Developing Ambient Intelligence

[1]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[2]  Neelam Soundarajan,et al.  Monitoring Design Pattern Contracts , 2004 .

[3]  Päivi Majaranta,et al.  Twenty years of eye typing: systems and design issues , 2002, ETRA.

[4]  Rainer Hagen,et al.  Photoaddressable Polymers for Optical Data Storage , 2001 .

[5]  Makoto Yokoo,et al.  Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..

[6]  Ralf Sesseler,et al.  Building agents for service provisioning out of components , 2001, AGENTS '01.

[7]  R. Putnam Bowling Alone: America's Declining Social Capital , 1995, The City Reader.

[8]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[9]  Francesco Vatalaro,et al.  Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction , 2005 .

[10]  Tommi Mikkonen,et al.  Formalizing design patterns , 1998, Proceedings of the 20th International Conference on Software Engineering.

[11]  Eduardo B. Fernández,et al.  Two Patterns for Web Services Security , 2004, International Conference on Internet Computing.

[12]  R. Hardin The Street-Level Epistemology of Trust , 1993 .

[13]  Panos M. Pardalos,et al.  Handbook of applied optimization , 2002 .

[14]  Zeynep Erdeniz International Herald Tribune , 2007 .

[15]  Daniel Amyot,et al.  Service Discovery and Component Reuse with Semantic Interfaces , 2005, SDL Forum.

[16]  S. C. Kleene,et al.  Introduction to Metamathematics , 1952 .

[17]  Andreas Rieger,et al.  BerlinTainment: an agent-based context-aware entertainment planning system , 2005, IEEE Communications Magazine.

[18]  R. Harwig,et al.  Ambient Intelligence: invisible electronics emerging , 2002, Proceedings of the IEEE 2002 International Interconnect Technology Conference (Cat. No.02EX519).

[19]  Eduardo B. Fernandez,et al.  Metadata and authorization patterns , 2000 .

[20]  Rina Azoulay-Schwartz,et al.  Bidding Mechanisms for Data Allocation in Multi-Agent Environments , 1997, ATAL.

[21]  Haralambos Mouratidis,et al.  Security Patterns for Agent Systems , 2003 .

[22]  R. Geirsson,et al.  Where to go , 2008 .

[23]  Frédéric Thiesse,et al.  Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.

[24]  Heiko Mantel,et al.  On the composition of secure systems , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[25]  M. Moloney,et al.  A context-aware trust-based security system for ad hoc networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[26]  Victor Lesser,et al.  Environment Centered Analysis and Design of Coordination Mechanisms , 1996 .

[27]  Roel Vertegaal,et al.  Media eyepliances: using eye tracking for remote control focus selection of appliances , 2005, CHI Extended Abstracts.

[28]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[29]  Gerardo Canfora,et al.  Developing Java-AWT thin-client applications for limited devices , 2005, IEEE Internet Computing.

[30]  Gerd Kortuem,et al.  Ubiquitous displays in dynamic environments: issues and opportunities , 2004 .

[31]  Frank Hill,et al.  An aspect-oriented security framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[32]  Simon Shiu,et al.  Hardware Security Appliances for Trust , 2003, iTrust.

[33]  Matjaz B. Juric,et al.  Business process execution language for web services , 2004 .

[34]  Patrick Chi-leung Hui,et al.  Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..

[35]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[36]  Paolo Giorgini,et al.  ToothAgent: A Multi-agent System for Virtual Communities Support , 2006, AOIS.

[37]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[38]  Fulvio Corno,et al.  Domotic house gateway , 2006, SAC '06.

[39]  A Min Tjoa,et al.  Access Controls by Object-Oriented Concepts , 1997, DBSec.

[40]  Katia P. Sycara,et al.  The RETSINA MAS, a Case Study , 2002, SELMAS.

[41]  Eduardo B. Fernandez,et al.  A pattern language for security models , 2001 .

[42]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[43]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[44]  Claudio S. Pinhanez The Everywhere Displays Projector: A Device to Create Ubiquitous Graphical Interfaces , 2001, UbiComp.

[45]  Jaswinder Pal Singh,et al.  Computing and using reputations for internet ratings , 2001, EC '01.

[46]  Eduardo B. Fernández,et al.  A Pattern System for Access Control , 2004, DBSec.

[47]  Jesús García,et al.  Agent-based Coordination of Cameras , 2005, Int. J. Comput. Sci. Appl..

[48]  Celso C. Ribeiro,et al.  Greedy Randomized Adaptive Search Procedures , 2003, Handbook of Metaheuristics.

[49]  Howell O. Istance,et al.  Zooming interfaces!: enhancing the performance of eye controlled pointing devices , 2002, Assets '02.

[50]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[51]  A. Rieger,et al.  An agent-based architecture for ubiquitous multimodal user interfaces , 2005, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..

[52]  James O. Coplien,et al.  Pattern languages of program design , 1995 .

[53]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[54]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[55]  Neelam Soundarajan,et al.  Pattern-Based System Evolution: A Case-Study , 2006, SEKE.

[56]  Douglas C. Schmidt,et al.  Building application frameworks: object-oriented foundations of framework design , 1999 .

[57]  Kazuo Takaragi,et al.  An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.

[58]  Katia P. Sycara,et al.  Distributed Intelligent Agents , 1996, IEEE Expert.

[59]  Jan Keiser,et al.  Agent-based telematic services and telecom applications , 2001, CACM.

[60]  Nicholas R. Jennings,et al.  Verifying the contract net protocol: a case study in interaction protocol and agent communication semantics , 2004 .

[61]  Sahin Albayrak,et al.  JADL - An Agent Description Language for Smart Agents , 2006, DALT.

[62]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[63]  M. Weiser,et al.  Hot topics-ubiquitous computing , 1993 .

[64]  S.A. Weis RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.

[65]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[66]  S. Holtmanns,et al.  Tailored trustworthiness estimations in peer-to-peer networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[67]  Kathleen E Krichbaum,et al.  Automation as caregiver , 2001 .

[68]  Daniel S. Weld,et al.  UCPOP: A Sound, Complete, Partial Order Planner for ADL , 1992, KR.

[69]  Thomas R. Gruber,et al.  Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..

[70]  Barry Brumitt,et al.  Better Living Through Geometry , 2001, Personal and Ubiquitous Computing.

[71]  Javier Carbó,et al.  TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .

[72]  Christian Blum,et al.  Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.

[73]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[74]  Karima Boudaoud,et al.  An intelligent agent-based model for security management , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[75]  S. Goldsmith Universal Design , 2001 .