You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23–26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tem...
Welcome to the proceedings of APPT 2005: the 6th International Workshop on Advanced Parallel Processing Technologies. APPT is a biennial workshop on parallel and distributed processing. Its scope covers all aspects of parallel and distributed computing technologies, including architectures, software systems and tools, algorithms, and applications. APPT originated from collaborations by researchers from China and Germany and has evolved to be an international workshop. APPT 2005 was the sixth in the series. The past ?ve workshops were held in Beijing, Koblenz, Changsha, Ilmenau, and Xiamen, respectively. The Program Committee is pleased to present the proceedings for APPT 2005. This year, APP...
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide i...
This book constitutes the refereed proceedings of the First International Conference on Trust Management, iTrust 2003, held in Heraklion, Crete, Greece in May 2003. The 24 revised full papers presented were carefully reviewed and selected from 58 submissions. This first book devoted to the emerging interdisciplinary field of trust management spans the whole range of relevant topics, from technical issues in distributed and open systems to legal, social, and philosophical aspects.
A number of application scenarios benefit from using wireless sensor networks for monitoring, tracking and event detection. Since sensor nodes are small and energy-constrained and possess severely limited computational capabilities and memory resources, sensor networks require the development of a new generation of algorithms targeted at large-scale networks, unpredictably changing environments and constantly changing network topologies. Structures result from self-organization of the nodes in the network and are defined in terms of the cooperation between individual nodes. Many sensor network systems require constructing structures in order to perform correctly. This work focuses on both the development and study of structuring algorithms. We present new algorithms for several problems covering the distinctive characteristics of sensor networks: cooperative sensing, communication and location awareness. The problems are energy-efficient routing, time-bounded and space-bounded sensing, range-free boundary recognition, and hierarchical partitioning of the network.
Using wireless sensor networks as part of pervasive computing scenarios is a difficult problem. It involves providing functionality and node behavior required by pervasive computing applications given the very limited capabilities and the constraints of wireless sensor nodes. The goal of this work is to investigate the problem of integrating wireless sensor nodes and wireless sensor networks in pervasive computing scenarios and to develop solutions that facilitate such an integration. Based on an analysis of both research areas, of their specific properties and requirements as well as the similarities and differences of the two fields, we identify and discuss a set of five fundamental problem areas that complicate the integration of sensor networks and pervasive computing: communication, network setup and configuration, user experience, security and flexibility and adaptability. In the main part of this work, we then introduce a total of six solution approaches that deal with different aspects of the identified problem areas.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012. The 28 revised papers presented were carefully reviewed and selected from 138 submissions. The contributions are grouped into the following topical sections: activity capturing; urban mobility and computing; home and energy; HCI; development tools and devices; indoor location and positioning; social computing and games; privacy; public displays and services.
This book constitutes the refereed proceedings of the 4th International Conference on Wired/Wireless Internet Communications, WWIC 2006, held in Bern, Switzerland, in May 2006. The book presents 29 revised full papers, organized in topical sessions on wireless networks, UMTS and OFDM, mobile ad-hoc networks, power saving and sensor networks, voice and video over wireless networks, mobility, TCP, signalling, charging, and security.
This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Intelligence and Computing, UIC 2010, held in Banff, Canada, September 2011. The 44 papers presented together with two keynote speeches were carefully reviewed and selected from numerous submissions. The papers address all current issues in smart systems and services, smart objects and environments, cloud and services computing, security, privacy and trustworthy, P2P, WSN and ad hoc networks, and ubiquitous intelligent algorithms and applications.