Secure Data Flow in a Calculus for Context Awareness
暂无分享,去创建一个
[1] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.
[2] Christine Julien,et al. Reasoning About Context-Awareness in the Presence of Mobility , 2004, FOCLASA.
[3] Jakob E. Bardram,et al. The AWARE architecture: supporting context-mediated social awareness in mobile cooperation , 2004, CSCW.
[4] Michele Bugliesi,et al. Reasoning about Security in Mobile Ambients , 2001, CONCUR.
[5] Benjamin C. Pierce,et al. Theoretical Aspects of Computer Software , 2001, Lecture Notes in Computer Science.
[6] Keith Cheverst,et al. The Role of Connectivity in Supporting Context-Sensitive Applications , 1999, HUC.
[7] Perdita Stevens,et al. Modelling Recursive Calls with UML State Diagrams , 2003, FASE.
[8] M. Kjærgaard,et al. Towards a Formal Model of Context Awareness , 2006 .
[9] Luca Cardelli,et al. Mobility Types for Mobile Ambients , 1999, ICALP.
[10] Daniele Gorla,et al. Enforcing Security Policies via Types , 2003, SPC.
[11] Christine Julien,et al. A Formal Treatment of Context-Awareness , 2004, FASE.
[12] Luca Cardelli,et al. Types for the Ambient Calculus , 2002, Inf. Comput..
[13] R. Milner,et al. Bigraphical Reactive Systems , 2001, CONCUR.
[14] Neil D. Jones,et al. Call-by-Value Termination in the Untyped lambda-Calculus , 2008, Log. Methods Comput. Sci..
[15] Pascal Zimmer. A Calculus for Context-Awareness , 2005 .
[16] Mikkel Baun Kjærgaard,et al. A Formal Model for Context-Awareness , 2006 .
[17] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[18] William Noah Schilit,et al. A system architecture for context-aware mobile computing , 1995 .
[19] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[20] Lars Birkedal,et al. Bigraphical Models of Context-Aware Systems , 2006, FoSSaCS.
[21] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[22] Doina Bucur,et al. Resource Discovery in Activity-Based Sensor Networks , 2007, Mob. Networks Appl..
[23] Gérard Boudol,et al. On Typing Information Flow , 2005, ICTAC.
[24] Martin Wirsing,et al. Theoretical Aspects of Computing - ICTAC 2005, Second International Colloquium, Hanoi, Vietnam, October 17-21, 2005, Proceedings , 2005, ICTAC.
[25] Gérard Boudol,et al. Asynchrony and the Pi-calculus , 1992 .
[26] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[27] Robin Milner,et al. Theories for the Global Ubiquitous Computer , 2004, FoSSaCS.
[28] Daniele Gorla,et al. Security Policies as Membranes in Systems for Global Computing , 2005, Log. Methods Comput. Sci..
[29] Michele Bugliesi,et al. Boxed Ambients , 2001, TACS.
[30] George Buchanan,et al. An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.
[31] Mariangiola Dezani-Ciancaglini,et al. Mobility Types for Mobile Processes in Mobile Ambients , 2003, Electron. Notes Theor. Comput. Sci..
[32] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[33] Mario Tokoro,et al. An Object Calculus for Asynchronous Communication , 1991, ECOOP.