A Two-stage Composition Method forDanger-aware Services based on Context Similarity
JunboWang, ZixueCheng,Lei Jing, KaoruOta, and MizuoKansen.(2010).
IEICE Transactions on Information and Systems, Vol.E93-D, No.6,pp.1521-1539
JunboWang, ZixueCheng,Lei Jing, KaoruOta, and MizuoKansen.(2010).
IEICE Transactions on Information and Systems, Vol.E93-D, No.6,pp.1521-1539
KaoruOta, MianxiongDong, JunboWang, HikaruNihei,Lei Jing, Mizuo Kansen, and Zixue Cheng.(2010).
Journal of Japan e-Learning Association (JeLA), Vol. 10, pp.81-92KaoruOta, MianxiongDong, JunboWang, HikaruNihei,Lei Jing, Mizuo Kansen, and Zixue Cheng.(2010).
Junbo Wang, Zixue Cheng, Kaoru Ota, Lei Jing, and Mizuo Kansen. (2009).
2009 Joint Conferences on Pervasive Computing (JCPC), pp.119-124, Taiwan, Dec., 2009.
Kaoru Ota, Hikaru Nihei, Junbo Wang, Lei Jing, Mizuo Kansen, and Zixue Cheng. (2009).
2009 Joint Conferences on Pervasive Computing (JCPC) , pp.57-64, Taiwan, Dec., 2009.
Junbo Wang, Kaoru Ota, Lei Jing, Mizuo Kansen, and Zixue Cheng. (2009).
the 1st International Workshop on Aware Computing (IWAC2009), pp. 658–664, Aizu-Wakamatsu, Japan, Sep., 2009.
Xianzhi Ye, Lei Jing and Zixue Cheng. (2008).
in 8th IEEE International Conference on Computer and Information Technology (CIT08), pp. 494-500, Sydney, Australia, Jul., 2008.
Lei Jing, Xianzhi Ye, Zixue Cheng. (2008).
1stInternational Conference on Ubiquitous Medias Computing(UbiMedia2008),pp.314-319,Lanzhou, China, Jul.,2008
Lei Jing,ZixueCheng, and TongjunHuang. (2007).
5th International Workshop on Databases in Networked Information Systems (DNIS 2007),pp.309–321,Aizu-Wakamatsu, Japan,Oct.,2007
Lei Jing, Zixue Cheng. (2007).
2007IEEEInternational Symposium on Ubisafe Computing (Ubisafe2007), pp.435-439,Niagara Falls, Canada, May., 2007
QiuHan,Lei Jing, TongjunHuang, and ZixueCheng. (2007).
the Fourth International Conference on IT&Application(ICITA2007), pp.442-447,Harbin, China, Jan., 2007