Introduction to Predictive Computing
暂无分享,去创建一个
[1] Cristina Nita-Rotaru,et al. FT-RC4: A Robust Security Mechanism for Data Stream Systems , 2005 .
[2] Walid G. Aref,et al. Scheduling for shared window joins over data streams , 2003, VLDB.
[3] William J. Rasdorf,et al. An evaluation of programming languages and language features for engineering software development , 1988, Engineering with Computers.
[4] Weisong Shi,et al. Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments , 2005, Mob. Networks Appl..
[5] Niklaus Wirth. The programming language pascal , 2004, Acta Informatica.
[6] Peter J. Denning,et al. Computing as a discipline , 1989, Computer.
[7] Haralambos Mouratidis,et al. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems , 2003, CAiSE.
[8] Peter Brusilovsky,et al. Mini-languages: a way to learn programming principles , 2004, Education and Information Technologies.
[9] Elisa Bertino,et al. A Security Punctuation Framework for Enforcing Access Control on Streaming Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[10] Albrecht Schmidt,et al. Embedded Interaction: Interacting with the Internet of Things , 2010, IEEE Internet Computing.
[11] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[12] Yacine Challal,et al. SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks , 2007 .
[13] Rafael H. Bordini,et al. Model checking agent programming languages , 2012, Automated Software Engineering.
[14] J. E. L. Peck,et al. Revised report on the algorithmic language ALGOL 68 , 2004, Acta Informatica.
[15] Nicola Leone,et al. Answer Set Programming , 2010, 25 Years GULP.
[16] Gerald Q. Maguire,et al. A predictive mobility management algorithm for wireless mobile computing and communications , 1995, Proceedings of ICUPC '95 - 4th IEEE International Conference on Universal Personal Communications.
[17] Christian C. Enz,et al. WiseNET: an ultralow-power wireless sensor network solution , 2004, Computer.
[18] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[19] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[20] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[21] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[22] Sabrina Sicari,et al. Privacy Aware Systems: From Models to Patterns , 2011 .
[23] Peter J. Denning,et al. Computing is a natural science , 2007, CACM.
[24] V. Rajaraman. Programming languages , 1998 .
[25] Toru Ishida,et al. Use of procedural programming languages for controlling production systems , 1991, [1991] Proceedings. The Seventh IEEE Conference on Artificial Intelligence Application.
[26] Haiyan Song,et al. Predicting Tourist Demand Using Big Data , 2017 .
[27] Bhaskar Krishnamachari,et al. An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[28] John K. Ousterhout,et al. Scripting: Higher-Level Programming for the 21st Century , 1998, Computer.
[29] Axel van Lamsweerde,et al. Handling Obstacles in Goal-Oriented Requirements Engineering , 2000, IEEE Trans. Software Eng..
[30] Anand S. Rao,et al. AgentSpeak(L): BDI Agents Speak Out in a Logical Computable Language , 1996, MAAMAW.
[31] John McCarthy,et al. Recursive functions of symbolic expressions and their computation by machine, Part I , 1959, Commun. ACM.
[32] Aaron K. Baughman,et al. Predictive Cloud Computing with Big Data: Professional Golf and Tennis Forecasting [Application Notes] , 2015, IEEE Computational Intelligence Magazine.
[33] Felix S. Klock,et al. The rust language , 2014 .
[34] Vikram Srinivasan,et al. Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .
[35] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.
[36] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[37] Sergey Yekhanin,et al. Private information retrieval , 2010, CACM.
[38] John Impagliazzo,et al. Computing Curricula 2005: The Overview Report , 2006, SIGCSE '06.
[39] Mengjun Li,et al. Organization-based agent-oriented programming: model, mechanisms, and language , 2013, Frontiers of Computer Science.
[40] Alan Burns,et al. Concurrency in ADA , 1995 .