Pervasive and Mobile Computing: Editorial

被引:0
|
作者
Das, Sajal K.
Conti, Marco
Shirazi, Behrooz
机构
关键词
D O I
10.1016/j.pmcj.2015.01.003
中图分类号
学科分类号
摘要
引用
收藏
页码:76 / 77
相关论文
共 50 条
  • [1] Editorial: Mobile and pervasive computing
    Chen, IR
    DaSilva, L
    Midkiff, S
    COMPUTER JOURNAL, 2004, 47 (04): : 404 - 404
  • [2] Pervasive adaptation for mobile computing
    Edmonds, T
    Hodges, S
    Hopper, A
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 111 - 118
  • [3] Mobile agents for pervasive computing
    Shah, Syed Waqar
    Inayatullah, M.
    Arbab, M. Naeem
    Yahy, Khawaja M.
    Khan, M. Zahir
    THIRD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2007, PROCEEDINGS, 2007, : 46 - 51
  • [4] Mobile and Pervasive Computing in Construction
    Skibniewski, Miroslaw J.
    CONSTRUCTION MANAGEMENT AND ECONOMICS, 2014, 32 (11) : 1148 - 1150
  • [5] Editorial for special issue on pervasive computing
    Gupta, SKS
    Lee, WC
    Satyanarayanan, M
    Srimani, P
    MOBILE NETWORKS & APPLICATIONS, 2002, 7 (04): : 255 - 257
  • [6] Editorial for special issue on pervasive computing
    Gupta, Sandeep Kumar S.
    Lee, Wang-Chien
    Satyanarayanan, Mahadev
    Srimani, Pradip K.
    Mobile Networks and Applications, 2002, Kluwer Academic Publishers (07) : 255 - 257
  • [7] The FATIMA middleware for mobile and pervasive computing
    Apel, Sven
    Sichting, Helge
    Leich, Thomas
    Plack, Marco
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 3, 2005, : 374 - 379
  • [8] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) : 469 - 481
  • [9] Big Data in Mobile and Pervasive Computing
    Sharma, Anuradha
    Farooq, Omar
    Misra, Praveen Kumar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1068 - 1072
  • [10] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 186 - 202