{"id":811,"date":"2023-11-06T22:13:26","date_gmt":"2023-11-06T22:13:26","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/11\/06\/life-and-work-at-home\/"},"modified":"2023-11-06T22:13:26","modified_gmt":"2023-11-06T22:13:26","slug":"life-and-work-at-home","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/11\/06\/life-and-work-at-home\/","title":{"rendered":"Life and Work at Home"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<h3>Important Dates<\/h3>\n<ul>\n<li>Title and abstracts due: 27 January 2024<\/li>\n<li>Full Manuscripts due: 10 February 2024<\/li>\n<\/ul>\n<p><b>Publication:<\/b><span style=\"font-weight: 400;\"> July 2024<\/span><\/p>\n<hr\/>\n<p><span style=\"font-weight: 400;\">Pervasive computing devices have become more common in our homes. These devices entertain us, support our wellbeing, and facilitate our work and study. They also demand our attention, they can make it difficult to maintain a sensible work-life balance, they allow others to collect information about us, and they can increase our carbon footprint.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The way we utilize pervasive computing in our homes has changed during the Covid-19 pandemic. So has the intensity of utilization. During the pandemic, many people stayed at home much more than in prior times, and this resulted in adding devices to their homes both to support personal goals, such as entertainment and comfort, as well as to support work or studying, including for children. It also resulted in people spending more time using these devices than in the past. And while the pandemic, and our response to it, has transformed, many changes in our homes that were first introduced during the pandemic remain with us, including new electronic devices, reliance on deliveries of goods, and of course increased hours of working from home. Given all this, how can pervasive computing in our homes support us in our personal and professional roles? How can it do so while preserving our privacy, upholding ethical standards, and allowing us to reduce our carbon footprint? And how do we chart a path to the future of pervasive computing in the home? <\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">Relevant topics of this special issue include but are not limited to the following<\/span><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li><b>Controlling the home:<\/b><span style=\"font-weight: 400;\"> connecting and controlling devices in the home to support comfort and a range of activities.\u00a0<\/span><\/li>\n<li><b>Entertainment: <\/b><span style=\"font-weight: 400;\">using devices to consume content and play, alone as well as in co-located or remote groups.<\/span><\/li>\n<li aria-level=\"1\"><b>Health and wellbeing:<\/b><span style=\"font-weight: 400;\"> supporting everyday activities that promote physical and mental health, including family life, social interactions, caregiving, and health behaviors.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tools for pervasive computing for the home:<\/b><span style=\"font-weight: 400;\"> networking, augmented reality, virtual reality, wearable devices, and human-robot collaboration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Inclusion and accessibility:<\/b><span style=\"font-weight: 400;\"> technology that is built by, with, and for those who have historically had inequitable access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security and privacy: <\/b><span style=\"font-weight: 400;\">protecting the pervasive-computing home infrastructure from malicious actors and maintaining privacy while providing personalized support for work and well-being.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Responsible pervasive computing<\/b><span style=\"font-weight: 400;\">: investigating issues of responsible and ethical use of pervasive devices including topics of fairness, explainability, and transparency.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulating pervasive devices:<\/b><span style=\"font-weight: 400;\"> implications of regulatory frameworks for pervasive devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Novel applications <\/b><span style=\"font-weight: 400;\">of pervasive computing in the home.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/li>\n<\/ul>\n<hr\/>\n<h3>Submission Guidelines<\/h3>\n<p><span style=\"font-weight: 400;\">The guest editors invite original and high-quality submissions addressing all aspects of this field, as long as the connection to pervasive computing and\/or the Internet of Things is clear and central to the paper. Review or summary articles \u2014 for example critical evaluations of the state of the art, or an insightful analysis of established and upcoming technologies \u2014 may be accepted if they demonstrate academic rigor and relevance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Articles submitted to IEEE Pervasive Computing should not exceed 6,000 words, including all text, the abstract, keywords, bibliography, biographies, and table text. The word count must include 250 words for each table and figure. References should be limited to at most 20 citations (40 for survey papers). Authors are encouraged, but not required, to use a<\/span><span style=\"font-weight: 400;\"> template<\/span><span style=\"font-weight: 400;\"> for submission (accepted articles will ultimately be typeset by magazine staff for publication).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note that the magazine always welcomes submissions into its regular queue that cover the role of computing in the physical world \u2013 as characterized by visions such as the Internet of Things and Ubiquitous Computing. Topics of interest are, e.g., hardware design, sensor networks, mobile systems, human-computer interaction, industrial design, machine learning, data science, but also societal issues including privacy and ethics. Simply select the \u201cRegular\u201d option when submitting at the <\/span><span style=\"font-weight: 400;\">submission site<\/span><span style=\"font-weight: 400;\"> (submissions are possible at any time; no need for prior abstract by email).<\/span><\/p>\n<hr\/>\n<p><b>Special Issue Guest Editors<\/b><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Andrew L. Kun, University of New Hampshire<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Gabriela Marcu, University of Michigan<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Marios Constantinides, Nokia Bell Labs<\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/digital-library\/magazines\/pc\/cfp-life-and-work-at-home\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Important Dates Title and abstracts due: 27 January 2024 Full Manuscripts due: 10 February 2024 Publication: July 2024 Pervasive&hellip;<\/p>\n","protected":false},"author":1,"featured_media":812,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,705],"tags":[],"class_list":["post-811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-cfp-pc"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=811"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/811\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/812"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}