Home
Paper Submission
Program Committee
Accepted Papers
Invited talk New
Venue & Visa New
Important Dates
Contact Us
Courtesy
Technically Sponsored by
Proceedings
The
Registration fee is 250 USD. Hard copy of the proceedings will be
distributed during the Conference. The softcopy will be available on
AIRCC Digital Library
Other Conferences
CCSEA 2015
DKMP 2015
EMSA 2015
SEA 2015
CLOUD 2015
Related Conferences
WiMONe 2014
NCS 2014
IST 2014
CSEIT 2014
SPM 2014
|
Scope and Topics Call for Participation Program Schedule Conference Proceedings Conference Photos
The Fifth International Conference on Ad hoc, sensor & Ubiquitous Computing (ASUC-2014)
will provide an excellent international forum for sharing knowledge
and results in theory, methodology and applications of Ad Hoc &
Ubiquitous computing. Current information age is witnessing a dramatic
use of digital and electronic devices in the workplace and beyond.
Ubiquitous Computing presents a rather arduous requirement of
robustness, reliability and availability to the end user. Ad hoc,
Sensor & Ubiquitous computing has received a significant and
sustained research interest in terms of designing and deploying large
scale and high performance computational applications in real life.
Topics of Interest
Authors
are solicited to contribute to this conference by submitting articles
that illustrate research results, projects, surveying works and
industrial experiences that describe significant advances in the
following areas, but are not limited to
Ad Hoc Computing
- Ad Hoc Networks of Autonomous Intelligent Systems
- Addressing and location management
- Architectures, protocols, and algorithms
- Data management issues
- Distributed technology
- Mobile ad hoc learning
- Mobile and wireless ad hoc networks
- Mobile agents for ad hoc networking
- Network design and planning
- Novel Architectures for Ad Hoc and Sensor Networks
- Performance Analysis and Simulation of Protocols
- Power-aware and energy-efficient designs
- Quality of service
- Resource allocation
- Security and privacy
- Self-configuring and self-healing schemes
- Services and applications
- Wireless & Mobile network Security
- Wireless sensor network
Sensor Networks
- Architectures, protocols and algorithms
- Data allocation and information
- Deployments and implementations
- Embedded, network-oriented operating systems
- Energy optimization
- Hardware aspects of sensor design
- Location management and placement
- MAC protocols for wireless sensor networks
- Middleware and software tools
- Modeling and Performance evaluation
- Radio Issues with other wireless/mobile systems
- Resource allocation, services, QoS and fault tolerance
- Scalability of wireless sensor networks
- Security and dependability issues
- Sensor circuits and devices
- Software, applications and programming
- Under water sensors and systems
- Visualization of sensor data
- Work models
Ubiquitous Computing
- Architectural structure, design decisions and philosophies
- Autonomic management of ubiquitous systems
- Context and location awareness, context based and implicit computing
- Distributed Computing
- Ubicomp Human-computer Interaction for devices
- Intelligent devices and environments
- Internet Computing and Applications
- Interoperability and large scale deployment
- Middleware services and agent technologies
- Personalized & special field applications
- Security Issues and Applications
- Service discovery mechanisms and protocols
- Software infrastructures
- System support infrastructures and services
- Ubiquitous systems and trust
- User interfaces and interaction models
- Virtualization over networks of devices
- Wearable computers and technologies
- Wireless networking and mobile, pervasive and ubiquitous computing
- Wireless/mobile service management and delivery
- Mobile Computing
- Network Protocols & Wireless Communication
|
|