Application software

View this topic in
Application software, also known as an application or an "app", is computer software designed to help the user to perform singular or multiple related specific tasks. (Wikipedia.org)






Conferences related to Application software

Back to Top

2014 IEEE International Conference on Software Maintenance and Evolution (ICSME)

ICSM is the premier international venue in software maintenance and evolution, where researchers and professionals from academia, government, and industry meet and share ideas and experiences for solving critical software maintenance problems. ICSM 2014 will be held in Victoria, British Columbia, Canada.


2013 13th International Conference on Control, Automaton and Systems (ICCAS)

Control Theory and Application, Intelligent Systems, Industrial Applications of Control,Sensor and Signal Processing, Control Devices and Instruments, Robot Control, RobotVision, Human-Robot Interaction, Robotic Applications, Unmanned Vehicle Systems...


2013 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)

Service science, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today’s world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive services operations. New types of service offerings are also emerging to meet the needs of customers and consumers.The IEEE Service Operations and Logistics, and Informatics (SOLI) conference series aims to bring together researchers and practitioners to discuss issues, challenges and future directions, share their R&D findings and experiences in relative areas.

  • 2012 IEEE International Conference on Service Operations and Logistics and Informatics (SOLI)

    Service science, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today s world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive services operations. New types of service offerings are also emerging to meet the needs of customers and consumers.The IEEE Service Operations and Logistics, and Informatics (SOLI) conference series aims to bring together researchers and practitioners to discuss issues, challenges and future directions, share their R&D findings and experiences in relative areas.

  • 2011 IEEE International Conference on Service Operations and Logistics and Informatics (SOLI)

    Service science, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today s world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive services operations. New types of service offerings are also emerging to meet the needs of customers and consumers.The IEEE Service Operations and Logistics, and Informatics (SOLI) conference seri

  • 2010 IEEE International Conference on Service Operations and Logistics and Informatics (SOLI)

    Service science, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today s world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive services operations. New types of service offerings are also emerging to meet the needs of customers and consumers. The IEEE Service Operations and Logistics, and Informatics (SOLI) conference ser

  • 2009 IEEE/INFORMS International Conference on Service Operations, Logistics and Informatics (SOLI)

    Provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions related to service operations, logistics and informatics.

  • 2008 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)

    Services, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today's world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive services operations. New types of service offerings are also emerging to meet the needs of customers and consumers.

  • 2007 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)

    Services, service operations, logistics, and informatics are becoming ever more complex and interdependent. They are playing an increasingly important role in today's world economy. Information and communications technology provides cyber-infrastructure and platforms to achieve more efficient and productive service operations. New types of service offerings are also emerging to meet the needs of customers and consumers.

  • 2006 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)


2012 Sixth IEEE/ACM International Symposium on Networks-on-Chip (NoCS)

The conference is the 6th in a series. The conference focus on interconect in embedded multi-processor systems on chip and chip multiprocessors.

  • 2011 Fifth IEEE/ACM International Symposium on Networks-on-Chip (NoCS)

    The International Symposium on Networks-on-Chip (NOCS) is the premier event dedicated to interdisciplinary research on on-chip and in-package communication technology, architecture, design methods and applications. NOCS aims at bringing together scientists and engineers working on NoC innovations from inter-related research communities, including computer architecture, networking, circuits and systems, embedded systems, and design automation.

  • 2010 Fourth ACM/IEEE International Symposium on Networks-on-Chip (NoCS)

    NOCS is the premier event dedicated to interdisciplinary research on on-chip communication technology, architecture, design methods and applications, bringing together scientists and engineers working on NoC innovations from inter-related research communities, including computer architecture, networking, circuits and systems, embedded systems, and design automation.

  • 2009 3rd ACM/IEEE International Symposium on Networks-on-Chip (NoCS)

    The International Symposium on Networks-on-Chip (NOCS) provides a high quality forum for scientists and engineers to present their latest research findings in the area of NoC-based systems at all levels, from the physical on-chip link level through the network level, and ranging up to systems architecture and application software.


