Intro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Short Papers -- Cluster-Based Basic Safety Message Dissemination in VANETs -- 1 Introduction -- 2 System Model and Problem Description -- 3 Cluster Formation Algorithm -- 4 Cluster-Based BSM Dissemination Scheme -- 5 Performance Evaluation -- 6 Conclusion -- References -- On-Road Vehicle Detection Algorithm Based on Mathematical Morphology -- 1 Introduction -- 2 Problem Definition -- 3 Algorithm of Vehicle Detection -- 3.1 Moving Vehicle Detection -- 3.2 Static Vehicle Detection -- 3.3 Pseudo Code of Algorithm
4 Experiment -- 5 Conclusion -- References -- Estimation of Short-Term Online Taxi Travel Time Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 4 Model Architecture -- 4.1 The External Factors Part -- 4.2 The Spatio-Temporal Learning Part -- 4.3 The Auxiliary Learning Part -- 4.4 Model Training -- 5 Experiments -- 6 Conclusion -- References -- Research on Algorithms for Finding Top-K Nodes in Campus Collaborative Learning Community Under Mobile Social Network -- 1 Introduction -- 2 Research Status -- 3 Correlation Theory -- 3.1 Node Correlation
3.2 Node Accessibility -- 3.3 Node Contact Centrality CV -- 4 Algorithm Design -- 4.1 General Update Algorithm(Ye) -- 4.2 Update Algorithm Based on Accessibility(Tua) -- 4.3 Update Algorithm Based on Accessibility and Learning Centrality (Nla) -- 4.4 Evolutionary Algorithm(NC) -- 5 Experiment -- 5.1 Description of the Experiment -- 5.2 Experimental Results and Analysis -- 5.3 Outlook -- References -- VES: A Component Version Extracting System for Large-Scale IoT Firmwares -- 1 Introduction -- 2 Background and Preliminary Knowledge -- 2.1 Version Strings in Components
2.2 Function Calling Convention -- 2.3 Intermediate Representation -- 3 Framework and Algorithm -- 3.1 Method Overview -- 3.2 Pre-processing -- 3.3 Data-Flow of Arguments -- 3.4 Version Arguments Extraction -- 3.5 Stack Space Recover -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy and Efficiency -- 4.3 Implement in Real-World -- 5 Related Work -- 6 Conclusion -- References -- Virtual Location Generation for Location Privacy Protection in VANET -- 1 Introduction -- 2 Problem Description and Virtual Location Generation -- 2.1 Problem Description -- 2.2 PDF of d -- 2.3 PDF of
2.4 Virtual Location Generation -- 3 Attack Model of Adversaries -- 4 Performance Evaluation Metrics -- 4.1 Qos Loss Metric -- 4.2 Location Privacy Metric -- 5 Numerical Analysis -- 6 Conclusion -- References -- Reliable Visible Light-Based Underground Localization Utilizing a New Mechanism: Reverse Transceiver Position -- 1 Introduction -- 2 Algorithm Overview -- 3 Locate Miners by Base Station -- 3.1 Frequency Selection -- 3.2 Frequency Identification -- 3.3 Frequency Power Tracking -- 4 Algorithm Experiments -- 4.1 Experimental Device and Environment -- 4.2 Algorithm Evaluation -- 5 Conclusion
Summary
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. The papers focus on data path algorithms; control path algorithms; network protocol design; network security; network services; and cloud computing
Notes
International conference proceedings
Includes author index
Bibliography
References
Notes
Online resource; title from digital title page (viewed on October 30, 2020)