|
[1].P. J Brown, J. D. Bovey, and X. Chen, “Context-Aware Applications: from the Laboratory to the Marketplace,” IEEE Personal Communications, pp. 58-64, 1997. [2].H. Chao, “The non-specific intelligent guided-view system based on RFID technology,” Proceedings of 19th International Conference on Advanced Information Networking and Applications, 2005. (AINA 2005.) ,Volume 2, pp.580 – 585, March 2005. [3].J. W. Chen, “A Ubiquitous Information Technology Framework Using RFID to Support Students’ Learning,” Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, pp. 337 – 342, 2005. [4].Y. S. Chen, T. C. Kao, and J. P. Sheu, “A Mobile Butterfly-Watching Learning System for Supporting Independent Learning,” Proceedings of IEEE Workshop. on Wireless and Mobile Technologies in Education, Taiwan, pp.11-18, 2004. [5].Z. Cheng, S. Sun, M. Kansen, T. J. Huang, and A. G. He, “A personalized ubiquitous education support environment by comparing learning instructional requirement with learner's behavior,” Proceedings of the 19th IEEE International Conference on Advanced Information Networking and Applications, pp.567 – 573, 2005. [6].C. Cortez, M. Nussbaum, X. Lopezw, P. Rodrguze, R. Santelices, R. Rosasw, and V. Marianovz, “Teachers' Support with Ad-hoc Collaborative Networks,” Journal of Computer Assisted Learning, pp. 171 – 180, May 2005. [7].N. Davies, K. Mitchell, K. Cheverest, and G. Blair, “Developing a Context Sensitive Tourist Guide”, First Workshop on Human Computer Interaction with Mobile Devices, GIST Technical Report , 1998. [8].M. Derntl and K. A. Hummel, “Modeling context-aware e-learning scenarios,” Proceedings of The 3rd IEEE International Conference. on Pervasive Computing and Communications Workshops, pp. 337 – 342, 2005. [9].D. Garlan and D. P. Siewiorek, “Project aura: toward distraction-free pervasive computing,” IEEE Pervasive Computing, pp. 22 – 31, April–June. 2002 [10].S. Jean, “Ubiquitous computing goes mobile,” Proceedings of ACM SIGMOBILE Mobile Computing and Communications Review, Volume 5, Issue 3, pp. 32-38 July 2001. [11].J. Landt, “The history of RFID,” IEEE Potentials , pp. 8–11, 2005. [12].J. Lee, N. L. Hong, and N. L. Ling, An analysis of students’ preparation for virtual learning environment, Internet and Higher Education, pp. 231-242, 2002. [13].L. D. Chou, C. C. Lee, M. Y. Lee, and C. Y. Chang, “A tour guide system for mobile learning in museums,” Proceedings of the 2nd IEEE International 2004 Wireless and Mobile Technologies in Education Workshop, pp.195 – 196 2004. [14].S. Long, “Rapid Prototyping of Mobile Context-aware Applications: The Cyberguide Case Study.” Proceedings of 2nd ACM International Conference on Mobile Computing and Networking (MobiCom'96), November 1996. [15].P. Phillips,”Smart Environment Research,” Technical Report, Computer Science Department, Lancaster University. [16].S. Rangaswamy, R. Willenborg, and W. Qiao, “Writing a Performance Monitoring Tool UsingWebSphere Application Server’s Performance Monitoring Infrastructure API,” IBM WebSphere Performance, IBM WebSphere Developer Technical Journal, February 2002. [17].F. Reynolds, C. Woodrow, H. Ohto, and G. Klyne, “Composite Capability/Preference Profiles (CC/PP): Structure and vocabularies,” W3C Working Draft , 2001. [18].D. Salber, A.K. Dey, and G.D. Abowd, “The Context Toolkit: Aiding the Development of Context-Enabled Applications,” Proceedings of CHI'99, pp. 434 – 441, 1999. [19].M. Satyanarayanan, “Fundamental Challenges in Mobile Computing,” Proceedings of 15th ACM Symp. Principles of Dist, pp. 1-7, May 1996. [20].M. Satyanarayanan ,“Pervasive computing: vision and challenges” Conference on IEEE Personal Communications, pp. 10 – 17, August. 2001. [21].N. Shimizu, R. Yagiu, and M. Saito, “A study of information services based on personal belongings,” Proceedings of 19th International Conference on Advanced Information Networking and Applications, 2005.(AINA 2005.), Volume 2, pp. 523 – 528, March 2005. [22].G. Stefansson, “The tutor-web: An educational system for classroom presentation, evaluation, and self-study,” Computers & Education, pp. 315 – 343, 2004. [23].T. H. Tan and T. Y. Liu, “The Mobile-based Interactive Environment (MOBILE) and A Case Study for Assisting Elementary School English Learning,” Proceedings of IEEE International Conference on Advanced Learning Techniques, Taiwan, pp. 530–534, 2004. [24].R. Want,“An Overview of the PARCTAB Ubiquitous Computing Environment.” IEEE Personal Communications, Volume 2 , pp. 28-43, December 1995. [25].M. Weiser, “The Computer for the Twenty-First Century, Scientific American,” pp. 94-104, March 1991. [26].M. Weiser, “Some Computer Science Issues in Ubiquitous Computing.” Communications of the ACM, Volume. 36, pp. 74 – 84, July 1993. [27].R. Weinstein, “RFID: a technical overview and its application to the enterprise” IEEE IT Professional Volume 7, Issue 3, pp. 27 – 33, May-June 2005. [28].G. Wijnalda, S. Pauws,F. Vignoli, and H. Stuckenschmidt, “A personalized music system for motivation in sport performance.” Conference on IEEE Pervasive Computing, Volume 4, Issue 3, pp. 26 – 32, July-September 2005. [29].V. Yanna, E. Marc, D. Martin, and K. Jiri, ”From Buddyspace to CitiTag Large-scale Symbolic Presence for Community Building and Spontaneous Play,” Proceedings of the 2005 ACM symposium on Applied computing (SAC '05), pp. 1600 – 1606, March 2005.
|