-
1
-
-
85032779250
-
Secure sensor information management and mining
-
2-s2.0-2542538244 10.1109/MSP.2004.1296538
-
Thuraisingham B., Secure sensor information management and mining. IEEE Signal Processing Magazine 2004 21 3 14 19 2-s2.0-2542538244 10.1109/MSP.2004.1296538
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.3
, pp. 14-19
-
-
Thuraisingham, B.1
-
2
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
2-s2.0-63649117166 10.1016/j.future.2008.12.001
-
Buyya R., Yeo C. S., Venugopal S., Broberg J., Brandic I., Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 2009 25 6 599 616 2-s2.0-63649117166 10.1016/j.future.2008.12.001
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
8
-
-
67349127129
-
Challenging issues in visual sensor networks
-
2-s2.0-67349127129 10.1109/MWC.2009.4907559
-
Charfi Y., Wakamiya N., Murata M., Challenging issues in visual sensor networks. IEEE Wireless Communications 2009 16 2 44 49 2-s2.0-67349127129 10.1109/MWC.2009.4907559
-
(2009)
IEEE Wireless Communications
, vol.16
, Issue.2
, pp. 44-49
-
-
Charfi, Y.1
Wakamiya, N.2
Murata, M.3
-
9
-
-
77957126868
-
Wireless multimedia sensor networks: Current trends and future directions
-
2-s2.0-77957126868 10.3390/s100706662
-
Almalkawi I. T., Zapata M. G., al-Karaki J. N., Morillo-Pozo J., Wireless multimedia sensor networks: current trends and future directions. Sensors 2010 10 7 6662 6717 2-s2.0-77957126868 10.3390/s100706662
-
(2010)
Sensors
, vol.10
, Issue.7
, pp. 6662-6717
-
-
Almalkawi, I.T.1
Zapata, M.G.2
Al-Karaki, J.N.3
Morillo-Pozo, J.4
-
11
-
-
33746084846
-
Reliable data delivery in wireless sensor networks: An energy-efficient, cluster-based approach
-
Lecture Notes in Computer Science 10.1007/11759355-35
-
Li S., Zhu P., Liao X., Fu Q., Reliable data delivery in wireless sensor networks: an energy-efficient, cluster-based approach. 4003 Proceedings of International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN '06) 2006 384 395 Lecture Notes in Computer Science 10.1007/11759355-35
-
(2006)
Proceedings of International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN '06)
, vol.4003
, pp. 384-395
-
-
Li, S.1
Zhu, P.2
Liao, X.3
Fu, Q.4
-
12
-
-
84884245144
-
Reliable data delivery in wireless sensor networks: An energy-efficient, cluster-based approach
-
Lecture Notes in Computer Science 10.1007/11759355-35
-
Cheng W., Liao X., Shen C., Li S., Peng S., Reliable data delivery in wireless sensor networks: an energy-efficient, cluster-based approach. 4138 Proceedings of International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN '06) 2006 478 489 Lecture Notes in Computer Science 10.1007/11759355-35
-
(2006)
Proceedings of International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN '06)
, vol.4138
, pp. 478-489
-
-
Cheng, W.1
Liao, X.2
Shen, C.3
Li, S.4
Peng, S.5
-
13
-
-
67349127129
-
Challenging issues in visual sensor networks
-
2-s2.0-67349127129 10.1109/MWC.2009.4907559
-
Charfi Y., Wakamiya N., Murata M., Challenging issues in visual sensor networks. IEEE Wireless Communications 2009 16 2 44 49 2-s2.0-67349127129 10.1109/MWC.2009.4907559
-
(2009)
IEEE Wireless Communications
, vol.16
, Issue.2
, pp. 44-49
-
-
Charfi, Y.1
Wakamiya, N.2
Murata, M.3
-
15
-
-
84855303509
-
A secured health care application architecture for cyber-physical systems
-
2-s2.0-84855303509
-
Wang J., Abid H., Lee S., Shu L., Xia F., A secured health care application architecture for cyber-physical systems. Control Engineering and Applied Informatics 2011 13 3 101 108 2-s2.0-84855303509
-
(2011)
Control Engineering and Applied Informatics
, vol.13
, Issue.3
, pp. 101-108
-
-
Wang, J.1
Abid, H.2
Lee, S.3
Shu, L.4
Xia, F.5
-
16
-
-
77954879049
-
Cloud computing: A perspective study
-
2-s2.0-77954879049 10.1007/s00354-008-0081-5
-
Wang L., Von Laszewski G., Younge A., He X., Kunze M., Tao J., Fu C., Cloud computing: a perspective study. New Generation Computing 2010 28 2 137 146 2-s2.0-77954879049 10.1007/s00354-008-0081-5
-
(2010)
New Generation Computing
