Advertisement

Wireless Algorithms, Systems, and Applications

5th International Conference, WASA 2010, Beijing, China, August 15-17, 2010. Proceedings

  • Gopal Pandurangan
  • V. S. Anil Kumar
  • Gu Ming
  • Yunhao Liu
  • Yingshu Li
Conference proceedings WASA 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6221)

Table of contents

  1. Front Matter
  2. Topology Control and Coverage

  3. Theoretical Foundations

    1. Wei Li, Yong Cui, Shengling Wang, Xiuzhen Cheng
      Pages 36-46
    2. Lixin Wang, Peng-Jun Wan, Frances Yao
      Pages 47-56
    3. Trac N. Nguyen, Nhat X. Lam, D. T. Huynh, Jason Bolla
      Pages 57-67
    4. Xiaohua Xu, Shaojie Tang, Peng-Jun Wan
      Pages 68-74
  4. Energy-Aware Algorithms and Protocol Design

    1. Huiqiang Yang, Deying Li, Qinghua Zhu, Wenping Chen, Yi Hong
      Pages 80-89
    2. Shunxi Gao, Long Zhang, Suqin Fan, Wei Huang, Qiwu Wu, Yu Deng
      Pages 90-94
  5. Wireless Sensor Networks and Applications

    1. Hong Fu, Xiaoming Wang, Yingshu Li
      Pages 105-109
    2. Tao Chen, Deke Guo, Honghui Chen, Xueshan Luo
      Pages 110-114
    3. Yiyang Zhao, Weijun Hong, S. C. Cheung, Shufang Li
      Pages 115-119
    4. Qingsong Yao, Yong Qi, Ying Chen, Xiao Zhong
      Pages 120-124
    5. Zi Li, Yang Peng, Wensheng Zhang, Daji Qiao
      Pages 125-135
  6. Applications and Experimentation

    1. Heejun Roh, Kyunghwi Kim, Wonjun Lee
      Pages 167-171
    2. Lei Mao, Junzhao Du, Hui Liu, Deke Guo, Xing Tang, Ning Wei
      Pages 172-181
  7. Scheduling and Channel assignment

    1. Davis Kirachaiwanich, Qilian Liang
      Pages 182-191
    2. Xianlong Jiao, Wei Lou, Xiaodong Wang, Junchao Ma, Jiannong Cao, Xingming Zhou
      Pages 192-202
    3. Devu Manikantan Shila, Yu Cheng, Tricha Anjali
      Pages 203-208
    4. Xue Li, Chi Zhou, Xiangqian Zhou, Zhiqiang Wu, Bing Xie
      Pages 209-219
  8. Coding, Information Theory and Security

    1. Gesen Zhang, Shuhong Jiao, Xiaoli Xu
      Pages 220-224
    2. Pei Wang, Qunfeng Dong, Mingjun Xiao, Liusheng Huang
      Pages 225-234
  9. Security of Wireless and Ad-Hoc Networks

  10. Data Management and Network Control in Wireless Networks

    1. Yujun Liu, Yonggang Cui, Limin Liu
      Pages 261-265
    2. Zhen Shen, Sheng Qiang, Dong-yun Yi
      Pages 266-273
    3. Xiaoming Tang, Yuting Zhao, Yinjuan Li, Yujun Liu
      Pages 274-281
    4. Feng Wei, Yingchang Xiang, Bowu Zhang
      Pages 291-294
    5. Junghoon Lee, Mikyung Kang
      Pages 295-298
  11. Radar and Sonar Sensor Networks

  12. Compressive Sensing for Communications and Networking

  13. Back Matter

About these proceedings

Keywords

ad-hoc networks algorithms approximation authentication cluster computing communication compressed sensing design information theory scheduling structured analysis

Editors and affiliations

  • Gopal Pandurangan
    • 1
  • V. S. Anil Kumar
    • 2
  • Gu Ming
    • 3
  • Yunhao Liu
    • 4
  • Yingshu Li
    • 5
  1. 1.Nanyang Technological UniversitySingapore
  2. 2.Virginia TechBlacksburgUSA
  3. 3.School of SoftwareTsinghua UniversityBeijingChina
  4. 4.Dept. of Computer ScienceHong Kong Univ. of Science and TechnologyKowloonHong Kong
  5. 5.Department of Computer ScienceGeorgia State UniversityAtlantaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14654-1
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14653-4
  • Online ISBN 978-3-642-14654-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site