You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume constitutes the revised papers of the 4th European Conference on Smart Sensing and Context, Euro SSC 2009, held in Guilford, UK, in September 2009. This volume consists of 16 full papers. Each paper received at least three peer reviews. The conference and proceedings were structured into 6 main tracks which discussed the key themes addressed by EuroSCC 2009: activity recognition, information aspects of context-aware sensor and actuator systems, context-aware service platforms, context processing, reasoning and fusion, real-world experiences with deployed systems, and context-aware frameworks in mobile environments.
This book constitutes revised selected papers from the refereed proceedings of the 5th The Global IoT Summit, GIoTS 2022, which took place in Dublin, Ireland, in June 20–23, 2022. The 33 full papers included in this book were carefully reviewed andselected from 75 submissions. They were organized in topical sections as follows: ioT enabling technologies; ioT applications, services and real implementations; ioT security, privacy and data protection; and ioT pilots, testbeds and experimentation results.
This innovative edited collection explores digital business models (DBMs) in theory and practice to contribute to knowledge of how companies, organizations and networks can design, implement and apply DBMs. It views DBMs in a range of contexts and forms, which can be integrated in a number of ways, and aims to inspire and enable academics, students and practitioners to seize the opportunities posed by digital business models, technologies and platforms. One of the first and comprehensive contributions to the field of DBMs and digital business model innovations (DBMI), the authors discuss the opportunities, challenges, technologies, implementation and value creation, customer and data protection processes of DBMs in different contexts.
Emerging Trends from European Research. BThe way the book is structured and enhanced makes it an ideal reference book for managers, academics, researchers and system designers in the communications field./B BRBRI- Harry Skianis, Computing Reviews about the 2009 edition of Towards
This book presents the technologies that empower edge intelligence, along with their use in novel IoT solutions. Specifically, it presents how 5G/6G, Edge AI, and Blockchain solutions enable novel IoT-based decentralized intelligence use cases at the edge of the cloud/edge/IoT continuum. Emphasis is placed on presenting how these technologies support a wide array of functional and non-functional requirements spanning latency, performance, cybersecurity, data protection, real-time performance, energy efficiency, and more. The various chapters of the book are contributed by several EU-funded projects, which have recently developed novel IoT platforms that enable the development and deployment ...
This book constitutes the thoroughly refereed post-conference proceedings of the second International Workshop on Interoperability and Open-Source Solutions for the Internet of Things, InterOSS-IoT 2016, held in Stuttgart, Germany, November 7, 2016. The 11 revised full papers presented were carefully reviewed and selected from 17 submissions during two rounds of reviewing. They are organized in topical sections on semantic interoperability, interoperabile architectures and platforms, business models and security, platform performance and applications.
This book constitutes the refereed proceedings of the 5th European Workshop on Wireless Sensor Networks, EWSN 2008, held in Bologna, Italy, in January/February 2008. The 23 revised full papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, topology, software, as well as deployment and application development.
The First International Conference on Mobile Lightweight Systems (MOBILIGHT) was held in Athens during May 18–20, 2009. The decision to organize a scientific event on wireless communications, where competition is really enormous, was motivated by discussions with some colleagues about the current unprecedented request for lightweight, wireless communication devices with high usability and performance able to support added-value services in a highly mobile environment. Such devices follow the user everywhere he/she goes (at work, at home, while travelling, in a classroom, etc.), but also result in exciting - search, development and business opportunities. Such a scenario clearly demands significant upgrades to the existing communi- tion paradigm in terms of infrastructure, devices and services to support the anytime, anywhere, any device philosophy, introducing novel and fast-evolving requirements and expectations on research and development in the field of information and com- nication technologies. The core issue is to support the desire of wireless users to have 24/7 network availability and transparent access to "their own" services.
This book presents the latest research findings, methods and development techniques related to Ubiquitous and Pervasive Computing (UPC) as well as challenges and solutions from both theoretical and practical perspectives with an emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. It also allows users to be online even while moving around, providing them with almost permanent access to their preferred services. Along with a great potential to revolutionize our lives, UPC also poses new research challenges.
This book provides a comprehensive and consistent introduction to the Internet of Things. Hot topics, including the European privacy legislation GDPR, and homomorphic encryption are explained. For each topic, the reader gets a theoretical introduction and an overview, backed by programming examples. For demonstration, the authors use the IoT platform VICINITY, which is open-source, free, and offers leading standards for privacy. Presents readers with a coherent single-source introduction into the IoT; Introduces selected, hot-topics of IoT, including GDPR (European legislation on data protection), and homomorphic encryption; Provides coding examples for most topics that allow the reader to kick-start his own IoT applications, smart services, etc.