共 50 条
- [1] AWARENESS COMPUTING: WHAT, WHY, AND HOW? ECTA 2011/FCTA 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION THEORY AND APPLICATIONS AND INTERNATIONAL CONFERENCE ON FUZZY COMPUTATION THEORY AND APPLICATIONS, 2011,
- [2] AWARENESS COMPUTING: WHAT, WHY, AND HOW? NCTA 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NEURAL COMPUTATION THEORY AND APPLICATIONS, 2011, : IS5 - IS10
- [3] Awareness computing: What, why, and how? ECTA FCTA - Proc. Int. Conf. Evol. Comput. Theory Appl. Int. Conf. Fuzzy Comput. Theory Appl., (IS5-IS10):
- [4] How to Understand AI's Privacy Threats in Ubiquitous Computing PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
- [7] Privacy infusion in ubiquitous computing 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
- [9] An update on privacy in ubiquitous computing Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
- [10] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857