Engineering Policy-Based Ubiquitous Systems
暂无分享,去创建一个
[1] Frank Stajano,et al. Security for Whom?: The Shifting Security Assumptions of Pervasive Computing , 2002, ISSS.
[2] Emil C. Lupu,et al. AMUSE: autonomic management of ubiquitous e‐Health systems , 2008, Concurr. Comput. Pract. Exp..
[3] Emil C. Lupu,et al. Verification of Policy-Based Self-Managed Cell Interactions Using Alloy , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.
[4] Dimitrios Hatzinakos,et al. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..
[5] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[6] Yanmin Zhu,et al. A policy system to support adaptability and security on body sensors , 2008, 2008 5th International Summer School and Symposium on Medical Devices and Biosensors.
[7] Oliver Ray,et al. Learning Rules from User Behaviour , 2009, AIAI.
[8] George Pavlou,et al. Policy refinement for DiffServ quality of service management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[9] Emil C. Lupu,et al. Realising management and composition of Self-Managed Cells in pervasive healthcare , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.
[10] Robin Milner,et al. Ubiquitous Computing: Shall we Understand It? , 2006, Comput. J..
[11] Alessandra Russo,et al. A goal-based approach to policy refinement , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[12] Emil C. Lupu,et al. A Mission Management Framework for Unmanned Autonomous Vehicles , 2009, MOBILWARE.
[13] Sebastian Nanz,et al. The Role of Abduction in Declarative Authorization Policies , 2008, PADL.
[14] Ian Taylor,et al. Shared visiting in EQUATOR city , 2002, CVE '02.
[15] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[16] C. Pollard,et al. Center for the Study of Language and Information , 2022 .
[17] Krysia Broda,et al. DARE: a system for distributed abductive reasoning , 2008, Autonomous Agents and Multi-Agent Systems.
[18] Robin Milner,et al. Bigraphs and Their Algebra , 2008, LIX.
[19] Emil C. Lupu,et al. A policy-based management architecture for mobile collaborative teams , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[20] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] Emil C. Lupu,et al. Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[22] Emil C. Lupu,et al. PEACE : a policy-based establishment of ad-hoc communities , 2004, 20th Annual Computer Security Applications Conference.
[23] Donald F. Towsley,et al. Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing , 2007, MobiCom '07.
[24] Luc De Raedt,et al. Inductive Logic Programming: Theory and Methods , 1994, J. Log. Program..
[25] Oliver Ray,et al. Nonmonotonic abductive inductive learning , 2009, J. Appl. Log..
[26] Murray Shanahan,et al. The Event Calculus Explained , 1999, Artificial Intelligence Today.
[27] Jack Minker,et al. An Overview of Nonmonotonic Reasoning and Logic Programming , 1993, J. Log. Program..
[28] Jorge Lobo,et al. Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.
[29] Andrew Campbell,et al. The Rise of People-Centric Sensing , 2008, IEEE Internet Computing.
[30] Emil C. Lupu,et al. Vesta: A secure and autonomic system for pervasive healthcare , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.
[31] C. Q. Lee,et al. The Computer Journal , 1958, Nature.