Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2008 (1)

Listing 1 - 1 of 1
Sort by
Pervasive Computing : 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008
Authors: --- --- --- --- --- et al.
ISBN: 9783540795759 3540795758 3540795766 Year: 2008 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, held in Sydney, Australia, in May 2008. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on sensing and activity recognition, applications for mobile devices, location in pervasive systems, platforms for pervasive computing, lessons learned from displays, games and health applications, as well as privacy and security.

Keywords

Ubiquitous computing --- Mobile computing --- Portable computers --- Informatique omniprésente --- Informatique mobile --- Ordinateurs portables --- Congresses. --- Congrès --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Information storage and retrieval. --- Computer engineering. --- Computer Science. --- Computer Engineering. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Protection --- Security measures --- Distributed processing --- Software engineering. --- Information storage and retrieva. --- Computer software engineering --- Engineering --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computers, Special purpose.

Listing 1 - 1 of 1
Sort by