共 50 条
- [1] Ontology access patterns for pervasive computing environments [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
- [2] End-user Configuration for Pervasive Computing Environments [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 487 - 493
- [3] End-user programming in pervasive computing environments [J]. PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 187 - 192
- [4] Uncertainty assessment in access control of pervasive computing environments [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
- [5] Pervasive data access in wireless and mobile computing environments [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 25 - 44
- [6] Privacy Enhanced Access Control in Pervasive Computing Environments [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
- [7] Ad hoc composition of user tasks in pervasive computing environments [J]. SOFTWARE COMPOSITION, 2005, 3628 : 31 - 46
- [8] Shared ontology for pervasive computing [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 64 - 78
- [9] An approach to automatic customization of user interfaces for mobile devices in pervasive environments [J]. 2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
- [10] A Calculus for Composite Authorities' Policy Derivation in Shared Domains of Pervasive Computing Environments [J]. 2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 913 - 920