Login / Signup
Exploiting House Log of Home Network System to Derive Contexts with Past Situations.
Yuichi Watanabe
Tetsuya Masuda
Shinsuke Matsumoto
Sachio Saiki
Masahide Nakamura
Published in:
ICCASA (2014)
Keyphrases
</>
home network
real world
ubiquitous computing environments
security policies
mobile ip
information systems
end users
response time
distributed systems