A framework for personal mobile agents in wireless pervasive computing environment
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Tom M. Mitchell,et al. Experience with a learning personal assistant , 1994, CACM.
[3] Michael N. Huhns,et al. The Requirements for Personal Mobile Assistants in a Mobile Telecommunications Environment , 1996 .
[4] Todd A. Proebsting,et al. Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?) , 1997, COOTS.
[5] Harry Chen,et al. An ontology for context-aware pervasive computing environments , 2003, The Knowledge Engineering Review.
[6] Richard Goodwin,et al. Formalizing Properties of Agents , 1993, J. Log. Comput..
[7] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[8] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[9] Gerard Salton,et al. The State of Retrieval System Evaluation , 1992, Inf. Process. Manag..