메뉴 건너뛰기




Volumn 3968 LNCS, Issue , 2006, Pages 153-168

Domino: Exploring mobile collaborative software adaptation

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SYSTEMS; ANIMATION; COMPUTER SOFTWARE; DATA PRIVACY; MOBILE COMPUTING; SECURITY OF DATA;

EID: 33745908600     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11748625_10     Document Type: Conference Paper
Times cited : (14)

References (27)
  • 3
    • 33646040128 scopus 로고    scopus 로고
    • Picking pockets on the lawn: The development of tactics and strategies in a mobile game
    • Barkhuus, L. et al., Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game Proc. Ubicomp 2005, 358-374.
    • (2005) Proc. Ubicomp , pp. 358-374
    • Barkhuus, L.1
  • 4
    • 51349144621 scopus 로고    scopus 로고
    • On plug-ins und extensible architectures
    • March
    • Birsan, D. On Plug-ins und Extensible Architectures. ACM Queue 3(2) March 2005
    • (2005) ACM Queue , vol.3 , Issue.2
    • Birsan, D.1
  • 5
    • 0042504684 scopus 로고    scopus 로고
    • The order of things: Activity-centred information access
    • Chalmers, M., et al., The Order of Things: Activity-Centred Information Access. Proc. WWW 1998. 359-367.
    • Proc. WWW 1998 , pp. 359-367
    • Chalmers, M.1
  • 6
    • 84941148305 scopus 로고    scopus 로고
    • Poblano: A distributed trust model for peer-to-peer networks
    • Chen, F. and Yeager, W., Poblano: A Distributed Trust Model for Peer-to-Peer Networks, JXTA Security White Paper, 2001.
    • (2001) JXTA Security White Paper
    • Chen, F.1    Yeager, W.2
  • 7
    • 84941159987 scopus 로고    scopus 로고
    • The role of built-in knowledge in adaptive interface systems
    • Crow, D., Smith, B., The role of built-in knowledge in adaptive interface systems. Proc. ACM IU1 1993, 91-104
    • Proc. ACM IU1 1993 , pp. 91-104
    • Crow, D.1    Smith, B.2
  • 8
    • 84900561794 scopus 로고    scopus 로고
    • EAGER: Programming repetitive tasks by example
    • Cypher, A., EAGER: programming repetitive tasks by example, ACM CHI 1991, 33-39.
    • ACM CHI 1991 , pp. 33-39
    • Cypher, A.1
  • 11
    • 84945564256 scopus 로고    scopus 로고
    • At home with ubiquitous computing: Seven challenges
    • Springer LNCS
    • Edwards, W.K., Grinter, R. At Home with Ubiquitous Computing: Seven Challenges. Proc. Ubicomp 2001, Springer LNCS, 256-272
    • Proc. Ubicomp 2001 , pp. 256-272
    • Edwards, W.K.1    Grinter, R.2
  • 12
    • 4544268870 scopus 로고    scopus 로고
    • A comparison of static, adaptive and adaptable menus
    • Findlater, L, McGrenere, J. A comparison of static, adaptive and adaptable menus. Proc. ACM CHI 2004, 89-96.
    • Proc. ACM CHI 2004 , pp. 89-96
    • Findlater, L.1    McGrenere, J.2
  • 13
    • 84869142129 scopus 로고    scopus 로고
    • Distributive immunization of networks against viruses using the 'honey-pot' architecture
    • December
    • Goldenberg, J., Shavitt, Y., Shir, E. & Solomon, S. Distributive immunization of networks against viruses using the 'honey-pot' architecture. Nature Physics, 1(3), December 2005, 184-188.
    • (2005) Nature Physics , vol.1 , Issue.3 , pp. 184-188
    • Goldenberg, J.1    Shavitt, Y.2    Shir, E.3    Solomon, S.4
  • 14
    • 0142156639 scopus 로고    scopus 로고
    • Playing with the bits: User-configuration of ubiquitous domestic environments
    • Springer LNCS
    • Humble, J. et al., Playing with the Bits: User-configuration of Ubiquitous Domestic Environments, Proc. UbiComp 2003, Springer LNCS, 256-263.
    • Proc. UbiComp 2003 , pp. 256-263
    • Humble, J.1
  • 15
    • 33646824096 scopus 로고    scopus 로고
    • An epidemic model for information diffusion in MANETs
