You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2022, which was held in Pittsburgh, November 14-17, 2022. The conference was held virtually due to the COVID-19 pandemic. The 26 full and 2 short papers were carefully reviewed and selected from 95 submissions and present discussions, They were organized in topical sections as follows: Internet of Things (IoT), Security and Privacy, Human-centric sensing, Drone applications and edge computing, Wireless networks, Mobile and human computer interactions, Poster and demo sessions, Technology for health
The three volume proceedings LNAI 11906 – 11908 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2019, held in Würzburg, Germany, in September 2019. The total of 130 regular papers presented in these volumes was carefully reviewed and selected from 733 submissions; there are 10 papers in the demo track. The contributions were organized in topical sections named as follows: Part I: pattern mining; clustering, anomaly and outlier detection, and autoencoders; dimensionality reduction and feature selection; social networks and graphs; decision trees, interpretability, and causality; strings and streams; privacy and security; optimization. Part II: supervised learning; multi-label learning; large-scale learning; deep learning; probabilistic models; natural language processing. Part III: reinforcement learning and bandits; ranking; applied data science: computer vision and explanation; applied data science: healthcare; applied data science: e-commerce, finance, and advertising; applied data science: rich data; applied data science: applications; demo track.
This book constitutes the refereed proceedings of the 9th International Conference on Pervasive Computing, Pervasive 2011, held in San Francisco, USA, in June 2011. The 19 revised full papers and three short papers presented were carefully reviewed and selected from 93 submissions. The contributions are grouped into the following topical sections: practices with smartphones; sensing at home, sensing at work; predicting the future; location sensing; augmenting mobile phone use; pervasive computing in the public arena; public displays; hands on with sensing; sensing on the body.
Artificial intelligence (AI) is a game changer in many domains, and wireless communication networks are no exception. With the advent of 5G networks, we have witnessed rapid growth in wireless connectivity, which has led to unprecedented opportunities for innovation and new use cases. However, as we move beyond 5G (B5G), the challenges and opportunities are set to become even more significant, offering new, previously unimaginable services. AI in Wireless for Beyond 5G Networks provides a comprehensive overview of the use of AI in wireless communication for B5G networks. The authors draw on their expertise in the field to explore the latest developments in AI technologies and their applicati...
It is widely accepted that technology is one of the forces driving economic growth. Although more and more new technologies have emerged, various evidence shows that their performances were not as high as expected. In both academia and practice, there are still many questions about what technologies to adopt and how to manage these technologies. The 15 articles in this book aim to look into these questions. There are quite many features in this book. Firstly, the articles are from both developed countries and developing countries in Asia, Africa and South and Middle America. Secondly, the articles cover a wide range of industries including telecommunication, sanitation, healthcare, entertainment, education, manufacturing, and financial. Thirdly, the analytical approaches are multi-disciplinary, ranging from mathematical, economic, analytical, empirical and strategic. Finally, the articles study both public and private organizations, including the service industry, manufacturing industry, and governmental organizations. Given its wide coverage and multi-disciplines, the book may be useful for both academic research and practical management.
This volume contains the proceedings of the International Conference on Inf- mation Computing and Applications (ICICA 2010), which was held in Tangshan, China, October 15-18, 2010. As future-generation information technology, information computing and applications become specialized, information computing and applications - cluding hardware, software, communications and networks are growing with ever-increasing scale and heterogeneity and becoming overly complex. The c- plexity is getting more critical along with the growing applications. To cope with the growing and computing complexity, information computing and applications focus on intelligent, selfmanageable, scalable computing systems ...
This volume contains the proceedings of the Second International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT 2009), held in Orlando, Florida on September 30, 2009 in conjunction with the 11th International Conference on Ubiquitous Computing (Ubicomp 2009). MELT provides a forum for the presentation of state-of-the-art technologies in mobile localization and tracking and novel applications of location-based s- vices. MELT 2009 continued the success of the ?rst workshop in the series (MELT 2008), which was held is San Francisco, California on September 19, 2008 in conjunction with Mobicom. Location-awareness is a key component for achieving context-awaren...
This book constitutes the refereed proceedings of the 6th International Conference on Information Security, ISC 2003, held in Bristol, UK in October 2003. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on network security, public key algorithms, cryptographic protocols, protocol attacks, attacks on public key cryptosystems, block ciphers, authorization, water marking, software security, and codes and related issues.
This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA, June 2006. The book presents 33 revised full papers, focusing on distributed computing issues in large-scale networked sensor systems. Coverage includes topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
One of the main goals of the pervasive computing domain is to provide the user with task support for everyday tasks. This task support should be realized by pervasive applications that are seamlessly integrated in the environment, for example embedded into devices such as everyday objects. To automate configuration, context information is shared between these devices. The shared context can contain private information that should not be made public. System support, which helps to develop pervasive applications, should therefore contain mechanisms that utilize security and privacy methods when handling context. Pervasive applications can then use these mechanisms and create pervasive environm...