![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Diffusion-Based Data Augmentation for Nuclei Image Segmentation
Nuclei segmentation is a fundamental but challenging task in the quantitative analysis of histopathology images. Although fully-supervised deep learning-based methods have made significant progress, a large nu...
-
Article
Towards centralized transmission coordination in WLANs: a cross-layer approach
The world is becoming more dependent on wireless networks for ubiquitous computing. Wireless local area network (WLAN) is one kind of widely-deployed wireless networks used in this context. Its network perform...
-
Chapter and Conference Paper
The Research on Association Rules Mining with Co-evolution Algorithm in High Dimensional Data
This paper adopts a co-evolution algorithm, which utilizes improved genetic algorithm and particle swarm optimization algorithm to iterate two populations simultaneously. Meanwhile, the mechanism of informatio...
-
Chapter and Conference Paper
Interference-Aware Gossi** Scheduling in Uncoordinated Duty-Cycled Multi-hop Wireless Networks
Gossi** is to broadcast the message of every node to all the other nodes in multi-hop wireless networks (MWNs). This operation plays an important role and is widely used in MWNs. Interference-aware gossi**...
-
Chapter and Conference Paper
A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks
Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employe...
-
Chapter and Conference Paper
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in t...
-
Chapter and Conference Paper
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the ne...
-
Chapter and Conference Paper
A Lightweight Scheme for Node Scheduling in Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of the WSN by turning off redun...
-
Chapter and Conference Paper
Coverage Analysis for Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of the WSN by turning off redun...
-
Chapter and Conference Paper
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks,
In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper bounded clusterheads in any networks ev...