Author:
Kabir Muhammad Ashad,Han Jun,Yu Jian,Colman Alan
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference39 articles.
1. Baader F, Calvanese D, McGuinness D, Nardi D, Patel-Schneider P (2003) The description logic handbook: theory, implementation and applications. Cambridge University Press, Cambridge
2. Beach A, Gartrell M, Xing X, Han R, Lv Q, Mishra S, Seada K (2010) Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the eleventh workshop on mobile computing systems and applications. HotMobile ’10. ACM, New York, NY, USA, pp 60–65
3. Bettini C, Brdiczka O, Henricksen K, Indulska J, Nicklas D, Ranganathan A, Riboni D (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comput 6(2):161–180
4. Biamino G (2011) Modeling social contexts for pervasive computing environments. In: IEEE international conference on pervasive computing and communications workshops (PERCOM workshops), pp 415–420, March 2011
5. Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) A semantic web based framework for social network access control. In: Proceedings of the 14th ACM symposium on access control models and technologies, SACMAT ’09. ACM, New York, NY, USA, pp 177–186
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献