|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-2-287-78544-3 |
003 |
DE-He213 |
005 |
20220116220637.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 fr | s |||| 0|eng d |
020 |
|
|
|a 9782287785443
|9 978-2-287-78544-3
|
024 |
7 |
|
|a 10.1007/978-2-287-78544-3
|2 doi
|
050 |
|
4 |
|a QA76.9.U83
|
050 |
|
4 |
|a QA76.9.H85
|
072 |
|
7 |
|a UYZ
|2 bicssc
|
072 |
|
7 |
|a COM070000
|2 bisacsh
|
072 |
|
7 |
|a UYZ
|2 thema
|
082 |
0 |
4 |
|a 005.437
|2 23
|
082 |
0 |
4 |
|a 004.019
|2 23
|
100 |
1 |
|
|a Rudolph, Carsten.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Developing Ambient Intelligence
|h [electronic resource] :
|b Proceedings of the second International Conference on Ambient Intelligence developments (AmI.d '07) /
|c by Carsten Rudolph.
|
250 |
|
|
|a 1st ed. 2008.
|
264 |
|
1 |
|a Paris :
|b Springer Paris :
|b Imprint: Springer,
|c 2008.
|
300 |
|
|
|a XIII, 253 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Research Track Proceedings -- Abstracting connection volatility through tagged futures -- Towards Semantic Resolution of Security in Ambient Environments -- Modeling Decentralized Information Flow in Ambient Environments -- Secure Profiles as a Cornerstone in Emerging Ambient Intelligence Scenarios -- Designing for People in Ambient Intelligence Environments -- Architecture and Design Patterns for Ambient Intelligence: an Industry Perspective -- An Ambient Intelligence Based Multi-Agent Architecture -- Management of Large Video Recordings -- XMPP based Health Care Integrated Ambient Systems Middleware -- Increasing Interactivity in Agent-based Advanced Pocket-Device Service Application -- Towards a Model Driven Development of Context-aware Systems for AmI Environments -- Taking Ownership of Computational Resources -- Bluetooth Indoor Positioning and Ambient Information System -- XACML as a Security and Dependability Pattern for Access Control in AmI environments -- Rationale for defining NCIPs (Neighborhood and Context Interaction Primitives) position paper -- Agent Oriented AmI Engineering -- EuroTRUSTAmI workshop : European R&D towards trusted Ambient Intelligence -- EuroTRUSTAmI workshop : European R&D towards trusted Ambient Intelligence -- Cyber-Security EU/US. Meet the pathfinders of our future.
|
520 |
|
|
|a At the time of the introduction of the Ambient Intelligence (AmI) concept many scenarios where considered to be visionary or even science fiction. Enabled by current technology, many aspects of these scenarios are slowly but inexorably becoming true. However, we are still facing important challenges that need further investments in research and industrialization. Current software engineering techniques and tools are not prepared to deal with the development of applications for what we could call AmI ecosystems, lacking a fixed architecture, controlled limits and even owners. The comfortable boundaries of static architectures and well-defined limits and owners are not existent in these AmI ecosystems. In its second year AmI.d again shows the heterogeneity of research challenges related to Ambient Intelligence. Many disciplines are involved and have to co-ordinate their efforts in resolving the strongly related research issues. AmI.d was accompanied in 2007 by the EuroTRUSTAmI workshops providing a forum for discussion and exchange between 28 European projects and platforms. Finally, a panel discussion complemented the program by showing a widened perspective by discussing future issues of cyber-security in the context of international AmI eco-systems. The research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most leading-edge research and contain contributions that have been formally reviewed and chosen by a selected International Program Committee. The contributions cover a wide range of AmI topics: -Design and Development of AmI systems, Software engineering -Context information -Security of AmI -Agents and AmI -Applications -AmI usages and adoption.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Human-computer interaction.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Nanotechnology.
|
650 |
1 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Nanotechnology.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9782287100901
|
776 |
0 |
8 |
|i Printed edition:
|z 9782287785436
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-2-287-78544-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|