2011 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT)

The Fourth IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT) is the first forum to gather system designers, engineers, scientists, practitioners, and space explorers for the objective of advancing information technology for space missions. The forum will provide an excellent opportunity for fostering technical interchange on all hardware and software aspects of IT applications in space missions. The conference will focus on current IT practice and challenges as we


More Conferences

Periodicals related to Application software

Back to Top

Reliability, IEEE Transactions on

Principles and practices of reliability, maintainability, and product liability pertaining to electrical and electronic equipment.


Software Engineering, IEEE Transactions on

Specification, development, management, test, maintenance, and documentation of computer software.


Software, IEEE

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change. The authority on translating software theory into practice, IEEE Software is positioned between pure research and pure practice, transferring ideas, methods, and experiences among researchers and engineers. ...



Most published Xplore authors for Application software

Back to Top

Xplore Articles related to Application software

Back to Top

Broadband CPW-fed RFID Antenna at 2.45/5.80 GHz

D. Ma; W. X. Zhang 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

A kind of half-ring folded-slot antennas with CPW-fed structure is presented. Two antennas which operate at 2.45 GHz and 5.80 GHz band are designed and fabricated respectively. The 2.45 GHz one with the size of 30 x 36 mm has bandwidth of 17.6 % (VSWR les 2:1) and gain of 1.76~2.21 dBi; the 5.80 GHz one has bandwidth of 26 ...


Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Arithmetic and galois checksums

N. R. Saxena; E. J. McCluskey 1989 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers, 1989

An analysis is presented of error detection characteristics when galois checksums and arithmetic checksums are used simultaneously. By generalizing previous results, it is shown that galois checksums and arithmetic checksums exhibit orthogonal characteristics with respect to error detection. An analytic proof of orthogonality is presented for certain restricted cases. These orthogonal characteristics hold good for equally likely errors, restricted column ...


An overview of computer graphics training course

B. Zalik; N. Guid; T. Klojcnik AFRICON '92 Proceedings., 3rd AFRICON Conference, 1992

The computer graphics training course at the Department for Computer Science, University of Maribor, Slovenia is considered. The reasons why computer graphics is needed as part of the computer science curriculum are considered. The computer graphics course curriculum is then reviewed. The main focus is given on the description of computer graphics training. Software teaching tools developed by the authors ...


Boundary Matting for View Synthesis

S. W. Hasinoff; Sing Bing Kang; R. Szeliski 2004 Conference on Computer Vision and Pattern Recognition Workshop, 2004

In the last few years, new view synthesis has emerged as an important application of 3D stereo reconstruction. While the quality of stereo has improved, it is still imperfect, and a unique depth is typically assigned to every pixel. This is problematic at object boundaries, where the pixel colors are mixtures of foreground and background colors. Interpolating views without explicitly ...


More Xplore Articles

Educational Resources on Application software

Back to Top

eLearning

Broadband CPW-fed RFID Antenna at 2.45/5.80 GHz

D. Ma; W. X. Zhang 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

A kind of half-ring folded-slot antennas with CPW-fed structure is presented. Two antennas which operate at 2.45 GHz and 5.80 GHz band are designed and fabricated respectively. The 2.45 GHz one with the size of 30 x 36 mm has bandwidth of 17.6 % (VSWR les 2:1) and gain of 1.76~2.21 dBi; the 5.80 GHz one has bandwidth of 26 ...


Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Arithmetic and galois checksums

N. R. Saxena; E. J. McCluskey 1989 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers, 1989

An analysis is presented of error detection characteristics when galois checksums and arithmetic checksums are used simultaneously. By generalizing previous results, it is shown that galois checksums and arithmetic checksums exhibit orthogonal characteristics with respect to error detection. An analytic proof of orthogonality is presented for certain restricted cases. These orthogonal characteristics hold good for equally likely errors, restricted column ...


