Developing Ambient Intelligence
暂无分享,去创建一个
[1] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[2] Neelam Soundarajan,et al. Monitoring Design Pattern Contracts , 2004 .
[3] Päivi Majaranta,et al. Twenty years of eye typing: systems and design issues , 2002, ETRA.
[4] Rainer Hagen,et al. Photoaddressable Polymers for Optical Data Storage , 2001 .
[5] Makoto Yokoo,et al. Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..
[6] Ralf Sesseler,et al. Building agents for service provisioning out of components , 2001, AGENTS '01.
[7] R. Putnam. Bowling Alone: America's Declining Social Capital , 1995, The City Reader.
[8] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[9] Francesco Vatalaro,et al. Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction , 2005 .
[10] Tommi Mikkonen,et al. Formalizing design patterns , 1998, Proceedings of the 20th International Conference on Software Engineering.
[11] Eduardo B. Fernández,et al. Two Patterns for Web Services Security , 2004, International Conference on Internet Computing.
[12] R. Hardin. The Street-Level Epistemology of Trust , 1993 .
[13] Panos M. Pardalos,et al. Handbook of applied optimization , 2002 .
[14] Zeynep Erdeniz. International Herald Tribune , 2007 .
[15] Daniel Amyot,et al. Service Discovery and Component Reuse with Semantic Interfaces , 2005, SDL Forum.
[16] S. C. Kleene,et al. Introduction to Metamathematics , 1952 .
[17] Andreas Rieger,et al. BerlinTainment: an agent-based context-aware entertainment planning system , 2005, IEEE Communications Magazine.
[18] R. Harwig,et al. Ambient Intelligence: invisible electronics emerging , 2002, Proceedings of the IEEE 2002 International Interconnect Technology Conference (Cat. No.02EX519).
[19] Eduardo B. Fernandez,et al. Metadata and authorization patterns , 2000 .
[20] Rina Azoulay-Schwartz,et al. Bidding Mechanisms for Data Allocation in Multi-Agent Environments , 1997, ATAL.
[21] Haralambos Mouratidis,et al. Security Patterns for Agent Systems , 2003 .
[22] R. Geirsson,et al. Where to go , 2008 .
[23] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[24] Heiko Mantel,et al. On the composition of secure systems , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[25] M. Moloney,et al. A context-aware trust-based security system for ad hoc networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[26] Victor Lesser,et al. Environment Centered Analysis and Design of Coordination Mechanisms , 1996 .
[27] Roel Vertegaal,et al. Media eyepliances: using eye tracking for remote control focus selection of appliances , 2005, CHI Extended Abstracts.
[28] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[29] Gerardo Canfora,et al. Developing Java-AWT thin-client applications for limited devices , 2005, IEEE Internet Computing.
[30] Gerd Kortuem,et al. Ubiquitous displays in dynamic environments: issues and opportunities , 2004 .
[31] Frank Hill,et al. An aspect-oriented security framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[32] Simon Shiu,et al. Hardware Security Appliances for Trust , 2003, iTrust.
[33] Matjaz B. Juric,et al. Business process execution language for web services , 2004 .
[34] Patrick Chi-leung Hui,et al. Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..
[35] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[36] Paolo Giorgini,et al. ToothAgent: A Multi-agent System for Virtual Communities Support , 2006, AOIS.
[37] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[38] Fulvio Corno,et al. Domotic house gateway , 2006, SAC '06.
[39] A Min Tjoa,et al. Access Controls by Object-Oriented Concepts , 1997, DBSec.
[40] Katia P. Sycara,et al. The RETSINA MAS, a Case Study , 2002, SELMAS.
[41] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .
[42] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[43] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[44] Claudio S. Pinhanez. The Everywhere Displays Projector: A Device to Create Ubiquitous Graphical Interfaces , 2001, UbiComp.
[45] Jaswinder Pal Singh,et al. Computing and using reputations for internet ratings , 2001, EC '01.
[46] Eduardo B. Fernández,et al. A Pattern System for Access Control , 2004, DBSec.
[47] Jesús García,et al. Agent-based Coordination of Cameras , 2005, Int. J. Comput. Sci. Appl..
[48] Celso C. Ribeiro,et al. Greedy Randomized Adaptive Search Procedures , 2003, Handbook of Metaheuristics.
[49] Howell O. Istance,et al. Zooming interfaces!: enhancing the performance of eye controlled pointing devices , 2002, Assets '02.
[50] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[51] A. Rieger,et al. An agent-based architecture for ubiquitous multimodal user interfaces , 2005, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..
[52] James O. Coplien,et al. Pattern languages of program design , 1995 .
[53] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[54] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[55] Neelam Soundarajan,et al. Pattern-Based System Evolution: A Case-Study , 2006, SEKE.
[56] Douglas C. Schmidt,et al. Building application frameworks: object-oriented foundations of framework design , 1999 .
[57] Kazuo Takaragi,et al. An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.
[58] Katia P. Sycara,et al. Distributed Intelligent Agents , 1996, IEEE Expert.
[59] Jan Keiser,et al. Agent-based telematic services and telecom applications , 2001, CACM.
[60] Nicholas R. Jennings,et al. Verifying the contract net protocol: a case study in interaction protocol and agent communication semantics , 2004 .
[61] Sahin Albayrak,et al. JADL - An Agent Description Language for Smart Agents , 2006, DALT.
[62] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[63] M. Weiser,et al. Hot topics-ubiquitous computing , 1993 .
[64] S.A. Weis. RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.
[65] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[66] S. Holtmanns,et al. Tailored trustworthiness estimations in peer-to-peer networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[67] Kathleen E Krichbaum,et al. Automation as caregiver , 2001 .
[68] Daniel S. Weld,et al. UCPOP: A Sound, Complete, Partial Order Planner for ADL , 1992, KR.
[69] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[70] Barry Brumitt,et al. Better Living Through Geometry , 2001, Personal and Ubiquitous Computing.
[71] Javier Carbó,et al. TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .
[72] Christian Blum,et al. Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.
[73] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[74] Karima Boudaoud,et al. An intelligent agent-based model for security management , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[75] S. Goldsmith. Universal Design , 2001 .