Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.7 - UBIQUITOUS/PERVASIVE/MOBILE

S. Alcalde Bagüés, A. Zeidler, I. R. Matias, C. Klein, C. Fernandez Valdivielso:
Enabling Personal Privacy for Pervasive Computing Environments
/jucs_16_3/enabling_personal_privacy_for
page 341 - 371
Vol.16 / Issue 3
Y. Cai:
Mobile Intelligence
/jucs_16_12/mobile_intelligence
page 1650 - 1665
Vol.16 / Issue 12
A. Garcia-de-Prado, G. Ortiz, J. Boubeta-Puig, D. Corral-Plaza:
Air4People: a Smart Air Quality Monitoring and Context-Aware Notification System
/jucs_24_7/air4people_a_smart_air
page 846 - 863
Vol.24 / Issue 7
J.P. García-Vázquez, M.D. Rodríguez, M.E. Tentori, D. Saldaña, Á.G. Andrade, A.N. Espinoza:
An Agent-based Architecture for Developing Activity-Aware Systems for Assisting Elderly
/jucs_16_12/an_agent_based_architecture
page 1500 - 1520
Vol.16 / Issue 12
A. Harchay, L. Cheniti-Belcadhi, R. Braham:
A Context-aware Approach for Personalized Mobile Self-Assessment
/jucs_21_8/a_context_aware_approach
page 1061 - 1085
Vol.21 / Issue 8
T.P. Ho, H.-S. Kang, S.-R. Kim:
Graph-based KNN Algorithm for Spam SMS Detection
/jucs_19_16/graph_based_knn_algorithm
page 2404 - 2419
Vol.19 / Issue 16
A.J. Jara, D. Fernandez, P. Lopez, M.A. Zamora, A.F. Skarmeta, L. Marin:
Evaluation of Bluetooth Low Energy Capabilities for Tele-mobile Monitoring in Home-care
/jucs_19_9/evaluation_of_bluetooth_low
page 1219 - 1241
Vol.19 / Issue 9
C. Lee, J. Kim, S. Hong, Y.-S. Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
/jucs_15_5/security_analysis_of_the
page 1007 - 1022
Vol.15 / Issue 5
J. Lopes, R. Souza, C. Geyer, C. Costa, J.L.V. Barbosa, A. Pernas, A. Yamin:
A Middleware Architecture for Dynamic Adaptation in Ubiquitous Computing
/jucs_20_9/a_middleware_architecture_for
page 1327 - 1351
Vol.20 / Issue 9
J.A. Muñoz-Cristóbal, A. Martínez-Monés, J.I. Asensio-Pérez, S.L. Villagrá-Sobrino, J.E. Hoyos-Torio, Y. Dimitriadis:
City Ads: Embedding Virtual Worlds and Augmented Reality in Everyday Educational Practice
/jucs_20_12/city_ads_embedding_virtual
page 1670 - 1689
Vol.20 / Issue 12
Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs
/jucs_19_16/a_privacy_preserving_message
page 2385 - 2403
Vol.19 / Issue 16
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini:
Developing a Secure Mobile Grid System through a UML Extension
/jucs_16_17/developing_a_secure_mobile
page 2333 - 2352
Vol.16 / Issue 17
J. She, X. Zhang, W. Wang, P. Ordóñez de Pablos:
Mapping the Impact of Social Media and Mobile Internet on Chinese Academia's Performance: A Case on Telemedicine Research 2005-2013
/jucs_20_15/mapping_the_impact_of
page 2005 - 2015
Vol.20 / Issue 15
R. Souza, J. Lopes, C. Geyer, A. Cardozo, A. Yamin, J.L.V. Barbosa:
An Architecture for IoT Management Targeted to Context Awareness of Ubiquitous Applications
/jucs_24_10/an_architecture_for_iot
page 1452 - 1471
Vol.24 / Issue 10
S. Vrhovec, B. Markelj:
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals
/jucs_24_5/relating_mobile_device_use
page 634 - 645
Vol.24 / Issue 5