共 50 条
- [1] Location-detection strategies in pervasive computing environments [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 273 - 278
- [2] A location model for pervasive computing environments [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
- [3] On Modeling for Pervasive Computing Environments [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
- [4] Knowledge-based modeling and natural computing for coordination in pervasive environments [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2006, : 99 - 106
- [5] Context and location-aware encryption for pervasive computing environments [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 283 - +
- [6] A model checking-based approach for location query processing in pervasive computing environments [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, 2007, 4806 : 866 - 875
- [7] Towards an intrusion detection system for pervasive computing environments [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 277 - 282
- [9] Trust-based security in pervasive computing environments [J]. COMPUTER, 2001, 34 (12) : 154 - 157