共 50 条
- [31] Context-based secure resource access in pervasive computing environments SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
- [32] A trust analysis methodology for pervasive computing systems TRUSTING AGENTS FOR TRUSTING ELECTRONIC SOCIETIES: THEORY AND APPLICATIONS IN HCI AND E-COMMERCE, 2005, 3577 : 129 - 143
- [33] Towards service orientation in pervasive computing systems ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 289 - 295
- [34] Pervasive Computing In Transport Embedded Information Systems 2009 6TH ANNUAL IEEE COMMUNICATION SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS WORKSHOPS, 2009, : 212 - 214
- [36] More principled design of pervasive computing systems ENGINEERING HUMAN COMPUTER INTERACTION AND INTERACTIVE SYSTEMS, 2005, 3425 : 292 - 305
- [37] Self-healing for Pervasive Computing Systems ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 1 - 25
- [38] Persistent computing systems as an infrastructure for pervasive services 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 104 - +
- [39] Combining Theory and Systems Building in Pervasive Computing COMPUTER JOURNAL, 2010, 53 (02): : 129 - 130
- [40] On the relationship of privacy and secure remote logging in dynamic systems SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 329 - 339