1 |
Eiko Yoneki, "Evolution of Ubiquitous Computing with Sensor Networks in Urban Environments," UbiComp 2005, pp. 1-5, Sep. 10-11, 2005, Tokyo, Japan
|
2 |
Shang-Wen Cheng, et. al., "Software Architecture-based Adaptation for Pervasive Systems," International Conference on Architecture of Computing Systems (ARCS'02): Trends in Network and Pervasive Computing, April 8-11, 2002
|
3 |
Chonhwa Lee, Nordstedt, D., and A. Helal, S., "Enabling smart space with OSGi," IEEE Pervasive Computing, vol. 2, Issue 3, pp. 89-94, Sept 2003
DOI
ScienceOn
|
4 |
Wan-rong Jih, et.al., "Context-aware Access Control in Pervasive Healthcare," EEE'05 Workshop: Mobility, Agents, and Mobile Services (MAM), 2005
|
5 |
Marco Casassa Mont, et.al., "A Flexibile Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial," Trusted Systems Lab., HP Laboratories Bristol, Feb., 2003
|
6 |
A. S. Helal, "Programming Pervasive Spaces," IEEE Pervasive Computing, vol. 4, no.1, pp. 84-87, 2005
ScienceOn
|
7 |
A. K. Dey, G. D. Abowd, and D. Salber, "A Context-based Infrastructure for Smart Environments," Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99), pp. 114-128, 1999
|
8 |
Joao Pedro Sousa, et. al., "Capitalizing on Awareness of User Tasks for Guiding Self-Adaptation," 17th Conference on Advanced Information Systems Engineering, Porto, Portugal, 2005
|
9 |
John Soldatos, Ippokratis Pandis, Kostas Stamatis, Lazaros Polymenakos, and James L. Crowley, "Agent based middlewae infrastructure for autonomous context-aware ubiquitous computing services," International Journal of Computer Communications, vol. 30, pp. 577-591, 2007
DOI
ScienceOn
|
10 |
T. Morris, V. S. S. Nair, "PCPP: Private Computing on Public Platforms, A New Paradigm in Public Computing," IEEE International Symposium on Wireless Pervasive Computing 2007, February 2007
|
11 |
Hen-I Yang, Shinyoung Lim, Jeffrey King and Sumi Helal, "Open Issues of Nomadic Pervasive Computing", UbiSys 2006 Workshop in UbiComp 2006, Sep. 2006
|
12 |
Jesper Kjeldskov and Jeni Paay, "Public Pervasive Computing: Making the Invisible Visible," IEEE Computer, vol. 39, no. 9, pp. 60-65, Sep. 2006
|
13 |
Monica Tentori, et.al., "Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications," Journal of Universal Computer Science, vol. 12, no. 3, pp. 252-269, 2006
|
14 |
Joao Pedro Sousa, et. al., "Aura: An Architecture Framework for User Mobility in Ubiquitous Computing Environments," Proceedings of the 3rd Working IEEE/IFIP Conference on Software Architecture, pp. 29-43, August 2002
|
15 |
Shinyoung Lim and Sumi Helal, "Inter-space Interaction Issues Impacting Middleware Architecture of Ubiquitous Pervasive Computing," International Journal of Fuzzy Logic and Intelligent Systems, vol. 8, no. 1, pp. 42-51, March 2008
과학기술학회마을
DOI
ScienceOn
|
16 |
Mark Weiser, "The Computer of the 21st Century," Scientific American, vol. 265, no. 3, pp. 66-75, 1991
|
17 |
A. Helal, W. Mann and C. Lee, Assistive environments for individuals with special needs, Smart Environments, John Wiley and Sons, Inc., pp. 361-383, 2005
|
18 |
R. Kumar, M. Wolenetz, B. Agarwalla, J. Shin, P. Hutto, A. Paul, U. Ramachandran, "Dfuse: a framework for distributed data fusion," Proceedings of the first international conference on Embedded networked sensor systems, ACM Press pp. 114-125, 2003
|
19 |
M. Rom n, C. Hess, R. Cerqueira, A. Ranganathan, R. Campbell, K. Nahrstedt, "Gaia: A Middleware Infrastructure to Enable Active Spaces," IEEE Pervasive Computing, pp. 74-83, Oct-Dec 2002
DOI
ScienceOn
|
20 |
Kazunori Takashio, et.al., "A Mobile Agent Framework for Follow-Me Applications in Ubiquitous Computing Environment," 2001 International Conference on Distributed Computing Systems Workshop, pp. 202-207, 2001
|
21 |
Philip Robinson, Harald Vogt, and Waleed Wagealla, Privacy, Security, and Trust Within the Context of Pervasive Computing, Springer Verlag, ISBN 0387234616, 2005
|
22 |
D. Salber, A. K. Dey and G. D. Abowd, "The Context Toolkit: Aiding the development of context-enabled applications," Proceedings of CHI '99, pp. 434-441, 1999
|
23 |
Shinyoung Lim and Abdelsalam (Sumi) Helal, "Encapsulation and Entity-based Approach of Interconnection between Sensor Platform and Middleware of Pervasive Computing," 2006 International Symposium on Ubiquitous Computing Systems (UCS2006) Springer Verlag LNCS, pp. 500-515, Oct. 2006
|
24 |
Seungyong Lee, Younglok Lee, and Hyunghyo Lee, "Jini-Based Ubiquitous Computing Middleware Supporting Event and Context Management Services," UIC 2006, LNCS 4159, pp. 786-795, 2006
|
25 |
Markus C. Huebscher and Julie A. McCann, "Adaptive middleware for context-aware applications in smart homes," 2nd Workshop on Middleware for Pervasive and Ad-Hoc Computing, 2004
|
26 |
Emerson Loureiro, Frederico Bublitz, Nadia Barbosa, Angelo Perkusich, Hyggo Almeida, and Glauber Ferreira, "A Flexible Middleware for Service Provision Over Heterogeneous Pervasive Networks," 2006 International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM'06), 2006
|
27 |
J. Rekimoto, Y. Ayatsuka and K. Hayashi, "Augment-able reality: Situated communications through physical and digital spaces," Proceedings of the 2nd International Symposium on Wearable Computers, pp. 68-75, Oct. 1998
|
28 |
K. Romer, T. Schoch, F. Mattern, and T. Dubendorfer, "Smart Identification Frameworks for Ubiquitous Computing Applications," presented at First IEEE International Conference on Pervasive Computing and Communications, 2003
|
29 |
D. Salber, A.K. Dey and G. D. Abowd, "The Context Toolkit: Aiding the development of context-enabled applications," in Proceedings of CHI'99, pp. 434-441, 1999
|
30 |
A. Helal, W. Mann, H. Elzabadani, J. King, Y. Kaddourah and E. Jansen, "Gator Tech Smart House: A Programmable Pervasive Space," IEEE Computer magazine, pp. 64-74, March 2005
|
31 |
A. K. Dey, D. Salber, M. Futakawa and G. Abowd, "An architecture to support context-aware applications," submitted to UIST '99, 1999
|
32 |
Munirul Haque and Sheikh Iqbal Ahamed, "Security in Pervasive Computing: Current Status and Open Issues," International Journal of Network Security, vol. 3, no. 3, pp. 203-214, Nov. 2006
|