Get Free Shipping on orders over $79
Pervasive Computing : 6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008 - Jadwiga Indulska

Pervasive Computing

6th International Conference, PERVASIVE 2008, Sydney, Australia, May 19-22, 2008

By: Jadwiga Indulska, ?Donald Patterson, ?Tom Rodden

eText | 16 May 2008 | Edition Number 1

At a Glance

eText


$84.99

or 4 interest-free payments of $21.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.
On behalf of the Organizing Committee for Pervasive 2008, welcome to the proceedings of the 6th International Conference on Pervasive Computing. The year2008wasthesecondtimeinasmanyyearsthatthePervasiveconferencehas attempted to "globalize": For the second year in a row the conference was held outside of Europe. The conference is seen as one of the most respected venues for publishing researchon pervasive and ubiquitous computing and captures the state of the art in pervasive computing research. In 2008, as in previous years, the proceedings present solutions for challenging research problems and help to identify upcoming research opportunities. Pervasive 2008 attracted 114 high-quality submissions, from which the Te- nical Program Committee accepted 18 papers, resulting in a competitive 15. 8% acceptance rate. There were over 335 individual authors from 27 countries,c- ing from a wide range of disciplines and from both academic and industrial organizations. Papers were selected solely on the quality of their peer reviews using a double-blind review process. The review process was carried out by 38 members of the international Technical ProgramCommittee (TPC) who are - perts of international standing. The TPC members were aided by 104 external reviewers. It wasa rigorousreviewprocess,in whicheachpaper had atleastfour reviews: three reviews provided by by the Committee members and one review written by an external reviewer. The reviews were followed by a substantive - liberation on each paper during an electronic discussion phase before the start of the Committee meeting.
on
Desktop
Tablet
Mobile

More in Data Encryption