, vol.28
, Issue.2
, pp. 137-146
-
-
Wang, L.1
Von Laszewski, G.2
Younge, A.3
He, X.4
Kunze, M.5
Tao, J.6
Fu, C.7
-
17
-
-
78649899214
-
The characteristics of cloud computing
-
September 2-s2.0-78649899214 10.1109/ICPPW.2010.45
-
Gong C., Liu J., Zhang Q., Chen H., Gong Z., The characteristics of cloud computing. Proceedings of the 39th International Conference on Parallel Processing Workshops (ICPPW '10) September 2010 275 279 2-s2.0-78649899214 10.1109/ICPPW.2010.45
-
(2010)
Proceedings of the 39th International Conference on Parallel Processing Workshops (ICPPW '10)
, pp. 275-279
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
21
-
-
62949194451
-
High-performance hypervisor architectures: Virtualization in HPC systems
-
Gavrilovska A., Kumar S., Raj K., Gupta V., Nathuji R., Niranjan A., Saraiya P., High-performance hypervisor architectures: virtualization in HPC systems. Proceedings of the 1st Workshop on System-Level Virtualization for High Performance Computing 2007
-
(2007)
Proceedings of the 1st Workshop on System-Level Virtualization for High Performance Computing
-
-
Gavrilovska, A.1
Kumar, S.2
Raj, K.3
Gupta, V.4
Nathuji, R.5
Niranjan, A.6
Saraiya, P.7
-
27
-
-
84886768467
-
High performance cloud computing
-
2-s2.0-84859085442 10.1016/j.future.2012.03.011
-
Mauch V., Kunze M., Hillenbrand M., High performance cloud computing. Future Generation Computer Systems 2012 29 6 1319 1644 2-s2.0-84859085442 10.1016/j.future.2012.03.011
-
(2012)
Future Generation Computer Systems
, vol.29
, Issue.6
, pp. 1319-1644
-
-
Mauch, V.1
Kunze, M.2
Hillenbrand, M.3
-
32
-
-
17444406680
-
A generalized temporal role-based access control model
-
2-s2.0-17444406680 10.1109/TKDE.2005.1
-
Joshi J. B. D., Bertino E., Latif U., Ghafoor A., A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering 2005 17 1 4 23 2-s2.0-17444406680 10.1109/TKDE.2005.1
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
33
-
-
0003371437
-
Extensible markup language (XML)
-
Bray T., DeRose S. J., Extensible markup language (XML). World Wide Web Journal 1997 2 4 27 66
-
(1997)
World Wide Web Journal
, vol.2
, Issue.4
, pp. 27-66
-
-
Bray, T.1
Derose, S.J.2
-
36
-
-
79952542985
-
A scheduling strategy on load balancing of virtual machine resources in cloud computing environment
-
December 2010 2-s2.0-79952542985 10.1109/PAAP.2010.65
-
Hu J., Gu J., Sun G., Zhao T., A scheduling strategy on load balancing of virtual machine resources in cloud computing environment. Proceedings of the 3rd International Symposium on Parallel Architectures, Algorithms and Programming (PAAP '10) December 2010 89 96 2-s2.0-79952542985 10.1109/PAAP.2010.65
-
Proceedings of the 3rd International Symposium on Parallel Architectures, Algorithms and Programming (PAAP '10)
, pp. 89-96
-
-
Hu, J.1
Gu, J.2
Sun, G.3
Zhao, T.4
-
40
-
-
26644456645
-
-
TinyOS Tutorial. http://www.tinyos.net/tinyos-1.x/doc/tutorial/
-
TinyOS Tutorial
-
-
-
41
-
-
0041481337
-
-
February 2004
-
Web Services Architecture, W3C. February 2004, http://www.w3.org/TR/2004/ NOTE-ws-arch-20040211/wsa.pdf
-
Web Services Architecture, W3C
-
-
-
42
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
2-s2.0-79953294892 10.1109/TPDS.2010.183
-
Wang Q., Wang C., Ren K., Lou W., Li J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 2011 22 5 847 859 2-s2.0-79953294892 10.1109/TPDS.2010.183
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
43
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
2-s2.0-79960850152 10.1109/INFCOM.2011.5935306
-
Cao N., Wang C., Li M., Ren K., Lou W., Privacy-preserving multi-keyword ranked search over encrypted cloud data. Proceedings of IEEE Conference on Computer Communications (INFOCOM '11) April 2011 829 837 2-s2.0-79960850152 10.1109/INFCOM.2011.5935306
-
(2011)
Proceedings of IEEE Conference on Computer Communications (INFOCOM '11) April
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
44
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011 34 1 1 11 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
|