-
1
-
-
80955160447
-
That "Internet of things" thing
-
Ashton K. That "Internet of things" thing. RFID Journal, 2009, 22: 97-114.
-
(2009)
RFID Journal
, vol.22
, pp. 97-114
-
-
Ashton, K.1
-
2
-
-
84870850693
-
Appendix F: the Internet of things (background)
-
SRI Consulting Business Intelligence
-
SRI Consulting Business Intelligence. Appendix F: the Internet of things (background). http://www. dni. gov/nic/PDF_GIF_confreports/disruptivetech/appendix_F. pdf.
-
-
-
-
3
-
-
5744252573
-
The Internet of things
-
Gershenfeld N, Krikorian R, Cohen D. The Internet of things. Scientific American, 2004, 291(4): 76-81.
-
(2004)
Scientific American
, vol.291
, Issue.4
, pp. 76-81
-
-
Gershenfeld, N.1
Krikorian, R.2
Cohen, D.3
-
6
-
-
78650562912
-
-
Wikipedia
-
Wikipedia. Internet of things. http://en. wikipedia. org/wiki/Internet_of_Things.
-
Internet of things
-
-
-
7
-
-
32844471136
-
An introduction to RFID technology
-
Want R. An introduction to RFID technology. IEEE Pervasive Computing, 2006, 5(1): 25-33.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
9
-
-
77956487641
-
Sailing on an ocean of 0s and 1s
-
Collins J P. Sailing on an ocean of 0s and 1s. Science, 2010, 327(5972): 1455-1456.
-
(2010)
Science
, vol.327
, Issue.5972
, pp. 1455-1456
-
-
Collins, J.P.1
-
10
-
-
77956456905
-
A guide to the day of big data
-
Nielsen M. A guide to the day of big data. Nature, 2009, 462(7274): 722-723.
-
(2009)
Nature
, vol.462
, Issue.7274
, pp. 722-723
-
-
Nielsen, M.1
-
11
-
-
84870792822
-
A deluge of data shapes a new era in computing
-
Markoff J. A deluge of data shapes a new era in computing. The New York Times, 2009.
-
(2009)
The New York Times
-
-
Markoff, J.1
-
12
-
-
77956463195
-
Visual data security and management for smart cities
-
Chen Z, Fan W, Xiong Z, Zhang P, Luo L. Visual data security and management for smart cities. Frontiers of Computer Science in China, 2010, 4(3): 386-393.
-
(2010)
Frontiers of Computer Science in China
, vol.4
, Issue.3
, pp. 386-393
-
-
Chen, Z.1
Fan, W.2
Xiong, Z.3
Zhang, P.4
Luo, L.5
-
14
-
-
84870806406
-
Reversible data hiding with context modeling, generalized expansion and boundary map
-
in Press
-
Fan W, Chen Z, Chen M, Luo L, Xiong Z. Reversible data hiding with context modeling, generalized expansion and boundary map. Multimedia Tools and Applications (in Press).
-
Multimedia Tools and Applications
-
-
Fan, W.1
Chen, Z.2
Chen, M.3
Luo, L.4
Xiong, Z.5
-
15
-
-
77249169798
-
Reversible image watermarking using interpolation technique
-
Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 187-193.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.1
, pp. 187-193
-
-
Luo, L.1
Chen, Z.2
Chen, M.3
Zeng, X.4
Xiong, Z.5
-
17
-
-
0032680807
-
Information hiding-a survey
-
Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey. Proceedings of the IEEE, 1999, 87(7): 1062-1078.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
19
-
-
77953863165
-
Sensors empower the Internet of things
-
Conner M. Sensors empower the "Internet of things". EDN, 2010, 55(10): 32-38.
-
(2010)
EDN
, vol.55
, Issue.10
, pp. 32-38
-
-
Conner, M.1
-
20
-
-
84885908258
-
-
Wikipedia
-
Wikipedia. Internet. http://en. wikipedia. org/wiki/Internet.
-
Internet
-
-
-
22
-
-
84870829281
-
The SemanticWeb
-
The SemanticWeb: An Introduction. http://infomesh. net/2001/swintro/.
-
An Introduction
-
-
-
24
-
-
84870836927
-
Radio-frequency identification
-
Wikipedia. Radio-frequency identification. http://en. wikipedia. org/wiki/Radio-frequency_identification.
-
Wikipedia
-
-
-
25
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I J, Kilian J, Leighton F T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
26
-
-
21844463487
-
Watermarking security: theory and practice
-
Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, 2005, 53(10): 3976-3987.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
|