Personal Information
À propos
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Mots-clés
mobile computing
distributed computing
ubiquitous computing
iot-big data
internet of things
cloud computing
software infrastructures
architectural structure
pervasive and ubiquitous computing
ubiquitous systems
big data
networking
network protocols & wireless communication
wireless video networking
data mining
virtualization
wireless networking
network protocols
free online ocr
online ocr
ocr convert
dsdv
dsr
dymo
olsr
aodv
ubiquitous healthcare
intelligent devices
wireless communication
machine learning
performance comparaison
wireless sensor networks
internet computing and applications
convert image to text.net
i2ocr
free ocr
zigbee
gsm
autonomic management of ubiquitous systems
interoperability
optical character recognition
mobile edge computing
fog computing
wireless grids
adhoc networks
ubiquitous student model
ubiquitous learning
ubiquitous systems and trust
iot
biomedical informatics
correlation
deep learning
big data management
mutual authentication
wireless sensor network
network lifetime
software systems and technologies
optical computing
computer networks
mobile web service
cconstrained service provider
wimax
mobile networks
scheduling
anonymization
privacy preserving
google docs.
free ocr to word convert
multi-channel
aal2r
multi radio
packet aggregation
gsr
energy consumption
virtual machine
renewable energy
usability testing
affective computing
q sensor
wearable technology
design decisions and philosophies
context and location awareness
context based and implicit computing
log files
hadoop
mapreduce
parallel processing
wireless body area networks
android smart phone
web application server
security issues
ambient intelligence
ubicomp human-computer interac
digital device
security issues and applicatio
internet computing
wearable computers
wireless mesh network
triple modular redundancy
rollback recovery
dependency tracking
checkpointing
fuzzy systems
data integrity
blockchain
cryptography
history logs
cloud business
cloud applications
machine learning applications
big data mining
recognition.
tracking
virtual environment
virtual objects
hand gesture
xbox kinect
displacements
inter-event time
power-law distribution
cdrs
modelling
public-key encryption
smart sensor
context-aware
wi-fi
gateway
stability
alive nodes
half dead nodes
deec
ubicomp human-computer interaction for devices
mobile ad hoc networks (manets)
ubiquitous computing.
wearable computers and technologies
energy efficiency
wireless
information technology
system support infrastructures and services
service discovery mechanisms and protocols
wireless/mobile service management and delivery
wireless networking and mobile
personalized & special field applications
middleware services and agent technologies
interoperability and large scale deployment
grid computing
responsive design
large displays
distance
coap
llightweight
user profile
detective
preventive
power saving
optical character recognition (ocr)
packet forwarding.
visual cryptography scheme and mms
hadoop distributed file system.
upnp
comparison
jini
service discovery
salutation
slp
complex networks
opportunistic networks
small-world networks
graphs
data dissemination
routing algorithm
homecare
dementia
pervasive computing
deferred approach
issues in data cleaning
rfid data
simulation
middleware services
prime numbers
probably)
(large
n
miller-rabi
rsa
digital signatures
kryptography
e
cloudcomputing
gui
intrusion detection
smoke detection
access control
reminder systems
physiological monitoring
emergency response
independent living
lab view
activity monitoring
home automation
elderly care
smart homes
hadoop distributed file system
bluetooth sdp
networks of devices
ontologies
networks of device
mms
visual cryptography scheme
pervasive computing environmen
mobile ad hoc networks (manets
word conver
r
google docs
orkney
windfarm
history logs.
neural networks
robotics
ontology
evolutionary computing
computer vision
personalized & special field a
environments
g
filtering power.
cloud services
attacks
permit verification
y identification
radiofrequency
nodemcu 8266
system support infrastructures
ubicomp human-computer
design decisions and philosoph
one dollar recognition
knn
dtw
behaviours monitoring
autistic child
llight weight
; coap
biometric security
authentication
multiple viewers
distributed computin
piecewise linear approximation
health
authentication
mobile ad hoc networks
packet forwarding
adhoc
sensor
technology
bigdata
datamining
pervasive and ubiquitous compu
decryption
encryption
discrete logarithm
elliptic curves
public key encryption
mobile
databases
networks
ubiquitous computin
public vehicle tracking
cryptographic protocols
blockchain consensus algorithms
software security
untraceability
natural language
internet of things (iot)
nlp techniques
text mining
cloud security
block chain
cloud business
internet of things
user interfaces and interaction models
information security
or devices
autonomic management
algorithms and applications
machine learning and iot
privacy and trust
big data security
5g and networks for big data
big data search and mining
focused crawling
online crawling
events detection
web sphere monitoring
web monitoring
ssl-ma
low-cost rfid tag
rfid
cyber security
bioinformatics
algorithms
and pervasive computing environment
induction heating
induction coil parameter
fem
electromagnetic
lifetime
bindings
ponder2
virtual stub cache manager
contextual reconfiguration
filtering powe
intelligent manufacturing technology and services
computational mathematics
computational science and applications
networking and architectures
mac layer
synchronization
secure-time
peer to peer communication & security
e- payment system
digital wallet
mobile network
wireless network
• mobile computing
• distributed computing
multiple viewers.
wireless mesh networks
and pervasive computing environment
smart sensor
context - aware
wi - fi
public - key encryption
mobile ad hoc network s (manet s )
perform ance comparaison
xbox kinect.
bluetooth sdp.
ontologies.
