Advanced Techniques in Computing Sciences and Software Engineering


Book Description

Advanced Techniques in Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Advanced Techniques in Computing Sciences and Software Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2008) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).







Mobile Computing


Book Description

Mobile computing is defined as the union between humans and mobile devices that allows people to be connected to the Internet through a network in order to transmit and receive information. This book presents a vision of the present and future of mobile computing. It identifies and examines the most pressing research issues in the field. Comprising chapters by leading researchers and academics, this volume includes recent publications in key areas of interest, including Flying Ad-Hoc Networks (FANETs), Vehicular Ad-Hoc Networks (VANETs), 5G, energy-efficient networks, localization in mobile networks, algorithms of mobile core networks, user interfaces, metabolic health analysis, and many others. This volume is suitable as a text for graduate students and professionals in the industrial sector and general engineering areas.




Privacy Enhancing Technologies


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.




Mobile Wireless Middleware, Operating Systems, and Applications


Book Description

This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Mobilware 2011, held in London, UK, in June 2011. The 21 revised full papers presented were carefully reviewed and selected from numerous contributions. The papers are organized in topical sections on mobile systems in education, SOC for mobile Apps (SOC), networking platforms (NW), mobile execution frameworks (MFW), mobile cloud (MC) and distributed execution, and mobile sensor networks.




Passive and Active Measurement


Book Description

The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurements. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year’s c- ference was held at ETH Zurich, Switzerland. PAM 2010 attracted 79 submissions. Each paper was carefully reviewed by at leastthreemembersoftheTechnicalProgramCommittee.Thereviewingprocess ledtotheacceptanceof23papers.Thepaperswerearrangedinninesessionsc- ering the following areas: routing, transport protocols, mobile devices, topology, measurement infrastructure, characterizing network usage, analysis techniques, tra?c analysis, and the Web. We are very grateful to Endace Ltd. (New Zealand), Cisco Systems Inc. (USA), armasuisse (Switzerland) and the COST Action TMA whose sponsoring allowedustokeepregistrationcostslowandto o?erseveraltravelgrantsto PhD students. We are also grateful to ETH Zurich for sponsoring PAM as a host.




Human-Computer Interaction – INTERACT 2021


Book Description

The five-volume set LNCS 12932-12936 constitutes the proceedings of the 18th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2021, held in Bari, Italy, in August/September 2021. The total of 105 full papers presented together with 72 short papers and 70 other papers in these books was carefully reviewed and selected from 680 submissions. The contributions are organized in topical sections named: Part I: affective computing; assistive technology for cognition and neurodevelopment disorders; assistive technology for mobility and rehabilitation; assistive technology for visually impaired; augmented reality; computer supported cooperative work. Part II: COVID-19 & HCI; croudsourcing methods in HCI; design for automotive interfaces; design methods; designing for smart devices & IoT; designing for the elderly and accessibility; education and HCI; experiencing sound and music technologies; explainable AI. Part III: games and gamification; gesture interaction; human-centered AI; human-centered development of sustainable technology; human-robot interaction; information visualization; interactive design and cultural development. Part IV: interaction techniques; interaction with conversational agents; interaction with mobile devices; methods for user studies; personalization and recommender systems; social networks and social media; tangible interaction; usable security. Part V: user studies; virtual reality; courses; industrial experiences; interactive demos; panels; posters; workshops. The chapter ‘Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training’ is open access under a CC BY 4.0 license at link.springer.com. The chapter ‘WhatsApp in Politics?! Collaborative Tools Shifting Boundaries’ is open access under a CC BY 4.0 license at link.springer.com.




Serious Games Analytics


Book Description

This volume brings together research on how gameplay data in serious games may be turned into valuable analytics or actionable intelligence for performance measurement, assessment, and improvement. Chapter authors use empirical research methodologies, including existing, experimental, and emerging conceptual frameworks, from various fields, such as: computer science software engineering educational data mining statistics information visualization. Serious games is an emerging field where the games are created using sound learning theories and instructional design principles to maximize learning and training success. But how would stakeholders know what play-learners have done in the game environment, and if the actions performance brings about learning? Could they be playing the game for fun, really learning with evidence of performance improvement, or simply gaming the system, i.e., finding loopholes to fake that they are making progress? This volume endeavors to answer these questions.




Ubiquitous Computing Fundamentals


Book Description

"...a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field." -From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology First introduced two decades ago, the term ubiquitous computing is now part of the common vernacular. Ubicomp, as it is commonly called, has grown not just quickly but broadly so as to encompass a wealth of concepts and technology that serves any number of purposes across all of human endeavor. While such growth is positive, the newest generation of ubicomp practitioners and researchers, isolated to specific tasks, are in danger of losing their sense of history and the broader perspective that has been so essential to the field’s creativity and brilliance. Under the guidance of John Krumm, an original ubicomp pioneer, Ubiquitous Computing Fundamentals brings together eleven ubiquitous computing trailblazers who each report on his or her area of expertise. Starting with a historical introduction, the book moves on to summarize a number of self-contained topics. Taking a decidedly human perspective, the book includes discussion on how to observe people in their natural environments and evaluate the critical points where ubiquitous computing technologies can improve their lives. Among a range of topics this book examines: How to build an infrastructure that supports ubiquitous computing applications Privacy protection in systems that connect personal devices and personal information Moving from the graphical to the ubiquitous computing user interface Techniques that are revolutionizing the way we determine a person’s location and understand other sensor measurements While we needn’t become expert in every sub-discipline of ubicomp, it is necessary that we appreciate all the perspectives that make up the field and understand how our work can influence and be influenced by those perspectives. This is important, if we are to encourage future generations to be as successfully innovative as the field’s originators.




Delay Tolerant Networks


Book Description

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applicat