    • Khelil, A, Becker, C. et al. An Epidemic Model for Information Diffusion in MANETs, Proc. ACM MSWiM, 2002
    • (2002) Proc. ACM MSWiM
    • Khelil, A.1    Becker, C.2
  • 16
    • 84945163508 scopus 로고    scopus 로고
    • Patterns of sharing customizable software
    • Mackay, W. Patterns of Sharing Customizable Software. Proc. ACM CSCW 1990, 209-221.
    • Proc. ACM CSCW 1990 , pp. 209-221
    • Mackay, W.1
  • 17
    • 84900565522 scopus 로고    scopus 로고
    • Triggers and barriers to customizing software
    • Mackay, W. Triggers and barriers to customizing software. Proc. ACM CHl 1991, 153-160
    • Proc. ACM CHl 1991 , pp. 153-160
    • Mackay, W.1
  • 18
    • 85041751780 scopus 로고    scopus 로고
    • User-tailorable systems: Pressing the issues with buttons
    • MacLean, A., et al. User-Tailorable Systems: Pressing the Issues with Buttons. Proc. ACM CHI 1990, 175-182.
    • Proc. ACM CHI 1990 , pp. 175-182
    • MacLean, A.1
  • 19
    • 0011747279 scopus 로고
    • Twinkling lights and nested loops: Distributed problem solving and spreadsheet development
    • Academic Press
    • Nardi, B.A. and Miller, J. Twinkling Lights and Nested Loops: Distributed Problem Solving and Spreadsheet Development, CSCW and Groupware, Academic Press, 1991, 29-52
    • (1991) CSCW and Groupware , pp. 29-52
    • Nardi, B.A.1    Miller, J.2
  • 20
    • 77953077071 scopus 로고    scopus 로고
    • Designing for serendipity: Supporting end-user configurations of ubiquitous computing environments
    • Newman, M., et al. Designing for Serendipity: Supporting End-User Configurations of Ubiquitous Computing Environments, Proc. ACM DIS 2002, 147-156.
    • Proc. ACM DIS 2002 , pp. 147-156
    • Newman, M.1
  • 22
    • 33646038907 scopus 로고    scopus 로고
    • DigiDress: A field trial of an expressive social proximity application
    • Persson, P. et al., DigiDress: A Field Trial of an Expressive Social Proximity Application. Proc. Ubicomp 2005, 195-212.
    • Proc. Ubicomp 2005 , pp. 195-212
    • Persson, P.1
  • 23
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • February
    • Pfitzmann, A., Pfitzmann, B. & Waidner, M. Trusting Mobile User Devices and Security Modules. Computer, February 1997, 30(2), 61-68.
    • (1997) Computer , vol.30 , Issue.2 , pp. 61-68
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 24
    • 4444331720 scopus 로고    scopus 로고
    • Security as a new dimension in embedded system design
    • June
    • Ravi, S. et al., Security as a new dimension in embedded system design. Proc. Design Automation, June 2004
    • (2004) Proc. Design Automation
    • Ravi, S.1
  • 25
    • 0038375715 scopus 로고    scopus 로고
    • The evolution of buildings and implications for the design of ubiquitous domestic environments
    • Rodden, T., Benford, S. The evolution of buildings and implications for the design of ubiquitous domestic environments. Proc. ACM CHI 2003, 9-16.
    • Proc. ACM CHI 2003 , pp. 9-16
    • Rodden, T.1    Benford, S.2
  • 26
    • 84941160369 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious host attacks using threat diagnostic AND/OR tree
    • Saeb, M., Hamza, M. & Soliman, A. Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree. Proc. sOc 2003
    • Proc. SOc 2003
    • Saeb, M.1    Hamza, M.2    Soliman, A.3
  • 27
    • 33144488563 scopus 로고    scopus 로고
    • Automatically personalizing user interfaces
    • Morgan Kaufmann
    • Weld, D. et al. Automatically personalizing user interfaces. Proc IJCAI 2003, Morgan Kaufmann, 1613-1619
    • Proc IJCAI 2003 , pp. 1613-1619
    • Weld, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.