共 50 条
- [21] A Learning System Using User Preference in Ubiquitous Computing Environment [J]. FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 240 - +
- [22] End-user Configuration for Pervasive Computing Environments [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 487 - 493
- [23] A user-centric service framework for pervasive computing [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 42 - +
- [24] End-user programming in pervasive computing environments [J]. PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 187 - 192
- [25] User-controllable security and privacy for pervasive computing [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +
- [26] Pattern Based User Interface Generation in Pervasive Computing [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 48 - 53
- [27] Security Access Model in Pervasive Computing Environment [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
- [28] Towards database administration in pervasive computing environment [J]. INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, 2005, : 393 - 400
- [29] Dependability issues of pervasive computing in a healthcare environment [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 53 - 70
- [30] iShadow: Yet Another Pervasive Computing Environment [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 261 - 268