Pervasive and Mobile Computing

短名Pervasive. Mob. Comput.
Journal Impact3.18
国际分区TELECOMMUNICATIONS(Q2)
期刊索引SCI Q2中科院 3 区
ISSN1574-1192, 1873-1589
h-index79
国内分区计算机科学(3区)计算机科学计算机信息系统(3区)计算机科学电信学(3区)

正如 MARK WEISER 早在 1991 年所设想的那样,普及计算系统和服务已经真正成为我们日常生活中不可或缺的一部分。从个性化和嵌入式智能设备(例如智能手机、传感器、可穿戴设备、物联网等)到通过各种无线移动通信和认知网络基础设施实现无处不在的连接,再到先进的计算技术(包括边缘、雾和云)和用户友好的中间件服务和平台为普及和移动计算的空前进步做出了重大贡献。尖端的应用程序和范式已经发展,例如网络物理系统和智能环境(例如,智能城市、智能能源、智能交通、智能医疗保健等),它们也通过社会互动和参与性和/例如,移动人群感应。普适计算系统的目标是改善人类体验和生活质量,而无需明确了解底层通信和计算技术。普适和移动计算期刊 (PMC) 是一本高影响力、同行评议的技术期刊,发表高- 涵盖理论和实践的高质量科学文章,涵盖普及和移动计算和系统的所有方面。

期刊主页投稿网址
涉及主题计算机科学操作系统工程类计算机网络数学电信人工智能计算机安全万维网物理生物程序设计语言人机交互量子力学法学政治学地理经济分布式计算统计哲学无线
出版信息出版商: Elsevier B.V.出版周期: 期刊类型: journal
基本数据创刊年份: 2005原创研究文献占比98.59%自引率:0.00%Gold OA占比: 27.94%
平均审稿周期 网友分享经验:较慢,6-12周
平均录用比例网友分享经验:较易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

On data minimization and anonymity in pervasive mobile-to-mobile recommender systems

2024-10-1

OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces

2024-10-1

IoT Data Encryption and Phrase Search-Based Efficient Processing Using a Fully Homomorphic-Based SE (FHSE) Scheme

2024-10-1

Federated learning energy saving through client selection

2024-10-1

Editorial Board

2024-10-1

CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification

2024-10-1

A toolkit for localisation queries

2024-10-1

Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network

2024-10-1

Editorial Board

2024-9-12

Energy-aware human activity recognition for wearable devices: A comprehensive review

2024-9-3

Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure

2024-9-1

Service placement strategies in mobile edge computing based on an improved genetic algorithm

2024-9-1

An Efficient Estimator for Source Localization in WSNs using RSSD and TDOA Measurements

2024-9-1

Deep Reinforcement Learning based Mobility Management in a MEC-Enabled Cellular IoT Network

2024-9-1

A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks

2024-9-1

Analysis of micro- vs. macro-flows management in QKD-secured edge computing

2024-9-1

Security protocol for securing notifications about dangerous events in the agglomeration

2024-9-1

Editorial Board

2024-9-1

Edge human activity recognition using federated learning on constrained devices

2024-8-8

Enhancing 5G network slicing for IoT traffic with a novel clustering framework

2024-8-6

Accelerating the neural network controller embedded implementation on FPGA with novel dropout techniques for a solar inverter

2024-8-1

A stable and efficient dynamic ensemble method for pothole detection

2024-8-1

Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm

2024-7-1

Editorial Board

2024-7-1

SmAuto: A domain-specific-language for application development in smart environments

2024-7-1

GTDIM: Grid-based two-stage dynamic incentive mechanism for mobile crowd sensing

2024-7-1

Localizing unknown nodes with an FPGA-enhanced edge computing UAV in wireless sensor networks: Implementation and evaluation

2024-6-1

Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning

2024-6-1

WiCAR: A class-incremental system for WiFi activity recognition

2024-6-1

Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar

2024-5-23

BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication

2024-5-18

Energy-efficient indoor hybrid deployment strategy for 5G mobile small-cell base stations using JAFR Algorithm

2024-5-1

Editorial Board

2024-5-1

Role of IoT technologies in big data management systems: A review and Smart Grid case study

2024-5-1

A comprehensive survey on Machine Learning techniques in opportunistic networks: Advances, challenges and future directions

2024-5-1

Inferring in-air gestures in complex indoor environment with less supervision

2024-5-1

CMFog<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e739" altimg="si22.svg"><mml:msub><mml:mrow/><mml:mrow><mml:mi>V</mml:mi></mml:mrow></mml:msub></mml:math>: Proactive content migration for multi-level fog computing

2024-5-1

An evaluation of heart rate monitoring with in-ear microphones under motion

2024-5-1

MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones

2024-4-3

TODO: Task Offloading Decision Optimizer for the efficient provision of offloading schemes

2024-4-1

Reliable and Adaptive Computation offload strategy with load and cost coordination for Edge computing

2024-4-1

Editorial Board

2024-4-1

Reinforcement learning-based load balancing for heavy traffic Internet of Things

2024-4-1

Efficient and secure heterogeneous online/offline signcryption for wireless body area network

2024-4-1

B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment

2024-4-1

Feasibility and reliability of peercloud in vehicular networks: A comprehensive study

2024-3-26

Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure

2024-3-18

A framework for offloading and migration of serverless functions in the Edge-Cloud Continuum

2024-3-1

Seeing the world from its words: All-embracing Transformers for fingerprint-based indoor localization

2024-3-1

Privacy-preserving pedestrian tracking with path image inpainting and 3D point cloud features

2024-3-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司