-
1
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
M. Weiser, "Some computer science issues in ubiquitous computing," Communications of the ACM, vol. 36(7), 1993, pp.75-84.
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
2
-
-
0010602271
-
System Software for Ubiquitous Computing
-
January-March
-
T. Kindberg, and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, January-March, 2002, pp. 70-81.
-
(2002)
IEEE Pervasive Computing
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
3
-
-
2642537855
-
Improving security for ubiquitous campus applications
-
January
-
K. Matsumiya, S. Tamaru, G. Suzuki, J. Nakazawa, K. Takashio, H. Tokuda, "Improving security for ubiquitous campus applications," Symposium on Applications and the Internet Workshops (SAINT 2004), January 2004, pp. 417-422.
-
(2004)
Symposium on Applications and the Internet Workshops (SAINT 2004)
, pp. 417-422
-
-
Matsumiya, K.1
Tamaru, S.2
Suzuki, G.3
Nakazawa, J.4
Takashio, K.5
Tokuda, H.6
-
4
-
-
0036999904
-
-
F. Stajano, and R. Anderson, The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Computer, 35(4), Part Supplement, April 2002, pp. 22-26.
-
F. Stajano, and R. Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing," Computer, vol. 35(4), Part Supplement, April 2002, pp. 22-26.
-
-
-
-
5
-
-
0013413164
-
Security for Ubiquitous Computing
-
February
-
F. Stajano, "Security for Ubiquitous Computing," Wiley, February 2002, pp. 110-111.
-
(2002)
Wiley
, pp. 110-111
-
-
Stajano, F.1
-
6
-
-
0035577649
-
Trust-based Security in Pervasive Computing Environments
-
December
-
L. Kagal, T. Finin, A. Joshi, "Trust-based Security in Pervasive Computing Environments," Computer, vol. 34(12), December 2001, pp.154-157.
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
7
-
-
33745882775
-
TATA: Towards Anonymous Trusted Authentication
-
Pisa, Italy
-
D. Quercia, S. Hailes, L. Capra, "TATA: Towards Anonymous Trusted Authentication," Proceedings of the Fourth International Conference on Trust Management (iTrust'06), Pisa, Italy, 2006.
-
(2006)
Proceedings of the Fourth International Conference on Trust Management (iTrust'06)
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
8
-
-
0035428427
-
Pervasive Computing: Vision and Challenges
-
August
-
M. Satyanarayanan, "Pervasive Computing: Vision and Challenges," IEEE Wireless Communications, vol. 8(4), August 2001, pp.10-17.
-
(2001)
IEEE Wireless Communications
, vol.8
, Issue.4
, pp. 10-17
-
-
Satyanarayanan, M.1
-
9
-
-
2942524994
-
Location Privacy in pervasive Computing
-
Jan-Mar
-
A.R. Beresford, F. Stajano, "Location Privacy in pervasive Computing," Pervasive Computing, IEEE, vol. 2(1), Jan-Mar 2003, pp. 46-55.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
10
-
-
34548121634
-
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemanel, and M. D. Mickunas, Towards security and privacy for pervasive computing, In Proceedings of International Symposium on Software Security, Tokyo, Japan, 2002.
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemanel, and M. D. Mickunas, "Towards security and privacy for pervasive computing," In Proceedings of International Symposium on Software Security, Tokyo, Japan, 2002.
-
-
-
-
11
-
-
84945556728
-
-
M. Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, In Proceedings of the 3rd international Conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001.
-
M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," In Proceedings of the 3rd international Conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001.
-
-
-
-
13
-
-
34548115511
-
-
L. Capra, W. Emmerich, and C. Mascolo, Reflective Middleware Solutions for Context-Aware Applications, In Proceedings of the Third international Conference on Metalevel Architectures and Separation of Crosscutting Concerns, September 25 - 28, 2001.
-
L. Capra, W. Emmerich, and C. Mascolo, "Reflective Middleware Solutions for Context-Aware Applications," In Proceedings of the Third international Conference on Metalevel Architectures and Separation of Crosscutting Concerns, September 25 - 28, 2001.
-
-
-
-
14
-
-
33750809662
-
MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments
-
M. Sharmin, S. Ahmed, S. I. Ahamed, "MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments," Third International Conference on Information Technology: New Generations (ITNG'06), 2006. pp. 306-313.
-
(2006)
Third International Conference on Information Technology: New Generations (ITNG'06)
, pp. 306-313
-
-
Sharmin, M.1
Ahmed, S.2
Ahamed, S.I.3
-
15
-
-
0003713182
-
Mobiware: QOS-aware middleware for mobile multimedia communications
-
White Plains, New York, United States
-
A. T. Campbell, "Mobiware: QOS-aware middleware for mobile multimedia communications", Proceedings of the IFIP TC6 seventh international conference on High performance networking VII, White Plains, New York, United States, 1997, pp. 166-183.
-
(1997)
Proceedings of the IFIP TC6 seventh international conference on High performance networking VII
, pp. 166-183
-
-
Campbell, A.T.1
-
16
-
-
0002159443
-
The Oxygen Project
-
August
-
M. Dertouzos, "The Oxygen Project," Scientific American, vol. 281(2), August 1999, pp. 52-63.
-
(1999)
Scientific American
, vol.281
, Issue.2
, pp. 52-63
-
-
Dertouzos, M.1
-
17
-
-
0031624640
-
T Spaces
-
P. Wyckoff, S. W. McLaughry, T. J. Lehman, and D. A. Ford, "T Spaces," IBM Systems Journal, vol. 37(3) 1998, pp. 454-474.
