Sensing Danger - Challenges in Supporting Health and Safety Compliance in the Field
暂无分享,去创建一个
[1] Gerd Kortuem,et al. Cooperative Artefacts: Assessing Real World Situations with Embedded Technology , 2004, UbiComp.
[2] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[3] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[4] Kent Larson,et al. Activity Recognition in the Home Using Simple and Ubiquitous Sensors , 2004, Pervasive.
[5] Rong Zheng,et al. Asynchronous wakeup for ad hoc networks , 2003, MobiHoc '03.
[6] Emmanuel,et al. Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .
[7] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[8] David Kotz,et al. Analysis of a Campus-Wide Wireless Network , 2002, MobiCom '02.
[9] Kameswari Chebrolu,et al. Wake-on-WLAN , 2006, WWW '06.
[10] Michael C. Mozer,et al. The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .
[11] Jim E. Greer,et al. Inspecting and Visualizing Distributed Bayesian Student Models , 2000, Intelligent Tutoring Systems.
[12] Magdalena Balazinska,et al. Characterizing mobility and network usage in a corporate wireless local-area network , 2003, MobiSys '03.
[13] Nadine B. Sarter,et al. Team Play with a Powerful and Independent Agent: Operational Experiences and Automation Surprises on the Airbus A-320 , 1997, Hum. Factors.
[14] Suresh Singh,et al. Greening of the internet , 2003, SIGCOMM '03.
[15] Andreas Krause,et al. Unsupervised, dynamic identification of physiological and activity context in wearable computing , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[16] Aravind Srinivasan,et al. A Client-Driven Approach for Channel Management in Wireless LANs , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[17] Amin Vahdat,et al. Managing energy and server resources in hosting centers , 2001, SOSP.
[18] Bashar Nuseibeh,et al. Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..
[19] Yogesh L. Simmhan,et al. A survey of data provenance in e-science , 2005, SGMD.
[20] Andrew Lum. Scrutable User Models in Decentralised Adaptive Systems , 2003, User Modeling.