Book description
Focuses on learning patterns and knowledge from data generated by mobile users and mobile technology.
Covers research and application issues in applying computational intelligence applications to mobile computing
Delivers benefits to a wide range of applications
Introduces the state of the art of computational intelligence to the mobile paradigm
Table of contents
- Cover Page
- Title Page
- Copyright
- Contents
- Preface
- Contributors
-
Part I: Mobile Data and Intelligence
- Chapter 1: A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks
- Chapter 2: Connected Dominating Set for Topology Control in Ad Hoc Networks
- Chapter 3: An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad hoc Networks
- Chapter 4: Mobility in Publish/Subscribe Systems
- Chapter 5: Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks
- Chapter 6: Recent Advances in Mobile Agent-Oriented Applications
-
Part II: Location-Based Mobile Information Services
- Chapter 7: KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks
- Chapter 8: Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks
- Chapter 9: An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments
- Chapter 10: Next Generation Location-based Services: Merging Positioning and Web 2.0
-
Part III: Mobile Mining
-
Chapter 11: Data Mining for Moving Object Databases
- 11.1 INTRODUCTION
- 11.2 MOBILITY PREDICTION USING MOVEMENT HISTORIES
- 11.3 SEQUENTIAL PATTERN MINING-BASED APPROACHES
- 11.4 FINDING OTHER INTERESTING PATTERNS
- 11.5 CLUSTERING MOVING OBJECTS
- 11.6 DENSE REGIONS AND SELECTIVITY ESTIMATION
- 11.7 COMPARING MOVING OBJECT TRAJECTORIES
- 11.8 CONCLUSIONS
- ACKNOWLEDGMENTS
- REFERENCES
- Chapter 12: Mobile Data Mining on Small Devices Through Web Services
-
Chapter 11: Data Mining for Moving Object Databases
- Part IV: Mobile Context-Aware and Applications
- Part V: Mobile Intelligence Security
- Part VI: Mobile Multimedia
-
Part VII: Intelligent Network
- Chapter 24: Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks
- Chapter 25: Tracking in Wireless Sensor Networks
-
Chapter 26: DDoS Attack Modeling and Detection in Wireless Sensor Networks
- 26.1 INTRODUCTION
- 26.2 ATTACK MODELS IN WIRELESS SENSOR NETWORK
- 26.3 REQUIREMENTS FOR DDoS ATTACK DETECTION IN WIRELESS SENSOR NETWORKS
- 26.4 ADVERSARY MODEL
- 26.5 NETWORK MODEL
- 26.6 THRESHOLD PATTERN MODELING
- 26.7 TRAFFIC FLOW OBSERVATION TABLE
- 26.8 CENTRALIZED ATTACK DETECTION
- 26.9 CONCLUSIONS
- REFERENCES
- Chapter 27: Energy-Efficient Pattern Recognition for Wireless Sensor Networks
- Index
Product information
- Title: Mobile Intelligence
- Author(s):
- Release date: February 2010
- Publisher(s): Wiley
- ISBN: 9780470195550
You might also like
book
The Rise of Continuous Packaging
How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete …
book
Investigating Internet Crimes
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the …
audiobook
Transformed
Help transform your business and innovate like the world's top tech companies! Transformed: Moving to the …
book
An Introduction to Search Engines and Web Navigation
This book is a second edition, updated and expanded to explain the technologies that help us …