상황인식 서비스를 위한 스마트 모바일 플랫폼 |
Kang, Jun-Myeong
(포스텍 컴퓨터공학과)
Go, Tak-Kyun (포스텍 컴퓨터공학과) Seo, Sin-Seok (포스텍 컴퓨터공학과) Seong, Baek-Jae (포스텍 컴퓨터공학) Strassner, John (포스텍) Kim, Jong (포스텍) Park, Chan-Ik (포스텍) Hong, Won-Ki (포스텍) |
1 | J. Strassner, Declan O'Sullivan, and David Lewis, Ontologies in the Engineering of Management of Autonomic Systems: A Reality Check, Jounal of Network and System Management, Vol. 15, no. 1, pp. 5-11, Mar. 2007. DOI ScienceOn |
2 | M. Weiser, Hot topic: Ubiquitous Computing, IEEE Computer, Vol. 26, no. 10, pp. 71-72, Oct. 1993. DOI ScienceOn |
3 | G. Chen, et al., A Survey of Context-Aware Mobile Computer Research, Dartmouth Computer Science Tech. Report TR2000-381, 2000. |
4 | M. Duckham, et al., Location privacy and location- aware computing, Dynamic & Mobile GIS: Investigating Change in Space and Time, 2006. |
5 | K. Rehman, et al., An Architecture for Interactive Context-Aware Application, IEEE Pervasive Computing, Vol. 6, Issue 1, pp. 73-80, 2007. |
6 | X. Jiang, et al., Modeling privacy control in context- aware systems. IEEE Pervasive Computing, Vol. 1, Issue 3, pp. 59-63, 2002. DOI ScienceOn |
7 | M. J. Covington, et al., A context-aware security architecture for emerging applications, Proceedings of the 18th Annual Computer Security Applications Conference, p. 249, Dec. 2002. |
8 | 이상윤 외, 스마트폰 운영 체제 개발 동향, 전자통신동향분석 제 19권 제 6호, 2004년 12월. |
9 | Google Android, http://www.android.com/ |
10 | D. Kang, et al., Kernel Thread Scheduling in Real- Time Linux for Wearable Computers, ETRI Journal, Vol. 29, no. 3, pp. 270-280, Jun. 2007. DOI ScienceOn |
11 | Y. Kim, et al., An Adaptive Control Method on Kernel Threads to Improve I/O Real-Time Responsiveness in Linux, Korea Computer Congress 2009, pp. 302-307, 2009. |
12 | R. Sailer,et al., Design and Implementation of a TCG-based Integrity Measurement Architecture, USENIX Security Symposium, Vol. 13, pp. 16-16, 2004. |
13 | J. H. Anderson, et al., Real-Time Scheduling on Multicore Platforms, Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 179-190, 2006. |
14 | Android developers reference, http://developer.android. com/reference/android/os/PowerManager.html |
15 | J. Choi, et al., A Framework of Secure Access to iSCSI Network Storage based on TPM, Korea Computer Congress 2009, pp. 5-9, 2009. |
16 | The Active Badge System, http://www.cl.cam.ac.uk/ research/dtg/attarchive/ab.html |
17 | H. Kim, et al., CAMUS - A Middleware Supporting Context-aware Services for Network-based Robots, IEEE Workshop on Advanced Robotics and Its Social Impacts, pp. 237-242, 2005. |
18 | 류영달, 상황인식 컴퓨팅의 현황과 전망, 한국정보 사회진흥원 분석보고서, 2008. |
19 | Twitbird for iPhone, http://www.nibirutech.com/ twitbird-twitter-iphone.html |
20 | Autonomic Communication, http://www.autonomiccommunication. org/ |
21 | G.W. van Blarkom RE, et al., Handbook of Privacy and Privacy-Enhancing Technologies, ISBN 90- 74087-33-7, 2003. |
22 | J. Strassner, Policy-Based Network Management, Morgan Kaufman Publishers, Sep. 2003. |
23 | J. Strassner, N. Agoulmine, E. Lehtihet, FOCALE - A Novel Autonomic Networking Architecture, International Transactions on Systems, Science, and Applications (ITSSA) Journal, Vol. 3, no 1, pp. 64- 79, May 2007. |
24 | Federal Information Processing Standard, http:// www.itl.nist.gov/fipspubs/ |
25 | Role Based Access Control, http://csrc.nist.gov/groups/SNS/rbac/ |
26 | Ryan Wishart, Karen Henricksen, and Jadwiga Indulska. Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system, Vol. 4611 of Lecture Notes in Computer Science, Springer, 2007. |
27 | ARM11MPCore Processor, http://www.arm.com/products/ processors/classic/arm11/arm11-mpcore.php. |