Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment
暂无分享,去创建一个
[1] Jim Waldo,et al. The Jini architecture for network-centric computing , 1999, CACM.
[2] Mark W. Newman,et al. Challenge: recombinant computing and the speakeasy approach , 2002, MobiCom '02.
[3] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[4] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[5] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.
[6] Atsushi Sugiura,et al. A user interface using fingerprint recognition: holding commands and data objects on fingers , 1998, UIST '98.
[7] Michihiko Minoh,et al. Networked appliances and their peer-to-peer architecture AMIDEN , 2001 .
[8] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[9] Jun Rekimoto,et al. Pick-and-drop: a direct manipulation technique for multiple computer environments , 1997, UIST '97.
[10] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[11] Juha Röning,et al. Using code mobility to create ubiquitous and active augmented reality in mobile computing , 1999, MobiCom '99.