1 |
User-centric dependability concepts for ubiquitous computing /Bohn, Jürgen. January 2007 (has links)
Techn. Hochsch., Diss.--Zürich, 2006.
|
2 |
ContextTorrent: a context provisioning framewrok for pervasive applicationsHu, Haoyu., 胡昊宇. January 2011 (has links)
published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
|
3 |
InfoSpaces : eine ubiquitäre Anwendung für dezentralen Datenaustausch und anonyme Peer-to-Peer-Zugriffskontrolle /Voigt, Sebastian. January 2008 (has links)
Univ., Diss.--Hannover, 2007.
|
4 |
Methods and technologies for experimenting with ubiquitous computing /Tuulari, Esa. January 1900 (has links) (PDF)
Thesis (doctoral)--University of Oulu, 2005. / Includes bibliographical references (p. 127-136). Also available on the World Wide Web.
|
5 |
A distributed publish, subscribe notification service for pervasive environmentsZeidler, Andreas. January 2005 (has links) (PDF)
Darmstadt, Techn. Univ., Diss., 2004. / Computerdatei im Fernzugriff.
|
6 |
Context awareness in information logisticsHaseloff, Sandra. January 2005 (has links) (PDF)
Berlin, Techn. Univ., Diss., 2005. / Computerdatei im Fernzugriff.
|
7 |
Mobile security with smartcardsKilian-Kehr, Roger. January 2002 (has links) (PDF)
Darmstadt, Techn. Univ., Diss., 2002. / Computerdatei im Fernzugriff.
|
8 |
Mobile security with smartcardsKilian-Kehr, Roger. January 2002 (has links) (PDF)
Darmstadt, Techn. Univ., Diss., 2002. / Computerdatei im Fernzugriff.
|
9 |
Kalibrierbare Kontextadaption für ubiquitous computingFahrmair, Michael Robert. January 2005 (has links) (PDF)
München, Techn. Universiẗat, Diss., 2005.
|
10 |
Kontextabhängige Zugriffskontrolle für Anwendungen im ubiquitous computingMoschgath, Marie-Luise. January 2002 (has links) (PDF)
Darmstadt, Techn. Universiẗat, Diss., 2002.
|
Page generated in 0.0957 seconds