Correct behavior identification system in a Tagged World

[1]  M. Weiser,et al.  Hot topics-ubiquitous computing , 1993 .

[2]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[3]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[4]  Bruce Eckel Thinking in Java , 1998 .

[5]  Yasushi Nakauchi,et al.  Vivid room: human intention detection and activity support environment for ubiquitous autonomy , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).

[6]  Michael Juntao Yuan Enterprise J2ME: Developing Mobile Java Applications , 2003 .

[7]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[8]  Roy Want,et al.  RFID. A key to automating everything. , 2004, Scientific American.

[9]  Henry A. Kautz,et al.  Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.

[10]  Shoji Kurakake,et al.  Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[11]  R. Want RFID: A Key to Automating Everything.: A Key to Automating Everything. , 2004 .

[12]  Roy Want,et al.  Enabling ubiquitous sensing with RFID , 2004, Computer.