000 | 09665nam a2201753 i 4500 | ||
---|---|---|---|
001 | 5732776 | ||
003 | IEEE | ||
005 | 20191218152120.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 151221s2010 njua ob 001 eng d | ||
020 |
_a9780470579398 _qelectronic |
||
024 | 7 |
_a10.1002/9780470579398 _2doi |
|
035 | _a(CaBNVSL)mat05732776 | ||
035 | _a(IDAMS)0b000064814ebef2 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aQA76.59 _b.M63 2010eb |
|
082 | 0 | 4 |
_a004.16 _222 |
245 | 0 | 0 |
_aMobile intelligence / _cedited by Laurence T. Yang ... [et al.]. |
264 | 1 |
_aHoboken, New Jersey : _bWiley, _cc2010. |
|
264 | 2 |
_a[Piscataqay, New Jersey] : _bIEEE Xplore, _c[2010] |
|
300 |
_a1 PDF (xx, 695 pages) : _billustrations, fichiers HTML et PDF |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aWiley series on parallel and distributed computing ; _v69 |
|
504 | _aIncludes bibliographical references. | ||
505 | 0 | _aPreface -- Contributors -- Part I Mobile Data and Intelligence -- 1. A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks -- 2. Connected Dominating Set for Topology Control in Ad Hoc Networks -- 3. An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad Hoc Networks, -- 4. Mobility in Publish/Subscribe Systems, -- 5. Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks -- 6. Recent Advances in Mobile Agent-Oriented Applications -- Part II Location-Based Mobile Information Services -- 7. KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks -- 8. Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks -- 9. An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments -- 10. Next Generation Location-based Services: Merging Positioning and Web 2.0 -- Part III Mobile Mining -- 11. Data Mining for Moving Object Databases -- 12. Mobile Data Mining on Small Devices Through Web Services -- Part IV Mobile Context-Aware and Applications -- 13. Context Awareness: A Formal Foundation -- 14. Experiences with a Smart Office Project 294 -- 15. An Agent-Based Architecture for Providing Enhanced Communication Services.Part V Mobile Intelligence Security -- 16. MANET Routing Security -- 17. An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks -- 18. SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue -- 19. Managing Privacy in Location-based Access Control Systems -- Part VI Mobile Multimedia -- 20. VoiceXML-Enabled Intelligent Mobile Services -- 21. User Adaptive Video Retrieval on Mobile Devices -- 22. A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment -- 23. Energy Efficiency for Mobile Multimedia Replay -- Part VII Intelligent Network -- 24. Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks -- 25. Tracking in Wireless Sensor Networks. | |
505 | 8 | _a26. DDoS Attack Modeling and Detection in Wireless Sensor Networks -- 27. Energy-Efficient Pattern Recognition for Wireless Sensor Networks -- Index. | |
506 | 1 | _aRestricted to subscribers or individual electronic text purchasers. | |
520 | _aCutting-edge research and application issues on computational intelligence in the mobile environment. The combination of mobile computing and computational intelligence, Mobile Intelligence focuses on learning patterns and knowledge from data generated by mobile users and mobile technology. As a very new area of research, mobile intelligence has created a wide range of opportunities for researchers, engineers, and developers to create new applications for both end users and businesses. Mobile Intelligence covers the comprehensive state-of-the-art in various applications of computational intelligence to the mobile paradigm, including mobile data intelligence, mobile mining, mobile intelligence security, mobile agent, location-based mobile information services, mobile context-aware and applications, intelligent networks, and mobile multimedia. Readers will not only learn different areas of mobile computing and its issues but also various intelligent approaches that contribute in addressing these issues, as well as discover other potential elements in the mobile paradigm.. Explains how to deliver benefits to a wide range of applications, including database query processing, multimedia, commerce systems, e-mail systems, search engines, and Web browsers. Covers efficient and effective mobile data retrieval by various advanced techniques and protocols. Describes intelligent approaches to resolving location-based query processing in the mobile environment. Discusses learning interesting patterns and knowledge