Coverart for item
The Resource Big Data Computing and Communications : First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, edited by Yu Wang, Hui Xiong, Shlomo Argamon, XiangYang Li, Jianzhong Li, (electronic book)

Big Data Computing and Communications : First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, edited by Yu Wang, Hui Xiong, Shlomo Argamon, XiangYang Li, Jianzhong Li, (electronic book)

Label
Big Data Computing and Communications : First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings
Title
Big Data Computing and Communications
Title remainder
First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings
Statement of responsibility
edited by Yu Wang, Hui Xiong, Shlomo Argamon, XiangYang Li, Jianzhong Li
Creator
Contributor
Editor
Subject
Language
eng
Summary
This book constitutes the proceedings of the First International Conference on Big Data Computing and Communications, BigCom 2015, held in Taiyuan, China, in August 2015. The 41 papers presented in this volume were carefully reviewed and selected from 74 submissions. They were organized in topical sections named: wireless communication and networks; database and big data; smart phone and sensing application; security and privacy; architecture and applications; sensor networks and RFID; social networks and recommendation; signal processing and pattern recognition; and routing and resource management
Member of
Cataloging source
DE-He213
Dewey number
006.312
Image bit depth
0
LC call number
QA76.9.D343
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2015
http://bibfra.me/vocab/lite/meetingName
BigCom (Conference)
http://library.link/vocab/relatedWorkOrContributorDate
1971-
http://library.link/vocab/relatedWorkOrContributorName
  • Wang, Yu
  • Xiong, Hui
  • Argamon, Shlomo
  • Li, Xiang-Yang
  • Li, JianZhong
Series statement
Lecture Notes in Computer Science,
Series volume
9196
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Computer software
  • Database management
  • Data mining
  • Information storage and retrieval systems
Label
Big Data Computing and Communications : First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, edited by Yu Wang, Hui Xiong, Shlomo Argamon, XiangYang Li, Jianzhong Li, (electronic book)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Wireless Communication and Networks -- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes -- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management -- Dynamic Sparse Channel Estimation Using {u2018}0-constrained Kalman Filter in OFDM Systems -- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System -- Database and Big Data -- Research on Light-Weight Compression Schemes Based on Simulative Column-Store -- Study of Constructing Data Supply Chain Based on PROV -- Focused Deep Web Entrance Crawling by Form Feature Classification -- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm -- Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission -- Smart Phone and Sensing Application -- Gender Prediction Based on Data Streams of Smartphone Applications -- Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones -- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection -- Parallel Accurate Localization from Cellular Network -- A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors -- Security and Privacy -- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks -- Wireless Device Authentication Using Acoustic Hardware Fingerprints -- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing -- Anomaly Detection of Single Sensors Using OCSVM_KNN -- An Efficient Method on Trajectory Privacy Preservation -- Architecture and Applications -- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores -- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions -- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources -- A Graph Community Approach for Constructing microRNA Networks -- Sensor Networks and RFID -- Distributed Multigrid Technique for Seismic Tomography in Sensor Networks -- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World -- Feedback-Based Reduplicate Complex Event Processing in IoT -- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems -- I Know When to Do the Replenishment -- Social Networks and Recommendation Tag-Based User Interest Discovery Though Keywords Extraction in Social Network -- Implicit Feedback Mining for Recommendation -- The Collaborative Filtering Algorithm with Time Weight Based on MapReduce -- Recommendation Specially for Fanatic Fans in SNS -- Signal Processing and Pattern Recognition In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard -- A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction -- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos -- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia -- An Approach for J Wave Auto-Detection Based on Support Vector Machine -- Routing and Resource Management -- Green and Fault-Tolerant Routing in Data Centers -- A Markov Chain Prediction Model for Routing in Delay Tolerant Networks -- RAM: Resource Allocation in Mobility for Device-to-Device Communications -- Group Signature Based Trace Hiding in Web Query
Control code
978-3-319-22047-5
Dimensions
unknown
Edition
1st ed. 2015.
Extent
XVI, 514 p. 230 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9783319220475
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-22047-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Reproduction note
Electronic resource.
Specific material designation
remote
Label
Big Data Computing and Communications : First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, edited by Yu Wang, Hui Xiong, Shlomo Argamon, XiangYang Li, Jianzhong Li, (electronic book)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Wireless Communication and Networks -- A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes -- RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management -- Dynamic Sparse Channel Estimation Using {u2018}0-constrained Kalman Filter in OFDM Systems -- FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System -- Database and Big Data -- Research on Light-Weight Compression Schemes Based on Simulative Column-Store -- Study of Constructing Data Supply Chain Based on PROV -- Focused Deep Web Entrance Crawling by Form Feature Classification -- A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm -- Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission -- Smart Phone and Sensing Application -- Gender Prediction Based on Data Streams of Smartphone Applications -- Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones -- Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection -- Parallel Accurate Localization from Cellular Network -- A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors -- Security and Privacy -- Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks -- Wireless Device Authentication Using Acoustic Hardware Fingerprints -- Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing -- Anomaly Detection of Single Sensors Using OCSVM_KNN -- An Efficient Method on Trajectory Privacy Preservation -- Architecture and Applications -- R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores -- Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions -- Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources -- A Graph Community Approach for Constructing microRNA Networks -- Sensor Networks and RFID -- Distributed Multigrid Technique for Seismic Tomography in Sensor Networks -- Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World -- Feedback-Based Reduplicate Complex Event Processing in IoT -- An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems -- I Know When to Do the Replenishment -- Social Networks and Recommendation Tag-Based User Interest Discovery Though Keywords Extraction in Social Network -- Implicit Feedback Mining for Recommendation -- The Collaborative Filtering Algorithm with Time Weight Based on MapReduce -- Recommendation Specially for Fanatic Fans in SNS -- Signal Processing and Pattern Recognition In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard -- A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction -- Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos -- Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia -- An Approach for J Wave Auto-Detection Based on Support Vector Machine -- Routing and Resource Management -- Green and Fault-Tolerant Routing in Data Centers -- A Markov Chain Prediction Model for Routing in Delay Tolerant Networks -- RAM: Resource Allocation in Mobility for Device-to-Device Communications -- Group Signature Based Trace Hiding in Web Query
Control code
978-3-319-22047-5
Dimensions
unknown
Edition
1st ed. 2015.
Extent
XVI, 514 p. 230 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9783319220475
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-22047-5
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Reproduction note
Electronic resource.
Specific material designation
remote

Library Locations

Processing Feedback ...