ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ITAUC 2014 - The 4th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2014)

Date2014-07-02 - 2014-07-04

Deadline2013-12-15

VenueBirmingham City Univ, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://voyager.ce.fit.ac.jp/conf/imis/2014

Topics/Call fo Papers

Networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels in the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the utilization of network resources. Therefore, architectures and algorithms in these networks become very complex and it seems imperative to focus on new models and methods as well as mechanisms, which can enable the network to perform adaptive, intelligent and flexible behaviors. The aim of this workshop is to present the innovative researches, methods and algorithms for wireless networks, broadband networks and ubiquitous computing.
The workshop seeks original contributions in all relevant areas, including but not limited to the following topics.
Topics of interest
Intelligent Techniques for Wireless Communication and Computing
Intelligent Algorithms for Networks
New Approaches for Ubiquitous Computing
Agent Technology
Fuzzy Logic
Genetic Algorithms
Neural Networks
Petri Nets
Intelligent Robotics
Intelligent Techniques for Heterogeneous Networks
Intelligent Techniques for Ad Hoc Networks
Intelligent Techniques for Sensor Networks
Intelligent Techniques for Communications
Semiconductor Techniques for Hardware and Software Design of Communicating Entities
Intelligent Techniques for Networks Security
Grey Theorem

Last modified: 2013-11-11 23:13:14