Tout plus
Présentations
(9)Documents
(134)Personal Information
À propos
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Mots-clés
mobile computing
distributed computing
ubiquitous computing
iot-big data
internet of things
cloud computing
software infrastructures
architectural structure
pervasive and ubiquitous computing
ubiquitous systems
big data
networking
network protocols & wireless communication
wireless video networking
data mining
virtualization
wireless networking
network protocols
free online ocr
online ocr
ocr convert
dsdv
dsr
dymo
olsr
aodv
ubiquitous healthcare
intelligent devices
wireless communication
machine learning
performance comparaison
wireless sensor networks
internet computing and applications
convert image to text.net
i2ocr
free ocr
zigbee
gsm
autonomic management of ubiquitous systems
interoperability
optical character recognition
mobile edge computing
fog computing
wireless grids
adhoc networks
ubiquitous student model
ubiquitous learning
ubiquitous systems and trust
iot
biomedical informatics
correlation
deep learning
big data management
mutual authentication
wireless sensor network
network lifetime
software systems and technologies
optical computing
computer networks
mobile web service
cconstrained service provider
wimax
mobile networks
scheduling
anonymization
privacy preserving
google docs.
free ocr to word convert
multi-channel
aal2r
multi radio
packet aggregation
gsr
energy consumption
virtual machine
renewable energy
usability testing
affective computing
q sensor
wearable technology
design decisions and philosophies
context and location awareness
context based and implicit computing
log files
hadoop
mapreduce
parallel processing
wireless body area networks
android smart phone
web application server
security issues
ambient intelligence
ubicomp human-computer interac
digital device
security issues and applicatio
internet computing
wearable computers
wireless mesh network
triple modular redundancy
rollback recovery
dependency tracking
checkpointing
fuzzy systems
data integrity
blockchain
cryptography
history logs
cloud business
cloud applications
machine learning applications
big data mining
recognition.
tracking
virtual environment
virtual objects
hand gesture
xbox kinect
displacements
inter-event time
power-law distribution
cdrs
modelling
public-key encryption
smart sensor
context-aware
wi-fi
gateway
stability
alive nodes
half dead nodes
deec
ubicomp human-computer interaction for devices
mobile ad hoc networks (manets)
ubiquitous computing.
wearable computers and technologies
energy efficiency
wireless
information technology
system support infrastructures and services
service discovery mechanisms and protocols
wireless/mobile service management and delivery
wireless networking and mobile
personalized & special field applications
middleware services and agent technologies
interoperability and large scale deployment
grid computing
responsive design
large displays
distance
coap
llightweight
user profile
detective
preventive
power saving
optical character recognition (ocr)
packet forwarding.
visual cryptography scheme and mms
hadoop distributed file system.
upnp
comparison
jini
service discovery
salutation
slp
complex networks
opportunistic networks
small-world networks
graphs
data dissemination
routing algorithm
homecare
dementia
pervasive computing
deferred approach
issues in data cleaning
rfid data
simulation
middleware services
prime numbers
probably)
(large
n
miller-rabi
rsa
digital signatures
kryptography
e
cloudcomputing
gui
intrusion detection
smoke detection
access control
reminder systems
physiological monitoring
emergency response
independent living
lab view
activity monitoring
home automation
elderly care
smart homes
hadoop distributed file system
bluetooth sdp
networks of devices
ontologies
networks of device
mms
visual cryptography scheme
pervasive computing environmen
mobile ad hoc networks (manets
word conver
r
google docs
orkney
windfarm
history logs.
neural networks
robotics
ontology
evolutionary computing
computer vision
personalized & special field a
environments
g
filtering power.
cloud services
attacks
permit verification
y identification
radiofrequency
nodemcu 8266
system support infrastructures
ubicomp human-computer
design decisions and philosoph
one dollar recognition
knn
dtw
behaviours monitoring
autistic child
llight weight
; coap
biometric security
authentication
multiple viewers
distributed computin
piecewise linear approximation
health
authentication
mobile ad hoc networks
packet forwarding
adhoc
sensor
technology
bigdata
datamining
pervasive and ubiquitous compu
decryption
encryption
discrete logarithm
elliptic curves
public key encryption
mobile
databases
networks
ubiquitous computin
public vehicle tracking
cryptographic protocols
blockchain consensus algorithms
software security
untraceability
natural language
internet of things (iot)
nlp techniques
text mining
cloud security
block chain
cloud business
internet of things
user interfaces and interaction models
information security
or devices
autonomic management
algorithms and applications
machine learning and iot
privacy and trust
big data security
5g and networks for big data
big data search and mining
focused crawling
online crawling
events detection
web sphere monitoring
web monitoring
ssl-ma
low-cost rfid tag
rfid
cyber security
bioinformatics
algorithms
and pervasive computing environment
induction heating
induction coil parameter
fem
electromagnetic
lifetime
bindings
ponder2
virtual stub cache manager
contextual reconfiguration
filtering powe
intelligent manufacturing technology and services
computational mathematics
computational science and applications
networking and architectures
mac layer
synchronization
secure-time
peer to peer communication & security
e- payment system
digital wallet
mobile network
wireless network
• mobile computing
• distributed computing
multiple viewers.
wireless mesh networks
and pervasive computing environment
smart sensor
context - aware
wi - fi
public - key encryption
mobile ad hoc network s (manet s )
perform ance comparaison
xbox kinect.
bluetooth sdp.
ontologies.
Tout plus