An overview of computer graphics training course

B. Zalik; N. Guid; T. Klojcnik AFRICON '92 Proceedings., 3rd AFRICON Conference, 1992

The computer graphics training course at the Department for Computer Science, University of Maribor, Slovenia is considered. The reasons why computer graphics is needed as part of the computer science curriculum are considered. The computer graphics course curriculum is then reviewed. The main focus is given on the description of computer graphics training. Software teaching tools developed by the authors ...


Boundary Matting for View Synthesis

S. W. Hasinoff; Sing Bing Kang; R. Szeliski 2004 Conference on Computer Vision and Pattern Recognition Workshop, 2004

In the last few years, new view synthesis has emerged as an important application of 3D stereo reconstruction. While the quality of stereo has improved, it is still imperfect, and a unique depth is typically assigned to every pixel. This is problematic at object boundaries, where the pixel colors are mixtures of foreground and background colors. Interpolating views without explicitly ...


More eLearning Resources

IEEE-USA E-Books

  • COMPUTER SOFTWARE SECURITY

    This chapter considers security of applications, examining security threats to applications, and how to mitigate these threats. It first looks at the various aspects of security in any general-purpose unix and linux operating systems (OSs). The chapter then describes the role-based access control as implemented in the Solaris OS. Based on the protection ring model, Windows security components operate in two modes: the kernel mode (protection ring 0) and the user mode (protection ring 3). Next, the chapter focuses on the VXworks- and pSOS-type embedded OSs as these differ the most from the general-purpose OSs. It also shows how buffer overflows could be exploited in applications through stack and heap manipulations. Application software is a primary target and a major source of security problems. Finally, the chapter looks at anti-malware applications available for windows and unix-type OS.

  • IPv6 and the Future Internet

    The Internet has experienced tremendous success since its initial widespread commercial adoption in the 1990s. Such Internet success has ultimately led to the exhaustion of available IP addresses for Internet communications. The only solution to support continued Internet growth is IPv6. This chapter presents the set of sample applications that is merely scratching the surface in terms of applications and opportunities for better living in an increasingly networked world. As with every benefit, there are caveats, but as technology continues to press on with smaller, cheaper, more-integrated, and most of all, IPv6-networked, devices, access to information will rise to unprecedented levels and effective management application software will be needed for analysis, reporting, and alerting as needed.

  • Basics

    This chapter reviews the following concepts: cloud computing fundamentals; roles in cloud computing; applications; demand, supply, capacity, and fungibility; and demand variability. Cloud computing is defined as a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand. Applications are composed of software components that execute on physical compute, networking, memory, and storage equipment. An application instance is an operational configuration of application software components on appropriate compute, networking, memory, and storage infrastructure elements that can offer service to users. The application instance is owned and operated by an application service provider. From an economics perspective, users offer demand and application service providers offer supply; consumption is the amount of service that users enjoy in an interval of time. User pays some price to enjoy service, and service providers must cover their costs of delivering that service.

  • Personal Computers

    This chapter contains sections titled: Early Application Software, The Rise of the IBM PC, The Decline of the IBM PC, The Role of Apple, The Rise of Intel and Microsoft, Microsoft's Pricing, Recent Applications Software, Linux, Java, The Role of Misjudgments, Lessons from Case Study

  • Green Software

    This chapter examines software methodologies, designs, and software development tools that can be used to improve the energy efficiency of application software and extend mobile platform battery life. During software development, computational efficiency, data efficiency, context-aware methods, and idle efficiency can all contribute to creating applications that conserve energy. To help developers evaluate software, we also describe measurement methodologies and tools that will help developers obtain the necessary feedback to improve their applications.



Standards related to Application software

Back to Top

No standards are currently tagged "Application software"


Jobs related to Application software

Back to Top