Narrow your search

Library

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

AP (1)

EhB (1)

More...

Resource type

book (3)

digital (1)


Language

English (4)


Year
From To Submit

2013 (2)

2012 (2)

Listing 1 - 4 of 4
Sort by

Book
Mobile and Ubiquitous Systems: Computing, Networking, and Services : 9th International Conference, MOBIQUITOUS 2012, Beijing, China, December 12-14, 2012. Revised Selected Papers
Authors: --- ---
ISBN: 3642402372 3642402380 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Computer System Implementation. --- Information Storage and Retrieval. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Mobile computing --- Ubiquitous computing --- Computer network architectures. --- Information storage and retrieva. --- Software engineering. --- Computer software engineering --- Engineering --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Special purpose computers --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Architecture, Computer --- Distributed processing


Digital
Mobile and Ubiquitous Systems: Computing, Networking, and Services : 9th International Conference, MobiQuitous 2012, Beijing, China, December 12-14, 2012. Revised Selected Papers
Authors: --- ---
ISBN: 9783642402388 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.


Book
Network Computing and Information Security : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings
Authors: --- --- ---
ISBN: 3642352103 3642352111 Year: 2012 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Keywords

Computer science. --- Computer Communication Networks. --- Computer system performance. --- Data protection. --- Information systems. --- Electronic data processing. --- Computer Science. --- Systems and Data Security. --- Computing Methodologies. --- Information Systems and Communication Service. --- System Performance and Evaluation. --- Engineering & Applied Sciences --- Computer Science --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computers. --- Science --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Protection --- Security measures --- Failures --- Distributed processing --- Artificial intelligence. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer networks


Book
Network Computing and Information Security : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
Authors: --- --- --- ---
ISBN: 9783642352119 Year: 2012 Publisher: Berlin Heidelberg Springer Berlin Heidelberg Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Keywords

Listing 1 - 4 of 4
Sort by