You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Welcome to the proceedings of the 2004 International Conference on Embedded and Ubiquitous Computing (EUC 2004) which was held in Aizu-Wakamatsu City, Japan, 25–27 August 2004. Embedded and ubiquitous computing are emerging rapidly as exciting new paradigms and disciplines to provide computing and communication services all the time, everywhere. Its systems are now invading every aspect of life to the point that they are disappearing inside all sorts of appliances or can be worn unobtrusively as part of clothing and jewelry, etc. This emergence is a natural outcome of research and technological advances in embedded systems, pervasive computing and communications, wireless networks, mobile ...
This book constitutes the refereed proceedings of the 18th International Symposium on Computer and Information Sciences, ISCIS 2003, held in Antalya, Turkey in November 2003. The 135 revised papers presented together with 2 invited papers were carefully reviewed and selected from over 360 submissions. The papers are organized in topical sections on architectures and systems, theoretical computer science, databases and information retrieval, e-commerce, graphics and computer vision, intelligent systems and robotics, multimedia, networks and security, parallel and distributed computing, soft computing, and software engineering.
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006. It contains 116 papers that contribute to enlarging the spectrum of the more general topics treated in the ISPA 2006 main conference.
"This book offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications"--Provided by publisher.
* Focuses on learning patterns and knowledge from data generated by mobile users and mobile technology. * Covers research and application issues in applying computational intelligence applications to mobile computing * Delivers benefits to a wide range of applications * Introduces the state of the art of computational intelligence to the mobile paradigm
st We welcome you to the proceedings of the 21 International Conference on Database and Expert Systems Applications held in Bilbao. With information and database s- tems being a central topic of computer science, it was to be expected that the integ- tion of knowledge, information and data is today contributing to the again rapidly increasing attractiveness of this field for researchers and practitioners. Since its foundation in 1990, DEXA has been an annual international conference, located in Europe, which showcases state-of-the-art research activities in these areas. DEXA 2010 continued this tradition and provided a forum for presenting and discu- ing research results in the area of datab...
Ubiquitous sensors, devices, networks and information are paving the way toward a smart world in which computational intelligence is distributed throughout the physical environment to provide reliable and relevant services to people. This ubiquitous intelligence will change the computing landscape because it will enable new breeds of applications and systems to be developed, and the realm of computing possibilities will be significantly extended. By enhancing everyday objects with intelligence, many tasks and processes could be simplified, the physical spaces where people interact, like workplaces and homes, could become more efficient, safer and more enjoyable. Ubiquitous computing, or perv...
This volume contains the papers presented at the 5th International Workshop on Advanced Parallel Processing Technologies, APPT 2003. This series of workshops is designed to strengthen the cooperation between the German and Chinese institutions active in the area of these technologies. It has continued to grow, providing an excellent forum for reporting advances in parallel processing technologies. The 5th workshop itself addressed the entire gamut of related topics, ranging from the architectural aspects of parallel computer hardware and system software to the applied technologies for novel applications. For this workshop, we received over 191 full submissions from researchers all over the world. All the papers were peer-reviewed in depth and qualitatively graded on their relevance, originality, signi?cance, presentation, and the overall appropriateness for their acceptance. Any concerns raised were discussed in the program committee. The organizing committee did an excellent job in selecting 78 papers (Among them, 21 were short ones) for presentation. In short, the papers included here represent the forefront of research from China, Germany, and the other countries.
The eight-volume set LNCS 13375 – 13382 constitutes the proceedings of the 22nd International Conference on Computational Science and Its Applications, ICCSA 2022, which was held in Malaga, Spain during July 4 – 7, 2022. The first two volumes contain the proceedings from ICCSA 2022, which are the 57 full and 24 short papers presented in these books were carefully reviewed and selected from 279 submissions. The other six volumes present the workshop proceedings, containing 285 papers out of 815 submissions. These six volumes includes the proceedings of the following workshops: Advances in Artificial Intelligence Learning Technologies: Blended Learning, STEM, Computational Thinking and...
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.