Description
Springer Ubiquitous Information Technologies and Applications CUTE 2013 by Young-Sik Jeong, Young-Ho Park, Ching-Hsien (Robert) Hsu, James J. (Jong Hyuk) Park
The theme of CUTE is focused on the various aspects of ubiquitous computing for advances in ubiquitous computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ubiquitous computing. Therefore this book will be include the various theories and practical applications in ubiquitous computing_x000D_ Table of contents : - _x000D_
Ubiquitous Communication and Networking.- Ubiquitous wired and wireless networks.- Ad-hoc networking.- Intelligent sensor network/RFID.- Ubiquitous/pervasive platform and middleware.- Automated, adapted and situated service.- Open service architecture.- Intelligent web service.- Mobile and ubiquitous multicasting.- Next-generation Internet & IPv6.- Mobile network (NGN/BcN).- Wireless communication technology.- Optical networks.- Home networks.- Future Internet.- Ubiquitous Software Technology.- Context-aware acquisition and representation.- Context-aware media processing.- Context database/management.- Context framework and middleware.- Context analysis and utilization.- Context/Location-aware application.- Energy-aware system.- Resource-aware computation.- Self-aware computers and systems.- Ubiquitous Systems and Applications.- Distributed ubiquitous middleware.- Ubiquitous intelligent applications.- Ubiquitous intelligent systems.- Intelligence grid platform and service.- U-Health care system.- Smart appliances and wearable devices.- Haptic interfaces and interactions.- Design principles for multimodal systems.- Auditory and haptic displays.- Multimodal gaming and entertainment.- Novel systems and interactions using other modalities (e.g. taste, smell).- Computer imaging and graphics<.- Ubiquitous learning.- Ubiquitous Security, Privacy and Trust.- Information security and cryptography.- Security services/mechanisms/protocols in network/system levels.- Access control in network/system levels.- Identity, privacy, and trust issues in ubiquitous society.- Risk estimation and management.- Formal verification for security services & mechanisms/protocols.- Performance analysis for security services & mechanisms/protocols._x000D_