Panoply: active middleware for managing ubiquitous computing interactions
暂无分享,去创建一个
[1] Venkatraman Ramakrishna,et al. Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions , 2007 .
[2] Gianpaolo Cugola,et al. Using a Publish/Subscribe Middleware to Support Mobile Computing , 2001 .
[3] S. M. Heemstra de Groot,et al. A Network Architecture for Personal Networks , 2005 .
[4] Roy H. Campbell,et al. Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[5] Sandeep K. S. Gupta,et al. Supporting persistent social groups in ubiquitous computing environments using context-aware ephemeral group service , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[6] Timothy Sohn,et al. iCAP: Interactive Prototyping of Context-Aware Applications , 2006, Pervasive.
[7] Buddhika Kottahachchi. Building Access Controls for Intelligent Environments , 2004 .
[8] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[10] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[11] Matthew Chalmers,et al. Delivering real-world ubiquitous location systems , 2005, CACM.
[12] Tiago Martins,et al. InAuthoring environment: interfaces for creating spatial stories and gaming activities , 2006, ACE '06.
[13] Staffan Björk,et al. Pirates! Using the Physical World as a Game Board , 2001, INTERACT.
[14] Joseph F. McCarthy,et al. A Multi-Agent System for Meting Out Influence in an Intelligent Environment , 1999, AAAI/IAAI.
[15] Konrad Tollmar,et al. Activity Zones for Context-Aware Computing , 2003, UbiComp.
[16] Mira Mezini,et al. Engineering Event-Based Systems with Scopes , 2002, ECOOP.
[17] Gregory D. Abowd,et al. Social Disclosure of Place: From Location Technology to Communication Practices , 2005, Pervasive.
[18] Klara Nahrstedt,et al. Gaia: A Middleware Infrastructure to Enable Active Spaces1 , 2002 .
[19] Hector Garcia-Molina,et al. Elections in a Distributed Computing System , 1982, IEEE Transactions on Computers.
[20] Jason Cleverly,et al. Creating assemblies:: aboard the Ghost Ship , 2002, CSCW '02.
[21] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[22] Dieter Schmalstieg,et al. A Handheld Augmented Reality Museum Guide , 2005 .
[23] Shane Markstrum,et al. Enabling Secure Ubiquitous Interactions , 2003, Middleware Workshops.
[24] Jakob E. Bardram,et al. The AWARE architecture: supporting context-mediated social awareness in mobile cooperation , 2004, CSCW.
[25] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[26] Ajay Kulkarni,et al. Building Agent-Based Intelligent Workspaces , 2002, International Conference on Internet Computing.
[27] Ben J. C. Clayton,et al. Rapid Authoring of Mediascapes , 2004, UbiComp.
[28] Stuart Cheshire,et al. Dynamic Configuration of IPv4 Link-Local Addresses , 2005, RFC.
[29] Thomas Butter,et al. Distribution of Fingerprints for 802.11-Based Positioning Systems , 2007, 2007 International Conference on Mobile Data Management.
[30] Peter L. Reiher,et al. Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios , 2007, IEEE International Conference on Service-Oriented Computing and Applications (SOCA '07).
[31] Joseph F. McCarthy,et al. MusicFX: an arbiter of group preferences for computer supported collaborative workouts , 1998, CSCW '98.
[32] P. Fishburn,et al. Voting Procedures , 2022 .
[33] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[34] Ralph E. Droms,et al. Authentication for DHCP Messages , 2001, RFC.
[35] Barry Nalebuff,et al. An Introduction to Vote-Counting Schemes , 1995 .
[36] Jinhyung Kim,et al. A Rule-Based Publish-Subscribe Message Routing System for Ubiquitous Computing , 2006, UCS.
[37] Michael H. Coen,et al. Meeting the Computational Needs of Intelligent Environments: The Metaglue System , 2000 .
[38] Jim Waldo,et al. The Jini architecture for network-centric computing , 1999, CACM.
[39] Antonio Corradi,et al. AGAPE: a location-aware group membership middleware for pervasive computing environments , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[40] Ralph E. Droms,et al. DHCP Options and BOOTP Vendor Extensions , 1993, RFC.
[41] Diana K. Smetters,et al. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.
[42] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[43] Rattapoom Tuchinda. Access Control Mechanism for Intelligent Environments Related Work , 2002 .
[44] Anupam Joshi,et al. A Secure Infrastructure for Service Discovery and Access in Pervasive Computing , 2003, Mob. Networks Appl..
[45] Robbert van Renesse,et al. Using Sparse Capabilities in a Distributed Operating System , 1986, ICDCS.
[46] Martin Jacobsson,et al. Personal network federations , 2010 .
[47] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[48] P. Reiher,et al. Mobile contagion: simulation of infection & defense , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[49] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[50] Paul Dourish,et al. Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.
[51] Martin Dzbor,et al. BuddySpace : Enhanced Presence Management for Collaborative Learning , Working , Gaming and Beyond Submission to JabberConf Europe 2002 , 2002 .
[52] Tim Kindberg,et al. A Web-based nomadic computing system , 2001, Comput. Networks.
[53] Roy H. Campbell,et al. Super spaces: a middleware for large-scale pervasive computing environments , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[54] Bill Serra,et al. People, Places, Things: Web Presence for the Real World , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.
[55] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[56] Krzysztof Z. Gajos,et al. Hyperglue: Designing High-Level Agent Communication for Distributed Applications , 2006 .
[57] Leonard Kleinrock,et al. Nomadicity: Anytime, Anywhere in a Disconnected World , 1996, Mob. Networks Appl..
[58] Tim Finin,et al. A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .
[59] Krzysztof Z. Gajos,et al. Design Principles for Resource Management Systems for Intelligent Spaces , 2001, IWSAS.
[60] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[61] R.A. Brooks,et al. The Intelligent Room project , 1997, Proceedings Second International Conference on Cognitive Technology Humanizing the Information Age.
[62] Kenton O'Hara,et al. Jukola: democratic music choice in a public space , 2004, DIS '04.
[63] M. D. Mickunas,et al. A Middleware for Enabling Personal Ubiquitous Spaces , 2004 .
[64] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[65] Tim Kindberg,et al. Secure Spontaneous Device Association , 2003, UbiComp.
[66] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[67] Mario Gerla,et al. BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[68] Wen-Tai Hsieh,et al. Semantic Web technologies for context-aware museum tour guide applications , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[69] David Hales,et al. SLACER: a self-organizing protocol for coordination in peer-to-peer networks , 2006, IEEE Intelligent Systems.
[70] Yasuyoshi Inagaki,et al. Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[71] William Adjie-Winoto,et al. The design and implementation of an intentional naming system , 2000, OPSR.
[72] Philippe Raab. Can Endogenous Group Formation Prevent Coordination Failure? A Theoretical and Experimental Investigation , 2005, SSRN Electronic Journal.
[73] Su Young Kwak. DESIGNING A HANDHELD INTERACTIVE SCAVENGER HUNT GAME TO ENHANCE MUSEUM EXPERIENCE , 2004 .