Correct behavior identification system in a Tagged World
暂无分享,去创建一个
[1] M. Weiser,et al. Hot topics-ubiquitous computing , 1993 .
[2] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[3] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[4] Bruce Eckel. Thinking in Java , 1998 .
[5] Yasushi Nakauchi,et al. Vivid room: human intention detection and activity support environment for ubiquitous autonomy , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).
[6] Michael Juntao Yuan. Enterprise J2ME: Developing Mobile Java Applications , 2003 .
[7] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[8] Roy Want,et al. RFID. A key to automating everything. , 2004, Scientific American.
[9] Henry A. Kautz,et al. Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.
[10] Shoji Kurakake,et al. Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[11] R. Want. RFID: A Key to Automating Everything.: A Key to Automating Everything. , 2004 .
[12] Roy Want,et al. Enabling ubiquitous sensing with RFID , 2004, Computer.