Sensing Danger - Challenges in Supporting Health and Safety Compliance in the Field
暂无分享,去创建一个
Gerd Kortuem | Nigel Davies | Christos Efstratiou | Joe Finney | Mark Lowton | Rob Hooper | J. Finney | N. Davies | Gerd Kortuem | Christos Efstratiou | Mark Lowton | Rob Hooper
[1] Gerd Kortuem,et al. Cooperative Artefacts: Assessing Real World Situations with Embedded Technology , 2004, UbiComp.
[2] Bashar Nuseibeh,et al. Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..
[3] Yogesh L. Simmhan,et al. A survey of data provenance in e-science , 2005, SGMD.
[4] Andreas Krause,et al. Unsupervised, dynamic identification of physiological and activity context in wearable computing , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[5] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[6] Michael C. Mozer,et al. The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .
[7] Andrew Lum. Scrutable User Models in Decentralised Adaptive Systems , 2003, User Modeling.
[8] Nadine B. Sarter,et al. Team Play with a Powerful and Independent Agent: Operational Experiences and Automation Surprises on the Airbus A-320 , 1997, Hum. Factors.
[9] Emmanuel,et al. Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .
[10] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[11] Rong Zheng,et al. Asynchronous wakeup for ad hoc networks , 2003, MobiHoc '03.
[12] Jim E. Greer,et al. Inspecting and Visualizing Distributed Bayesian Student Models , 2000, Intelligent Tutoring Systems.
[13] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.