1 |
J. Waldo, 'Alive and well: Jini technology today', Computer, Vol.33, No. 6, pp.107-109, June 2000
|
2 |
P. Levis and D. Culler, 'Maté : A Tiny virtual machine for sensor networks,' Proc. of Int'l Conf. Architectural Support for Prog. Languages and Op. Sys. 2002
|
3 |
최경호 김정식, 임을규, '모바일 환경에서의 보안기법 연구', 한국정보보호학회 하계정보보호학술대회 논문집, Vol 16, No.1, pp 314-315, June 2006
|
4 |
S. Vinoski, 'CORBA: integrating diverse applications within distributed heterogeneous environments', IEEE Communications Magazine, pp. 46-55, Volume 35, Issue: 2 , Feb. 1997
|
5 |
R. Baldwin, R. Rivest 'The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms', RFC 2040, October 1996
|
6 |
S. Mohapatra and N. Venkatasubramanian, 'PARM : Power aware reconfigurable middleware,' Proc. of Int'l Conf. on Dist. Computing Systems, pp.1-8, 2003
|
7 |
D. Garlan and et al., 'Project Aura: Toward Distraction-Free Pervasive Computing,' IEEE Pervasive Comp., Apr. June 2002
|
8 |
Y. W. Law and J. M. Doumen and P. H. Hartel, 'Benchmarking Block Ciphers for Wireless Sensor Networks(Extended Abstract)', 1st IEEE Int. Conf. on Mobile Ad-Hoc and Sensor Systems (MASS 2004), Fort Lauderdale, Florida, October 2004
|
9 |
J. Flinn, E. D. Lara, M. Satyanarayanan, D. S. Wallach, and W. Zwaenepoel, 'Reducing the energy usage of office applications,' IFIP/ACM, 2001
|
10 |
유용덕, 최훈, 김형신, 권영미, Takeshi Nanri '경량 미들웨어를 위한 소프트웨어 구조', 한국차세대PC학회 논문지, Vol.1 No.2, pp.34-42. December 2005
|
11 |
D. Eastlake, P. Jones, 'US Secure Hash Algorithm 1(SHA1)', RFC 3174, Sep. 2001
|