You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, n...
This book constitutes the proceedings of three International Conferences, NeCoM 2011, on Networks & Communications, WeST 2011, on Web and Semantic Technology, and WiMoN 2011, on Wireless and Mobile Networks, jointly held in Chennai, India, in July 2011. The 74 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of networks and communications in wireless and mobile networks dealing with issues such as network protocols and wireless networks, data communication technologies, and network security; they present knowledge and results in theory, methodology and applications of the Web and semantic technologies; as well as current research on wireless and mobile communications, networks, protocols and on wireless and mobile security.
This book constitutes the refereed proceedings of the International Conference on Embedded and Ubiquitous Computing, EUC 2007, held in Taipei, Taiwan, in December 2007. The 65 revised full papers presented were carefully reviewed and selected from 217 submissions. The papers are organized in topical sections. They include sections on power aware computing, reconfigurable embedded systems, wireless networks, real-time/embedded operating systems, and embedded system architectures.
The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23–25, 2010. They attracted many local and int- national delegates, presenting a balanced mixture of intellects from the East and from the West. The goal of these conferences is to bring together researchers and practitioners from academia and industry to focus on understanding computer networks, wireless networks, mobile networks and the Web, semantic technologies and to establish new collaborations in thes...
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Ad...
Some researcher has created the vision of the 'data utility' as a key enabler towards ubiquitous and pervasive computing. Decentralization and replication would be the approach to make it resistant against security attacks. This book presents an organic view on the research and technologies, which bring us towards the realization of the vision.
This volume constitutes the first of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 59 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on distributed and parallel systems and algorithms; DSP, image processing, pattern recognition, and multimedia; software engineering; database and data Mining; as well as soft computing, such as AI, neural networks, fuzzy systems, etc.