-
(1998)
IBM Systems Journal
, vol.37
, Issue.3
, pp. 454-474
-
-
Wyckoff, P.1
McLaughry, S.W.2
Lehman, T.J.3
Ford, D.A.4
-
19
-
-
34548114137
-
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21)
-
May2001
-
A. L. Murphy, G. P. Picco, and G. C. Roman, "Lime: A Middleware for Physical and Logical Mobility," Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21), May2001.
-
-
-
Murphy, A.L.1
Picco, G.P.2
Roman, G.C.3
-
20
-
-
0036282017
-
XMIDDLE: A Data-Sharing Middleware for Mobile Computing
-
April
-
C. Mascólo, L. Capra, S. Zachariadis, W. Emmerich, "XMIDDLE: A Data-Sharing Middleware for Mobile Computing," J. Wireless Personal Communications, vol. 21(1), April 2002, pp. 77-103.
-
(2002)
J. Wireless Personal Communications
, vol.21
, Issue.1
, pp. 77-103
-
-
Mascólo, C.1
Capra, L.2
Zachariadis, S.3
Emmerich, W.4
-
21
-
-
34548123421
-
-
R. Cerqueira, C. K. Hess, M. Roman, and R. H. Campbell, Gaia: A Development Infrastructure for Active Spaces, In Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP 2001), Sept. 2001.
-
R. Cerqueira, C. K. Hess, M. Roman, and R. H. Campbell, "Gaia: A Development Infrastructure for Active Spaces," In Workshop on Application Models and Programming Tools for Ubiquitous Computing (held in conjunction with the UBICOMP 2001), Sept. 2001.
-
-
-
-
22
-
-
0036391999
-
-
S.S. Yau, W. Yu, and F. Karim, Development of situation-aware application software for ubiquitous computing environments, Computer Software and Applications Conference COMPSAC 2002, 2002, pp. 233-238
-
S.S. Yau, W. Yu, and F. Karim, "Development of situation-aware application software for ubiquitous computing environments," Computer Software and Applications Conference (COMPSAC 2002), 2002, pp. 233-238.
-
-
-
-
23
-
-
3042742896
-
PICO: A middleware framework for pervasive computing
-
July-September
-
M. Kumar, B. A. Shirazi, S. K. Das, B.Y. Sung, D. Levine, and M. Singhal, "PICO: a middleware framework for pervasive computing," Pervasive Computing, IEEE, vol. 2(3), July-September 2003, pp. 72-79.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.3
, pp. 72-79
-
-
Kumar, M.1
Shirazi, B.A.2
Das, S.K.3
Sung, B.Y.4
Levine, D.5
Singhal, M.6
-
24
-
-
26444441760
-
Alice: Modularization of Middleware using Aspect-Oriented Programming
-
20-21 September, Linz, Austria
-
M. Eichberg, and M. Mezini, "Alice: Modularization of Middleware using Aspect-Oriented Programming," Software Engineering and Middleware (SEM 2004), 20-21 September 2004, Linz, Austria.
-
(2004)
Software Engineering and Middleware (SEM 2004)
-
-
Eichberg, M.1
Mezini, M.2
-
25
-
-
24744432052
-
-
M. Sharmin, S. Ahmed, S. I. Ahamed, SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments, International Conference on Information Technology: Coding and Computing (ITCC'05) II), 2005, pp. 271-276.
-
M. Sharmin, S. Ahmed, S. I. Ahamed, "SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments," International Conference on Information Technology: Coding and Computing (ITCC'05) vol (II), 2005, pp. 271-276.
-
-
-
-
26
-
-
33750370876
-
An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments
-
March
-
M. Sharmin, S. Ahmed, S. I. Ahamed, "An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments," Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), March 2006, pp. 13-17.
-
(2006)
Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006)
, pp. 13-17
-
-
Sharmin, M.1
Ahmed, S.2
Ahamed, S.I.3
-
27
-
-
14844324416
-
A Secure Human Computer Authentication Scheme
-
Technical Report CMU-CS-00-139, Carnegie Mellon University
-
N. Hopper and M. Blum, "A Secure Human Computer Authentication Scheme," Technical Report CMU-CS-00-139, Carnegie Mellon University, 2000.
-
(2000)
-
-
Hopper, N.1
Blum, M.2
-
29
-
-
0012625167
-
What Do Our Metrics Mean?
-
April
-
R. E. Zultner, "What Do Our Metrics Mean?," Cutter IT Journal, vol. 12(4), April 1999, pp. 11-19.
-
(1999)
Cutter IT Journal
, vol.12
, Issue.4
, pp. 11-19
-
-
Zultner, R.E.1
-
30
-
-
34548114135
-
-
M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. See Section 26.7
-
M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. (See Section 26.7
-
-
-
-
31
-
-
0345399126
-
The probable error of a mean
-
W.S. Gossett, "The probable error of a mean," Biometrika, vol. 6(1), 1908, pp. 1-25.
-
(1908)
Biometrika
, vol.6
, Issue.1
, pp. 1-25
-
-
Gossett, W.S.1
-
32
-
-
0017983865
-
Binary Decision Diagrams
-
June
-
S. B. Akers, "Binary Decision Diagrams," IEEE Transactions on Computers, C-27(6), June 1978, pp. 509-516.
-
(1978)
IEEE Transactions on Computers
, vol.C-27
, Issue.6
, pp. 509-516
-
-
Akers, S.B.1
-
33
-
-
0022769976
-
Graph-based Algorithms for Boolean Function Manipulation
-
R. E. Bryant, "Graph-based Algorithms for Boolean Function Manipulation," IEEE Transactions on Computers, C-35(8), 1986, pp. 677-691.
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
|