共 50 条
- [31] Dependability issues of pervasive computing in a healthcare environment SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 53 - 70
- [32] iShadow: Yet Another Pervasive Computing Environment PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 261 - 268
- [33] User Interest Learning in Pervasive Computing Environment 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 319 - 322
- [34] Anonymous routing protocol in pervasive computing environment 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 421 - 424
- [35] A novel two-stage resource allocation model under pervasive computing environment Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2010, 28 (02): : 276 - 279
- [36] Compatibility checking of web services composition in pervasive computing 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 652 - +
- [37] A Deep Web Data Integration Model for Pervasive Computing 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 416 - 419
- [38] Research of protecting private information in pervasive computing environment 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 561 - +
- [39] A Study on Effective Proactive Service in Pervasive Computing Environment INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 35 - 39
- [40] Plugin-orb for applications in a pervasive computing environment PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 140 - 146