Search results
Create the page "Ubiquitous Computing" on this wiki! See also the search results found.
- ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing Pervasive computing enables computers to interact with the real world in a ubiquitous and natural manner. It is, in its core, an application-driven discipline en5 KB (734 words) - 11:35, 2 August 2009
- ...e for realising next generation networking and computing, e.g., ubiquitous computing, 4 G all IP networks. Along with the rapid development of hardware and embe7 KB (950 words) - 11:35, 2 August 2009
- information retrieval, ubiquitous and mobile computing, data mining, marketing,5 KB (671 words) - 10:51, 20 November 2020
- | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing5 KB (571 words) - 11:35, 2 August 2009
- -International Journal of Ad-Hoc and Ubiquitous Computing (IJAHUC) (SCI) GridCAT 2009 (Grid Computing, Applications and Technologies)- http://www.csie.thu.edu.tw/gridcat20094 KB (422 words) - 11:36, 2 August 2009
- ...rithm, immunity algorithm, quantum calculation, soft computing, Ubiquitous Computing and simulated annealing algorithm, etc.2 KB (203 words) - 11:36, 2 August 2009
- ...e=7th Workshop on Software Technologies for Future Embedded and Ubiquitous Computing Systems Future Embedded and Ubiquitous Computing Systems4 KB (440 words) - 19:27, 2 August 2009
- Ubiquitous computing environments Mobile Computing Device3 KB (339 words) - 11:36, 2 August 2009
- ...s of security – with special focus on secure internet solutions, trusted computing, digital forensics, privacy and organizational security issues. ARES aims a Security Issues for Ubiquitous Systems,3 KB (352 words) - 12:39, 11 August 2009
- - Ubiquitous Computing Security, Pervasive Computing and Emerging Models - Computing and Information Systems5 KB (667 words) - 14:27, 13 September 2009
- |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems1 KB (187 words) - 04:49, 23 September 2009
- |title=Ubiquitous Computing and Communication Journal |Field=Ubiquitous computing5 KB (653 words) - 16:59, 29 May 2016
- ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing4 KB (508 words) - 13:29, 13 July 2010
- |Title=Intelligent Computing International Conference on Integrated Intelligent Computing (ICIIC 2010)3 KB (421 words) - 16:11, 10 November 2009
- - Ubiquitous Computing4 KB (507 words) - 22:37, 18 November 2009
- ...d dependability. Verification and validation. E-business agents. Pervasive computing. Privacy, safety, and security. ...vices and service-oriented computing. Artificial social systems. Autonomic computing. Case studies and reports on deployments. Computational infrastructures. In6 KB (733 words) - 18:19, 24 September 2020
- Parallel Processing and Distributed Computing Foundations of High-performance Computing6 KB (670 words) - 12:28, 10 January 2010
File:Ubicc logo3.jpg Ubiquitous Computing and Communication Journal(110 × 110 (7 KB)) - 13:28, 19 January 2010- |Title=Ubiquitous Computing and Communication Journal - UbiCC Journal |Field=Ubiquitous Computing and Communication2 KB (309 words) - 13:26, 19 January 2010