共 50 条
- [1] Research of protecting private information in pervasive computing environment [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 561 - +
- [3] Research of architecture for digital campus LBS in Pervasive Computing Environment [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 475 - 480
- [4] Research of Pervasive Computing [J]. THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 183 - 185
- [5] Method for network data collection and processing in the pervasive computing environment [J]. Ruan Jian Xue Bao, 2006, SUPPL. (219-224):
- [6] A method of agent task representation and processing in pervasive computing environment [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 7 - 12
- [7] A method for network data collection and processing in the pervasive computing environment [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 599 - +
- [8] Performance Evaluation of a Decision-Theoretic Approach for Quality of Experience Measurement in Mobile and Pervasive Computing Scenarios [J]. 2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
- [9] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 617 - 620
- [10] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 669 - 672