Search results

Jump to: navigation, search
  • ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing Pervasive computing enables computers to interact with the real world in a ubiquitous and natural manner. It is, in its core, an application-driven discipline en
    5 KB (734 words) - 11:35, 2 August 2009
  • ...e for realising next generation networking and computing, e.g., ubiquitous computing, 4 G all IP networks. Along with the rapid development of hardware and embe
    7 KB (950 words) - 11:35, 2 August 2009
  • information retrieval, ubiquitous and mobile computing, data mining, marketing,
    5 KB (671 words) - 10:51, 20 November 2020
  • | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing
    5 KB (571 words) - 11:35, 2 August 2009
  • -International Journal of Ad-Hoc and Ubiquitous Computing (IJAHUC) (SCI) GridCAT 2009 (Grid Computing, Applications and Technologies)- http://www.csie.thu.edu.tw/gridcat2009
    4 KB (422 words) - 11:36, 2 August 2009
  • ...rithm, immunity algorithm, quantum calculation, soft computing, Ubiquitous Computing and simulated annealing algorithm, etc.
    2 KB (203 words) - 11:36, 2 August 2009
  • ...e=7th Workshop on Software Technologies for Future Embedded and Ubiquitous Computing Systems Future Embedded and Ubiquitous Computing Systems
    4 KB (440 words) - 19:27, 2 August 2009
  • Ubiquitous computing environments Mobile Computing Device
    3 KB (339 words) - 11:36, 2 August 2009
  • ...s of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims a Security Issues for Ubiquitous Systems,
    3 KB (352 words) - 12:39, 11 August 2009
  • - Ubiquitous Computing Security, Pervasive Computing and Emerging Models - Computing and Information Systems
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • |title=Ubiquitous Computing and Communication Journal |Field=Ubiquitous computing
    5 KB (653 words) - 16:59, 29 May 2016
  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009
  • |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing
    4 KB (508 words) - 13:29, 13 July 2010
  • |Title=Intelligent Computing International Conference on Integrated Intelligent Computing (ICIIC 2010)
    3 KB (421 words) - 16:11, 10 November 2009
  • - Ubiquitous Computing
    4 KB (507 words) - 22:37, 18 November 2009
  • ...d dependability. Verification and validation. E-business agents. Pervasive computing. Privacy, safety, and security. ...vices and service-oriented computing. Artificial social systems. Autonomic computing. Case studies and reports on deployments. Computational infrastructures. In
    6 KB (733 words) - 18:19, 24 September 2020
  • Parallel Processing and Distributed Computing Foundations of High-performance Computing
    6 KB (670 words) - 12:28, 10 January 2010
  • File:Ubicc logo3.jpg
    Ubiquitous Computing and Communication Journal
    (110 × 110 (7 KB)) - 13:28, 19 January 2010
  • |Title=Ubiquitous Computing and Communication Journal - UbiCC Journal |Field=Ubiquitous Computing and Communication
    2 KB (309 words) - 13:26, 19 January 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)