GuardDV: a proximity detection device for homeless survivors of domestic violence
暂无分享,去创建一个
Andy Luse | Zayira Jordán Conde | Li-Shan Eva Tao | William E. Marsh | William Eric Marsh | L. Tao | A. Luse
[1] Peter Gall Krogh,et al. Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility , 2005, Critical Computing.
[2] Phoebe Sengers,et al. Reflective design , 2005, Critical Computing.
[3] Katina Michael,et al. Lend me your arms: The use and implications of humancentric RFID , 2007, Electron. Commer. Res. Appl..
[4] Ileana Arias,et al. Predicting Women's Intentions to Leave Abusive Relationships: An Application of the Theory of Planned Behavior1 , 2004 .
[5] Dana M. Caudle,et al. To tag or not to tag? , 2009, Libr. Hi Tech.
[6] Meg McGinity Shannon. RFID: is this game of tag fair play? , 2004, Commun. ACM.