Title :
Table of contents
Abstract :
The following topics are dealt with: traffic incident detection; traffic incident modelling; military computing; access control; wireless sensor networks; trusted computing; augmented reality; cyber attack modeling; face recognition; VoIP; semantic Web; distributed privacy-preserving P2P data mining; item-based filtering; recommender system; cultural aspects; Twitter; mobile-health sector; hospital healthcare; e-government; IoT smart city; language learning; computer games; intelligent tutoring system; and mathematics education.
Keywords :
Internet of Things; augmented reality; computer aided instruction; computer games; cultural aspects; data mining; data privacy; distributed processing; government data processing; health care; hospitals; image processing; information filtering; mathematics computing; medical computing; military computing; natural languages; recommender systems; security of data; social networking (online); traffic engineering computing; trusted computing; wireless sensor networks; IoT smart city; Twitter; VoIP; access control; augmented reality; computer games; cultural aspects; cyber attack modeling; distributed privacy-preserving P2P data mining; e-government; face recognition; hospital healthcare; intelligent tutoring system; item-based filtering; language learning; mathematics education; military computing; mobile-health sector; recommender system; semantic Web; traffic incident detection; traffic incident modelling; trusted computing; wireless sensor networks;
Conference_Titel :
Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on
Conference_Location :
Piraeus
Print_ISBN :
978-1-4799-0770-0
DOI :
10.1109/IISA.2013.6623677