The 3rd International Symposium on

Ubiquitous Application & Security Service (UASS-08)

http://www.sersc.org/UASS2008

March 25 (Tue.) - March 28 (Fri.), 2008
GinoWan, Okinawa, Japan

In Conjunction with AINA 2008
http://www.aina-conference.org/2008/

Welcome to UASS 2008 UASS07 UASS06 IEEELogo lncs

 NEWS

  • Now Accepted Paper List is available here [Dec. 6, 2007]
  • Submission deadline has been extended to Nov. 9, 2007 [ Oct. 26, 2007]
  • Special Issue on "Intelligent Systems and Services for Ubiquitous Computing" has approved from Journal of Personal and Ubiquitous Computing (Springer) - indexed by SCIE [Sep. 19, 2007]
  • Call for papers has been announced ! [Aug. 3. 2007]

Introduction

Ubiquitous Computing is emerging rapidly as an exciting new paradigm to provide computing and communication services any time, any where. For realizing ubiquitous computing, UASS is needed. Our Session (UASS) provides a chance for academic and industry professionals to discuss recent progress in the area of ubiquitous Computing Environment including models and systems, new directions, novel applications associated with the utilization, and acceptance of ubiquitous computing devices and systems.

UASS-08 is a successor of the 1st International Workshop on Ubiquitous Application & Security Service (UASS'06 : 8 - 11 May 2006, Glasgow, Scotland, UK) and the 2nd International Workshop on Ubiquitous Application & Security Service (UASS-07: Kuala Lumpur, Malaysia, 26-29 August, 2007).

Topics (included, but are not limited to)

* Ubiquitous Application

- Home-network applications
- Ubiquitous Intelligent Service
- U-business and other applications
- Context awareness Model for Ubiquitous Service
- Intelligent User Interface
- Ubiquitous Sensor Network(USN) / RFID - Issue
- Multimedia Service in U (Ubiquitous)-environment
- U Space (Home, Building, Office)

* Ubiquitous Security

- USN / RFID security
- Ubiquitous Multimedia Security (DRM, IPMP)
- Key management and authentication in U-Environment
- Network security issues and protocols in U-Environment
- Access Control in U-Environment
- Security in U-commerce
- Commercial and industrial security
- IPv6, Forensics for U-Environment
- Others and emerging new topics
- Trusted Computing

* Ubiquitous Embedded Hardware and Software

- Embedded Hardware Support for Ubiquitous
- Embedded Software for Ubiquitous
- Embedded System Architecture for Ubiquitous
- Real-time OS for Ubiquitous
- Smart and Personal devices for Ubiquitous
- Power-Aware computing for Ubiquitous
- Middleware for Ubiquitous
- Specification, Validation and Verification of Embedded System and Software
- New Technologies and Devices for Ubiquitous