Aim
The Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JOWUA) is an international, peer-reviewed journal dedicated to advancing the frontiers of wireless and mobile networking, ubiquitous computing, and dependable systems. It offers a forum for the publication of high-quality research that blends theoretical insight with practical innovation in dynamic, distributed, and real-time computing environments.
JOWUA is driven by the need to address the challenges of an increasingly connected world. As mobile and pervasive technologies continue to evolve, the journal seeks to highlight research that develops secure, scalable, and robust solutions to real-world problems in mobile systems and ubiquitous computing infrastructures.
The journal covers a broad range of topics including, but not limited to, wireless ad hoc and mesh networks, mobile computing, sensor networks, Internet of Things (IoT), edge and fog computing, and cyber-physical systems. It encourages research that not only explores these areas individually but also integrates them to form holistic and adaptive system designs.
A core focus of JOWUA is on the dependability and trustworthiness of modern computing systems. With the increasing reliance on mobile and ubiquitous technologies in critical applications, the journal places high value on work that enhances reliability, availability, safety, and security in these systems.
The journal particularly values contributions that demonstrate practical impact. It encourages submissions that include experimental validation, prototype implementation, or deployment in real-world environments such as smart cities, healthcare systems, intelligent transportation, and industrial automation.
Recognizing the interdisciplinary nature of today’s technological landscape, JOWUA actively supports collaboration across domains. It welcomes submissions from researchers, practitioners, and professionals in computer science, engineering, data science, and related fields, fostering a diverse exchange of ideas and approaches.
JOWUA is open to a wide range of article types, including original research papers, case studies, surveys, and technical notes. Both theoretical models and practical applications are considered, especially those that contribute to making mobile and ubiquitous systems more intelligent, efficient, and reliable.
Through the publication of high-quality, innovative research, JOWUA aims to support the development of next-generation computing systems. The journal aspires to be a leading venue that not only contributes to academic advancement but also drives real-world transformation by enabling secure, context-aware, and dependable computing for the digital society.
Scope
Topics of interest include, but are not limited to:
- Wireless mobile network architecture and protocols
- Mobile computing systems and services
- Mobile Internet and mobility management
- Wireless sensors networks and RFID technologies
- Mobile ad hoc networking
- Wireless mesh networks
- Wireless LANs, WiMax, cellular networks
- Cross layer design and optimization
- Vehicle networks
- Energy efficient networks
- Future Internet
- Theoretical foundations and algorithms for ubiquitous computing
- Algorithmic paradigms, models and analysis of ubiquitous computing
- Intelligent context-aware scheme
- Smart spaces and intelligent environments
- Embedded systems and wearable computers
- Middleware and agent technologies for ubiquitous computing
- Autonomic computing and communications for ubiquitous computing
- Programming paradigms for ubiquitous computing applications
- User interfaces and interaction models
- Software infrastructures
- Parallel/distributed/grid computing
- Novel machine architectures
- Semantic web and knowledge grid
- Security issues and protocols in wireless mobile network and ubiquitous computing
- Security threats and model in wireless mobile network and ubiquitous computing
- Key Management, Authentication and Access control in wireless mobile network and ubiquitous computing
- Privacy and trust in wireless mobile network and ubiquitous computing
- Insider threats and information leakage prevention
- Dependable applications
- Business model and protocols for wireless mobile network and ubiquitous computing
- Emerging standards and technologies in wireless mobile network and ubiquitous computing