Aim
The Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) aims to serve as a premier platform for the dissemination of high-quality, peer-reviewed research that advances the fields of wireless and mobile networking, ubiquitous computing, and dependable application systems. It seeks to bridge the gap between theoretical advances and real-world applications by fostering innovation, supporting the development of robust and scalable technologies, and promoting interdisciplinary collaboration among researchers, developers, and industry practitioners. The journal is committed to publishing cutting-edge research that addresses current challenges, proposes novel solutions, and contributes to the creation of secure, intelligent, and dependable computing environments in an increasingly connected world.
Scope
Topics of interest include, but are not limited to:
- Wireless mobile network architecture and protocols
- Mobile computing systems and services
- Mobile Internet and mobility management
- Wireless sensors networks and RFID technologies
- Mobile ad hoc networking
- Wireless mesh networks
- Wireless LANs, WiMax, cellular networks
- Cross layer design and optimization
- Vehicle networks
- Energy efficient networks
- Future Internet
- Theoretical foundations and algorithms for ubiquitous computing
- Algorithmic paradigms, models and analysis of ubiquitous computing
- Intelligent context-aware scheme
- Smart spaces and intelligent environments
- Embedded systems and wearable computers
- Middleware and agent technologies for ubiquitous computing
- Autonomic computing and communications for ubiquitous computing
- Programming paradigms for ubiquitous computing applications
- User interfaces and interaction models
- Software infrastructures
- Parallel/distributed/grid computing
- Novel machine architectures
- Semantic web and knowledge grid
- Security issues and protocols in wireless mobile network and ubiquitous computing
- Security threats and model in wireless mobile network and ubiquitous computing
- Key Management, Authentication and Access control in wireless mobile network and ubiquitous computing
- Privacy and trust in wireless mobile network and ubiquitous computing
- Insider threats and information leakage prevention
- Dependable applications
- Business model and protocols for wireless mobile network and ubiquitous computing
- Emerging standards and technologies in wireless mobile network and ubiquitous computing