Browse > Article

상황인식 서비스를 위한 스마트 모바일 플랫폼  

Kang, Jun-Myeong (포스텍 컴퓨터공학과)
Go, Tak-Kyun (포스텍 컴퓨터공학과)
Seo, Sin-Seok (포스텍 컴퓨터공학과)
Seong, Baek-Jae (포스텍 컴퓨터공학)
Strassner, John (포스텍)
Kim, Jong (포스텍)
Park, Chan-Ik (포스텍)
Hong, Won-Ki (포스텍)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Strassner, Declan O'Sullivan, and David Lewis, Ontologies in the Engineering of Management of Autonomic Systems: A Reality Check, Jounal of Network and System Management, Vol. 15, no. 1, pp. 5-11, Mar. 2007.   DOI   ScienceOn
2 M. Weiser, Hot topic: Ubiquitous Computing, IEEE Computer, Vol. 26, no. 10, pp. 71-72, Oct. 1993.   DOI   ScienceOn
3 G. Chen, et al., A Survey of Context-Aware Mobile Computer Research, Dartmouth Computer Science Tech. Report TR2000-381, 2000.
4 M. Duckham, et al., Location privacy and location- aware computing, Dynamic & Mobile GIS: Investigating Change in Space and Time, 2006.
5 K. Rehman, et al., An Architecture for Interactive Context-Aware Application, IEEE Pervasive Computing, Vol. 6, Issue 1, pp. 73-80, 2007.
6 X. Jiang, et al., Modeling privacy control in context- aware systems. IEEE Pervasive Computing, Vol. 1, Issue 3, pp. 59-63, 2002.   DOI   ScienceOn
7 M. J. Covington, et al., A context-aware security architecture for emerging applications, Proceedings of the 18th Annual Computer Security Applications Conference, p. 249, Dec. 2002.
8 이상윤 외, 스마트폰 운영 체제 개발 동향, 전자통신동향분석 제 19권 제 6호, 2004년 12월.
9 Google Android, http://www.android.com/
10 D. Kang, et al., Kernel Thread Scheduling in Real- Time Linux for Wearable Computers, ETRI Journal, Vol. 29, no. 3, pp. 270-280, Jun. 2007.   DOI   ScienceOn
11 Y. Kim, et al., An Adaptive Control Method on Kernel Threads to Improve I/O Real-Time Responsiveness in Linux, Korea Computer Congress 2009, pp. 302-307, 2009.
12 R. Sailer,et al., Design and Implementation of a TCG-based Integrity Measurement Architecture, USENIX Security Symposium, Vol. 13, pp. 16-16, 2004.
13 J. H. Anderson, et al., Real-Time Scheduling on Multicore Platforms, Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 179-190, 2006.
14 Android developers reference, http://developer.android. com/reference/android/os/PowerManager.html
15 J. Choi, et al., A Framework of Secure Access to iSCSI Network Storage based on TPM, Korea Computer Congress 2009, pp. 5-9, 2009.
16 The Active Badge System, http://www.cl.cam.ac.uk/ research/dtg/attarchive/ab.html
17 H. Kim, et al., CAMUS - A Middleware Supporting Context-aware Services for Network-based Robots, IEEE Workshop on Advanced Robotics and Its Social Impacts, pp. 237-242, 2005.
18 류영달, 상황인식 컴퓨팅의 현황과 전망, 한국정보 사회진흥원 분석보고서, 2008.
19 Twitbird for iPhone, http://www.nibirutech.com/ twitbird-twitter-iphone.html
20 Autonomic Communication, http://www.autonomiccommunication. org/
21 G.W. van Blarkom RE, et al., Handbook of Privacy and Privacy-Enhancing Technologies, ISBN 90- 74087-33-7, 2003.
22 J. Strassner, Policy-Based Network Management, Morgan Kaufman Publishers, Sep. 2003.
23 J. Strassner, N. Agoulmine, E. Lehtihet, FOCALE - A Novel Autonomic Networking Architecture, International Transactions on Systems, Science, and Applications (ITSSA) Journal, Vol. 3, no 1, pp. 64- 79, May 2007.
24 Federal Information Processing Standard, http:// www.itl.nist.gov/fipspubs/
25 Role Based Access Control, http://csrc.nist.gov/groups/SNS/rbac/
26 Ryan Wishart, Karen Henricksen, and Jadwiga Indulska. Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system, Vol. 4611 of Lecture Notes in Computer Science, Springer, 2007.
27 ARM11MPCore Processor, http://www.arm.com/products/ processors/classic/arm11/arm11-mpcore.php.