellular Network -- A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors -- Security and Privacy -- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks -- Wireless Device Authentication Using Acoustic Hardware Fingerprints -- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing -- Anomaly Detection of Single Sensors Using OCSVM_KNN -- An Efficient Method on Trajectory Privacy Preservation -- Architecture and Applications -- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores -- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions -- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources -- A Graph Community Approach for Constructing microRNA Networks -- Sensor Networks and RFID -- Distributed Multigrid Technique for Seismic Tomography in Sensor Networks -- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World -- Feedback-Based Reduplicate Complex Event Processing in IoT -- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems -- I Know When to Do the Replenishment -- Social Networks and Recommendation Tag-Based User Interest Discovery Though Keywords Extraction in Social Network -- Implicit Feedback Mining for Recommendation -- The Collaborative Filtering Algorithm with Time Weight Based on MapReduce -- Recommendation Specially for Fanatic Fans in SNS -- Signal Processing and Pattern Recognition In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard -- A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction -- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos -- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia -- An Approach for J Wave Auto-Detection Based on Support Vector Machine -- Routing and Resource Management -- Green and Fault-Tolerant Routing in Data Centers -- A Markov Chain Prediction Model for Routing in Delay Tolerant Networks -- RAM: Resource Allocation in Mobility for Device-to-Device Communications -- Group Signature Based Trace Hiding in Web Query.
520
$a
This book constitutes the proceedings of the First International Conference on Big Data Computing and Communications, BigCom 2015, held in Taiyuan, China, in August 2015. The 41 papers presented in this volume were carefully reviewed and selected from 74 submissions. They were organized in topical sections named: wireless communication and networks; database and big data; smart phone and sensing application; security and privacy; architecture and applications; sensor networks and RFID; social networks and recommendation; signal processing and pattern recognition; and routing and resource management.
650
0
$a
Big data
$v
Congresses.
$3
1622247
650
0
$a
Databases
$v
Congresses.
$3
1244892
650
0
$a
Database management
$3
731528
650
0
$a
Wireless communication systems
$v
Congresses.
$3
1244288
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Database Management.
$3
891010
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Information Storage and Retrieval.
$3
761906
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
891007
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Wang, Yu.
$3
1058372
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
5353.
$x
0302-9743
$3
1274248
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-22047-5
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9273813
電子資源
11.線上閱覽_V
電子書
EB QA76.9.D32 B592 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入