The Satchel system architecture: Mobile access to documents and services
暂无分享,去创建一个
Margery Eldridge | Mik Lamming | Mike Flynn | Chris Jones | David Pendlebury | M. Lamming | M. Eldridge | Mike Flynn | David Pendlebury | Chris Jones
[1] Marvin Theimer,et al. The Case for Non-transparent Replication: Examples from Bayou , 1998, IEEE Data Eng. Bull..
[2] Hui Lei,et al. Intelligent file hoarding for mobile computers , 1995, MobiCom '95.
[3] Julie McKeehan,et al. Programming for the Newton using Macintosh (2nd ed.) , 1996 .
[4] Bill N. Schilit,et al. An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..
[5] M. Lamming,et al. "Forget-me-not" Intimate Computing in Support of Human Memory , 1994 .
[6] Rohit Khare. W* effect considered harmful [Internet WAP] , 1999 .
[7] T. Dierks,et al. The TLS protocol , 1999 .
[8] A. Ramanujapuram,et al. DIGITAL CONTENT& INTELLECTUAL PROPERTY RIGHTS , 1998 .
[9] Joyce K. Reynolds,et al. Executive Introduction to Directory Services Using the X.500 Protocol , 1992, RFC.
[10] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[11] Lawrence C. Stewart,et al. An Extension to HTTP : Digest Access Authentication , 1997, RFC.
[12] Nathaniel S. Borenstein,et al. MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.
[13] Jennifer Seberry,et al. Public Key Cryptography , 2000, Lecture Notes in Computer Science.
[14] Margery Eldridge,et al. Satchel: providing access to any document, any time, anywhere , 2000, TCHI.
[15] Tim Berners-Lee,et al. Uniform Resource Locators (URL) , 1994, RFC.
[16] Aline Baggio,et al. Mobile host tracking and resource discovery , 1996, EW 7.