Pervasive computing support for market trading
暂无分享,去创建一个
C. Heath | P. Luff | V. Sassone | L. Capra | S. Hailes | I. Wakeman | D. Chalmers | Dan Chalmers
[1] Charles E. Perkins,et al. Service Location Protocol, Version 2 , 1999, RFC.
[2] Tim Owen,et al. Middleware for user controlled environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[3] Andrew T. Campbell,et al. Mobiware: QoS-aware middleware for mobile multimedia communications , 1997, HPN.
[4] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[5] Christine Julien,et al. Active Coordination in Ad Hoc Networks , 2004, COORDINATION.
[6] Cecilia Mascolo,et al. Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[7] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Claudia Linnhoff-Popien,et al. A Context Modeling Survey , 2004 .
[9] P. Venkat Rangan,et al. An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[10] R. Swedberg. New Economic Sociology: What Has Been Accomplished, What Is Ahead? , 1997 .
[11] Cecilia Mascolo,et al. XMIDDLE: A Data-Sharing Middleware for Mobile Computing , 2002, Wirel. Pers. Commun..
[12] Nicholas R. Jennings,et al. Sequential auctions for objects with common and private values , 2005, AAMAS '05.
[13] David S. Rosenblum,et al. Design and evaluation of a wide-area event notification service , 2001, TOCS.
[14] Peter Ørbæk,et al. "Physical hypermedia": organising collections of mixed physical and digital material , 2003, HYPERTEXT '03.
[15] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[16] L. Suchman. Plans and situated actions , 1987 .
[17] Cecilia Mascolo,et al. Q-CAD: QoS and context aware discovery framework for mobile systems , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[18] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[19] Amy L. Murphy,et al. LIME: a middleware for physical and logical mobility , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[20] Joan Feigenbaum,et al. KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .
[21] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[22] Daniele Quercia,et al. STRUDEL: supporting trust in the dynamic establishment of peering coalitions , 2006, SAC '06.
[23] Yvonne Rogers,et al. From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors , 2004, AUIC.
[24] Timothy Sohn,et al. Supporting End User Programming of Context-Aware Applications , 2003 .
[25] Meredith Ringel Morris,et al. iStuff: a physical user interface toolkit for ubiquitous computing environments , 2003, CHI '03.
[26] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[27] Lionel M. Ni,et al. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[28] Steven R. Waterhouse. Jxta search:distributed search for distributed networks , 2001 .
[29] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[30] Valérie Issarny,et al. QoS-aware service location in mobile ad hoc networks , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[31] Urs Bruegger,et al. Global Microstructures: The Virtual Societies of Financial Markets1 , 2002, American Journal of Sociology.
[32] Stephen Weeks,et al. Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[33] Michael Nidd,et al. Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..
[34] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[35] Jun-Hong Cui,et al. Websigns: Hyperlinking Physical Locations to the Web , 2001, Computer.
[36] L. Capra,et al. Reasoning about trust groups to coordinate mobile ad-hoc systems , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[37] Patrick Horster,et al. A New Approach for Delegation Using Hierarchical Delegation Tokens , 1997, Communications and Multimedia Security.
[38] G.S. Blair,et al. Middleware awareness in mobile computing , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[39] Cecilia Mascolo,et al. CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications , 2003, IEEE Trans. Software Eng..
[40] Tim Owen,et al. Managing the policies of non-technical users in a dynamic world , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[41] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[42] P. Drew,et al. Managing prospect affiliation and rapport in real-life sales encounters , 2003 .
[43] Jeff Magee,et al. Multi-sensor location tracking , 1998, MobiCom '98.
[44] Vladimiro Sassone,et al. A Formal Framework for Concrete Reputation Systems , 2005 .
[45] Nicholas R. Jennings,et al. Bargaining with incomplete information , 2005, Annals of Mathematics and Artificial Intelligence.
[46] Morris Sloman,et al. A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps , 2004, Personal and Ubiquitous Computing.
[47] Jens Riegelsberger,et al. The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..
[48] Lionel M. Ni,et al. PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[49] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[50] Cecilia Mascolo,et al. Satin: A Component Model for Mobile Self Organisation , 2004, CoopIS/DOA/ODBASE.
[51] Marketing ideas , 2004 .
[52] H. White,et al. Where do markets come from , 1981 .
[53] B. Carruthers,et al. Making Markets: Opportunism and Restraint on Wall Street , 1999 .
[54] Yvonne Rogers,et al. Ambient wood: designing new forms of digital augmentation for learning outdoors , 2004, IDC '04.
[55] Blair MacIntyre,et al. Integrating virtual and physical context to support knowledge workers , 2002, IEEE Pervasive Computing.
[56] Jadwiga Indulska,et al. Modeling Context Information in Pervasive Computing Systems , 2002, Pervasive.
[57] H. Geismar. What’s in a Price? , 2001 .