Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Ubiquitous computing --- Mobile computing --- Portable computers --- Informatique omniprésente --- Informatique mobile --- Ordinateurs portables --- Congresses. --- Congrès --- Mobile computing -- Congresses. --- Portable computers -- Congresses. --- Ubiquitous computing -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Information storage and retrieval. --- Computer engineering. --- Computer Science. --- Computer Engineering. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Protection --- Security measures --- Distributed processing --- Software engineering. --- Information storage and retrieva. --- Computer software engineering --- Engineering --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Ubiquitous computing --- Wearable computers --- Mobile computing --- Portable computers --- Wearable technology
Choose an application
On behalf of the Organizing Committee for Pervasive2007, welcome to the p- ceedingsoftheFifthInternationalConferenceonPervasiveComputing. Theyear 2007 was a milestone for this young conference series, as it marked the ?rst year that it was held outside of Europe. This globalization of the Pervasive c- ference is further evidence of its emergence as one of the most respected venues for publishing research on pervasive and ubiquitous computing. Each Pervasive conference represents a snapshot of our ?eld, capturing the state of the art in technology, the research challenges we are addressing, as well as the people that form the Pervasive community. Each year's proceedings represent an oppor- nity to learnaboutnew areas andidentify upcoming researchopportunities, and 2007 was no exception. Pervasive 2007 attracted 132 high-quality submissions, from which the Te- nicalProgramCommitteeaccepted21papers,resultinginacompetitive16%- ceptance rate. In total, there were over400individual authors from32 countries, coming from a wide array of disciplines and from both academic and industrial organizations. Paperswereselectedsolelyonthe qualityoftheir peer reviews- ing a double-blind review process. We were fortunate to draw on the combined experience of over 125 years of research in pervasive and ubiquitous comp- ing in our 28 Program Committee members, coming from the most prestigious universities and research labs in Europe, North America, and Asia. Program Committee members were aided by no less than 177 external reviewers in this rigorousprocess,in whicheachCommittee member wroteabout ten reviewsand each external reviewer between one and six.
Choose an application
Choose an application
ThisvolumecontainstheproceedingsoftheInternetofThings(IOT)Conference 2008, the ?rst international conference of its kind. The conference took place in Zurich,Switzerland, March26-28,2008. The term Internet of Things' hascome to describe a number of technologies and researchdisciplines that enable the - ternet to reach out into the real world of physical objects. Technologies such as RFID, short-range wireless communications, real-time localization, and sensor networks are becoming increasingly common, bringing the Internet of Things' into industrial, commercial, and domestic use. IOT 2008 brought together le- ing researchersand practitioners, from both academia and industry, to facilitate the sharing of ideas, applications, and research results. IOT 2008 attracted 92 high-quality submissions, from which the technical program committee accepted 23 papers, resulting in a competitive 25% acc- tance rate. In total, there were over 250 individual authors from 23 countries, representing both academic and industrial organizations. Papers were selected solely on the quality of their blind peer reviews. We were fortunate to draw on the combined experience of our 59 program committee members, coming from the most prestigious universities and research labs in Europe, North America, Asia, and Australia. Program committee members were aided by no less than 63 external reviewers in this rigorous process, in which each committee member wrote about 6 reviews. The total of 336 entered reviews resulted in an average of 3. 7 reviews per paper, or slightly more than 1000 words of feedback for each paper submitted.
Distribution strategy --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IoT (Internet of Things) --- informatica --- datacommunicatie --- informatiesystemen --- e-commerce --- computerbeveiliging --- computernetwerken
Choose an application
Distribution strategy --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IoT (Internet of Things) --- informatica --- datacommunicatie --- informatiesystemen --- e-commerce --- computerbeveiliging --- computernetwerken
Choose an application
Listing 1 - 10 of 10 |
Sort by
|