[1] |
LIU Yong, XIE Ruoying, FENG Yang, WANG Yahui, LIU Yaqing.
Survey on Resident’s Daily Activity Recognition in Smart Homes
[J]. Computer Engineering and Applications, 2021, 57(4): 35-42.
|
[2] |
ZHU Huihu1,2, QIU Han1,2, WANG Qingxian1,2, ZANG Yichao1,2.
Double Damage Factor Based Inter-Domain Routing System Cascading Failure Model
[J]. Computer Engineering and Applications, 2019, 55(2): 92-99.
|
[3] |
ZHAO Zhongtang1,3, CHEN Jiguang1,3, MA Qian2.
Research on imbalance learning problem in fall detection
[J]. Computer Engineering and Applications, 2017, 53(23): 142-146.
|
[4] |
WANG Junfeng1,2,3, YU Suihuai1, IMRE Horvath3, WANG Ning1.
User interaction modality based context-aware service provision for intelligent environments
[J]. Computer Engineering and Applications, 2015, 51(19): 1-7.
|
[5] |
ZHANG Lichen1,2, WANG Xiaoming1, DOU Wenyang1.
Adaptive fuzzy access control method for pervasive computing
[J]. Computer Engineering and Applications, 2012, 48(27): 7-11.
|
[6] |
YAO Lin1,2,FAN Qingna2,KONG Xiangwei1.
Inter-domain authentication scheme for Pervasive Computing Environments
[J]. Computer Engineering and Applications, 2011, 47(6): 82-85.
|
[7] |
ZHENG Yu-huang1,LI Di2,YE Feng2.
Context-conflict research in intelligent environment
[J]. Computer Engineering and Applications, 2010, 46(33): 25-27.
|
[8] |
YAO Lin1,2,FAN Qing-na2,KONG Xiang-wei1.
Authentication scheme based on biometric encryption for pervasive computing environments
[J]. Computer Engineering and Applications, 2010, 46(32): 108-111.
|
[9] |
LIU Jian-yang,CHEN Xiao-mei.
DMAPSM:Dynamic MAP switch mechanism for HMIPv6
[J]. Computer Engineering and Applications, 2010, 46(27): 99-102.
|
[10] |
ZHOU Shan-dan,ZHOU Xing-she,WANG Hai-peng,NI Hong-bo,ZHANG Gui-ying,MIAO Qiang.
Personalized recommendation algorithm for smart museum environment
[J]. Computer Engineering and Applications, 2010, 46(19): 224-226.
|
[11] |
WANG Hai-peng1,ZHOU Xing-she1,ZHANG Tao2.
Resource description approach for pervasive computing environments
[J]. Computer Engineering and Applications, 2009, 45(3): 20-23.
|
[12] |
ZHANG Hai-juan1,2.
Trust-based fuzzy access control model in pervasive computing
[J]. Computer Engineering and Applications, 2009, 45(27): 107-112.
|
[13] |
LI Yong,MA Man-fu,HE Ting-nian,QU Wei-li .
Scheduling model based on trust mechanism in inter-domain
[J]. Computer Engineering and Applications, 2009, 45(20): 96-98.
|
[14] |
FU Zheng-fang1,2,WANG Xiao-ming1,LUO Qin1.
Trust-based cascade servers model in pervasive computing
[J]. Computer Engineering and Applications, 2008, 44(8): 71-74.
|
[15] |
ZHANG Li-chen,WANG Xiao-ming.
Spatio-temporal access control model for pervasive computing
[J]. Computer Engineering and Applications, 2008, 44(17): 94-97.
|