out from data generated by mobile users. Investigates the deployment of mobile agents to support context-aware mobile applications. Presents intelligent solutions to the security issues in mobile networks. Evaluates advanced optimization methods for mobile multimedia retrieval. Reveals the latest techniques in solving various issues in wireless sensor network (WSN)Mobile Intelligence is geared for upper-level undergraduate and graduate students in computer science and data mining courses, as well as telecommunication engineers, mobile communication and networking engineers, computer scientists, computer engineers, mobile database specialists, and data mining specialists. | ||
530 | _aAlso available in print. | ||
538 | _aMode of access: World Wide Web | ||
588 | _aDescription based on PDF viewed 12/21/2015. | ||
650 | 0 |
_aMobile computing _xResearch. |
|
650 | 0 |
_aComputational intelligence _xResearch. |
|
650 | 0 |
_aWireless communication systems _xResearch. |
|
655 | 0 | _aElectronic books. | |
695 | _aSpread spectrum communication | ||
695 | _aStreaming media | ||
695 | _aSubscriptions | ||
695 | _aTechnological innovation | ||
695 | _aTopology | ||
695 | _aTracking | ||
695 | _aTransform coding | ||
695 | _aTuning | ||
695 | _aUnified modeling language | ||
695 | _aUser interfaces | ||
695 | _aVideo codecs | ||
695 | _aWearable computers | ||
695 | _aWeb sites | ||
695 | _aWireless LAN | ||
695 | _aWireless communication | ||
695 | _aWireless networks | ||
695 | _aWireless sensor networks | ||
695 | _aZigbee | ||
695 | _acentralized attack detection | ||
695 | _aefficient datacentric storage mechanisms in wireless sensor networks | ||
695 | _ahierarchical management mechanisms | ||
695 | _aintelligent network | ||
695 | _athreshold pattern modeling | ||
695 | _atracking in WHSNs | ||
695 | _atracking in wireless sensor networks | ||
695 | _atracking scenarios in WSNs | ||
695 | _aAccess control | ||
695 | _aAccuracy | ||
695 | _aAd hoc networks | ||
695 | _aAdaptive systems | ||
695 | _aAdvertising | ||
695 | _aApproximation algorithms | ||
695 | _aArchitecture | ||
695 | _aArrays | ||
695 | _aAssociative memory | ||
695 | _aBase stations | ||
695 | _aBooks | ||
695 | _aBuildings | ||
695 | _aClothing | ||
695 | _aClustering algorithms | ||
695 | _aCollaboration | ||
695 | _aCommunities | ||
695 | _aCompanies | ||
695 | _aCompass | ||
695 | _aComputational modeling | ||
695 | _aComputer architecture | ||
695 | _aComputers | ||
695 | _aConnectors | ||
695 | _aContext | ||
695 | _aContext modeling | ||
695 | _aContext-aware services | ||
695 | _aCooperative caching | ||
695 | _aDDoS attack modeling and detection in wireless sensor networks | ||
695 | _aDVD | ||
695 | _aData mining | ||
695 | _aDatabase systems | ||
695 | _aDatabases | ||
695 | _aDictionaries | ||
695 | _aDistributed databases | ||
695 | _aGSM | ||
695 | _aGlobal Positioning System | ||
695 | _aHandheld computers | ||
695 | _aHidden Markov models | ||
695 | _aHistory | ||
695 | _aIEEE 802.11 Standards | ||
695 | _aIEEE 802.16 Standards | ||
695 | _aIndexes | ||
695 | _aIndexing | ||
695 | _aInformation retrieval | ||
695 | _aInternet | ||
695 | _aJava | ||
695 | _aLoad modeling | ||
695 | _aMarkov processes | ||
695 | _aMedia | ||
695 | _aMiddleware | ||
695 | _aMobile ad hoc networks | ||
695 | _aMobile agents | ||
695 | _aMobile communication | ||
695 | _aMobile computing | ||
695 | _aMobile handsets | ||
695 | _aMultiaccess communication | ||
695 | _aMultimedia communication | ||
695 | _aNetwork topology | ||
695 | _aNeurons | ||
695 | _aNext generation networking | ||
695 | _aPattern matching | ||
695 | _aPeer to peer computing | ||
695 | _aPerformance evaluation | ||
695 | _aPredictive models | ||
695 | _aPrivacy | ||
695 | _aProposals | ||
695 | _aProtocols | ||
695 | _aQuality of service | ||
695 | _aRadiation detectors | ||
695 | _aRecommender systems | ||
695 | _aRouting | ||
695 | _aRouting protocols | ||
695 | _aSections | ||
695 | _aSecurity | ||
695 | _aSemantics | ||
695 | _aSensors | ||
695 | _aServers | ||
695 | _aService oriented architecture | ||
695 | _aSoftware systems | ||
695 | _aSpatial databases | ||
700 | 1 | _aYang, Laurence Tianruo. | |
710 | 2 |
_aIEEE Xplore (Online Service), _edistributor. |
|
710 | 2 |
_aJohn Wiley & Sons, _epublisher. |
|
830 | 0 |
_aWiley series on parallel and distributed computing ; _v69 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5732776 |
999 |
_c42279 _d42279 |