This book constitutes the proceedings of the 7th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2015) held in Berlin, Germany, in November 2015. The 16 full and 4 poster papers were carefully reviewed and selected from 43 submissions, and are presented together with 4 papers from the First Workshop on Situation Recognition by Mining Temporal Information (SIRE…
Addresses the Challenges Associated with System-on-Chip IntegrationNetwork-on-Chip: The Next Generation of System-on-Chip Integration examines the current issues restricting chip-on-chip communication efficiency, and explores Network-on-chip (NoC), a promising alternative that equips designers with the capability to produce a scalable, reusable, and high-performance communication backbone by al…
In the second half of the 1990s Christian Mauduit and András Sárközy [86] introduced a new quantitative theory of pseudorandomness of binary sequences. Since then numerous papers have been written on this subject and the original theory has been generalized in several directions. Here I give a survey of some of the most important results involving the new quantitative pseudorandom measures o…
Information Systems and Communication Service; Education, general
History of Computing; Computer Appl. in Arts and Humanities; Data Structures; User Interfaces and Human Computer Interaction
user interfaces; human computer interaction; computers and society
A variety of programming models relevant to scientists explained, with an emphasis on how programming constructs map to parts of the computer.What makes computer programs fast or slow? To answer this question, we have to get behind the abstractions of programming languages and look at how a computer really works. This book examines and explains a variety of scientific programming models (progra…
In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessme…
brain computer interface; artificial intelligence; computer networks; classification databases; HCI machine learning; signal processing; user interfaces
Computer science