![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Power-Based Clustering Algorithm for Wireless Ad-Hoc Networks
Energy saving, despite recent advances in extending battery life, is still an important issue in wireless ad hoc networks. An often adopted method is power management, which can help in reducing the transmissi...
-
Chapter and Conference Paper
Study on QoS Driven Web Services Composition
Providing composed Web Services based on the QoS requirements of clients is still an urgent problem to be solved. In this paper, we try to solve this problem. Firstly, we enhanced the current WSDL to describe ...
-
Chapter and Conference Paper
Classifying Unbalanced Pattern Groups by Training Neural Network
When training set is unbalanced, the conventional least square error (LSE) training strategy is less efficient to train neural network (NN) for classification because it often lead the NN to overcompensate for...
-
Chapter and Conference Paper
A Family of Optimization Based Data Mining Methods
An extensive review for the family of multi-criteria programming data mining models is provided in this paper. These models are introduced in a systematic way according to the evolution of the multi-criteria p...
-
Chapter and Conference Paper
AdContRep: A Privacy Enhanced Reputation System for MANET Content Services
Mobile ad hoc network (MANET) has become a practical platform for pervasive social networking. In such a system, various content information flows in terms of content query and response. To which extent should...
-
Chapter and Conference Paper
Research of the Incentive Mechanism of Organizational Information Resources Sharing under Cloud Computing Environment
The rapid development of Cloud Computing enables more personalized and more complex information service. Therefore, the demand for higher quality and larger amounts of information becomes inevitable. This pape...
-
Chapter and Conference Paper
Improved Separable Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction
Recently, separable reversible data hiding in encrypted image attracts more and more attention. Data extraction and image decryption are separable in the separable reversible data hiding method in encrypted im...
-
Chapter and Conference Paper
Improving ELM-Based Time Series Classification by Diversified Shapelets Selection
ELM is an efficient neural network which has extremely fast learning capacity and good generalization capability. However, ELM fails to measure up the task of time series classification because it hard to extr...
-
Chapter and Conference Paper
Biclustering Evolutionary Spatiotemporal Community in Global Trading Network
Detecting evolving communities in dynamic weighted networks are significant for understanding the evolutionary patterns of complex networks. In this paper, a novel algorithm is proposed to detect overlap** e...
-
Chapter and Conference Paper
Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network
Interpersonal relations facilitate information flow and give rise to positional advantage of individuals in a social network. We ask the question: How would an individual build relations with members of a dynamic...
-
Chapter and Conference Paper
A Fast Algorithm for Image Segmentation Based on Local Chan Vese Model
Image segmentation plays a very important pole in image processing and computer vision field. Most of the energy minimization of level set methods are based on the steepest descent method and finite difference...
-
Chapter and Conference Paper
Using Nonverbal Information for Conversation Partners Inference by Wearable Devices
In this paper, we propose a framework called conversational partner inference using nonverbal information (abbreviated as CFN). We use the wrist-based wearable device that has an accelerometer sensor to detect...
-
Chapter and Conference Paper
Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data
Big data is now applied to many different fields. The paper will introduce the application of big data in the coal supply chain of the power industry. We designed and implemented a visual system for the Supply...
-
Chapter and Conference Paper
Image Segmentation Based on Local Chan-Vese Model Combined with Fractional Order Derivative
Image segmentation plays a significant role in computer vision and image processing. In this paper, we proposed a novel Local Chan–Vese (LCV) image segmentation model. The new model combined classical LCV mode...
-
Chapter and Conference Paper
DOA Estimation for Coherent and Incoherent Targets with Co-prime MIMO Array
In this paper, we consider the problem of DOA estimation for a mix of incoherent and coherent targets by using the monostatic co-prime MIMO array with N sparse transmitting sensors and
-
Chapter and Conference Paper
Blockchain Based Data Transmission Control for Tactical Data Link
Tactical Data Link (TDL) is a communication system that utilizes a certain message format and a protocol to transmit data via wireless channels in an instant, automatic, and secure way. So far, TDL has shown s...
-
Chapter
Conclusions
Artificial intelligence and edge computing are expected to benefit each other. This book has comprehensively introduced and discussed various applicable scenarios and fundamental enabling techniques for edge inte...
-
Chapter
Artificial Intelligence Applications on Edge
In general, AI services are currently deployed in cloud data centers (the cloud) for handling requests, due to the fact that most AI models are complex and hard to compute their inference results on the side o...
-
Chapter and Conference Paper
Nebula: A Blockchain Based Decentralized Sharing Computing Platform
Nowadays, there is a considerable amount of idle computers whose computing resources are partially wasted. On the other hand, the demand of resources is rapidly growing, since the explosion of data and the com...
-
Chapter
Introduction
With the development of the Internet, there is a trend of blowout growth in network data. Meanwhile, the pursuit of the low latency of applications has also become a common user demand. Traditional cloud compu...