Some socio-technical aspects of intelligent buildings and pervasive computing research
暂无分享,去创建一个
[1] D. Lyon. Surveillance after September 11 , 2001 .
[2] Katherine Albrecht,et al. Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .
[3] Hani Hagras,et al. Creating an ambient-intelligence environment using embedded agents , 2004, IEEE Intelligent Systems.
[4] D. Lyon. Surveillance Studies: An Overview , 2007 .
[5] Víctor Zamudio,et al. Preventing Instability in Rule-Based Multi-Agent Systems; A Challenge to the Ambient Intelligence Vision , 2007 .
[6] O. Gandy. The Surveillance Society: Information Technology and Bureaucratic Social Control , 1989 .
[7] A. Danna,et al. All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .
[8] Kevin Warwick,et al. An attempt to extend human sensory capabilities by means of implant technology , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.
[9] Celia Lury,et al. Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .
[10] Bernard Horan. The use of capability descriptions in a wireless transducer network , 2005 .
[11] Walter Peissl,et al. ICT and Privacy in Europe. Experiences from technology assessment of ICT and Privacy in seven different European countries. Final report October 16, 2006, European Parliamentary Technology Assessment network (EPTA) , 2006 .
[12] ClarkeRoger. Asimov's Laws of Robotics , 1993 .
[13] Victor Callaghan,et al. Intelligent Habitats and the Future: The Interaction of People, Agents and Environmental Artifacts , 2000 .
[14] J. P. Eckert. The Integration Of Man And Machine , 1999 .
[15] Panos E. Kourouthanassis,et al. Pervasive Information Systems , 2008 .
[16] D. Lyon. Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .
[17] C. Krumhansl. Keynote Presentation , 2004 .
[18] K. Ball,et al. Situating workplace surveillance: Ethics and computer based performance monitoring , 2001, Ethics and Information Technology.
[19] Michael C. Mozer,et al. The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .
[20] Victor Callaghan,et al. Embedded-Internet Devices: A Means of Realising th Pervasive Computing Vision , 2003, ICWI.
[21] Arthur C. Clarke,et al. From 2001: A Space Odyssey , 2001 .
[22] Graham Clarke,et al. Domestic Pervasive Information Systems : End-user programming of digital homes , 2005 .
[23] Hani Hagras,et al. User interaction in a shared information space — A pervasive environment for the home , 2005 .
[24] Graham Clarke,et al. An End User Tool for Customising Personal Spaces in Ubiquitous Environments , 2007 .
[25] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[26] Graham Clarke,et al. Ubiquitous Computing, Informatization, Urban Structures and Density , 2007 .
[27] Hani Hagras,et al. Inhabited Intelligent Environments , 2004 .
[28] Priscilla M. Regan. Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.
[29] Perri,et al. Joined‐up government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II , 2005 .
[30] Graham Clarke,et al. A user-independent real-time emotion recognition system for software agents in domestic environments , 2007, Eng. Appl. Artif. Intell..
[31] D. Burnham. The rise of the computer state , 1983 .