B-6-57 Collecting and distributing context for a ubiquitous service
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 2003-09-10
著者
-
Yamazaki Kenichi
Network Laboratories, NTT DoCoMo, Inc.
-
Hoshino Jin
Network Laboratories Ntt Docomo Inc.
-
SATOH Takashi
Network Management Development Division, NTT DoCoMo Inc.
-
Yamazaki Kenichi
Ntt Docomo Inc.
-
Satoh Takashi
Network Laboratories Ntt Docomo Inc.
-
Satoh Takashi
Tokyo Institute Of Technology
-
Satoh T
Network Laboratories Ntt Docomo Inc.
-
Yamazaki Kenichi
Research Laboratories, NTT DoCoMo, Inc., Yokosuka Research Park (YRP)
関連論文
- B-6-105 A partitioned programming model for network-assisted distributed operations
- Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things(Mobile Computing)
- Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things
- B-14-7 Inferring Method for Human Activities using Relationship between Nouns and Verbs
- B-7-61 An Automatic Method of Determining Field Characteristics in Ubiquitous Computing Environment
- B-7-60 Grouping Method for Active Tag in Ubiquitous Computing Environment
- B-7-51 A Stray Object Detection Method Based on Active Tags
- B-7-77 Tag Based Service Configuration in Ubiquitous Computing Environment
- B-7-76 Selection Method of Multiple Tags in Ubiquitous Computing Environment
- Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks
- Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things
- Automatic configuration of sensor locations by tracking human movement (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- A-7-23 Information Storing and Disclosure Scheme for User Privacy Protection in Ubiquitous Services(A-7. 情報セキュリティ, 基礎・境界)
- B-6-57 Collecting and distributing context for a ubiquitous service
- B-7-9 Context distribution network for ubiquitous services
- B-11-5 Subjective Assessment of Service Transfer
- B-7-72 SIP-based Message Protocol for Service Transfer across Terminals
- B-7-71 System architecture of the seamless service environment platform
- M-43 Service state description for seamless service environment
- Communication Complexity of Perfect ZKIP for a Promise Problem (Special Section on Cryptography and Information Security)
- Information Theoretic Approach to Privacy for Multi-party protocols (Special Section on Cryptography and Information Security)
- ICONE11-36528 DEVELOPMENT OF ADVANCED CONCEPT FOR SHORTENING CONSTRUCTION PERIOD OF ABWR PLANT (PART2)
- Towards Secure and Fast Hash Functions (Special Section on Cryptography and Information Security)
- Towards Secure and Fast Hash Functions
- Highly Nonlinear Vector Boolean Functions (Special Section on Discrete Mathematics and Its Applications)
- Generalization of Higher Order SAC to Vector Output Boolean Functions (Special Section on Cryptography and Information Security)