-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: a survey", Elsevier Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Elsevier Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
0001853125
-
The computer for the 21st century
-
M. Weiser, "The computer for the 21st century", Scientific american, vol. 265, no. 3, pp. 94-104, 1991.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
3
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
D. E. Denning and P. F. MacDoran, "Location-based authentication: Grounding cyberspace for better security", Computer Fraud & Security, vol. 1996, no. 2, pp. 12-16, 1996.
-
(1996)
Computer Fraud & Security
, vol.1996
, Issue.2
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
4
-
-
84893123973
-
-
T. Garcia-Valverde, A. Garcia-Sola, H. Hagras, J. Dooley, V. Callaghan, and J. Botia, "A fuzzy logic based system for indoor localisation using wifi in ambient intelligent environments", 2012.
-
(2012)
A Fuzzy Logic Based System for Indoor Localisation Using wifi in Ambient Intelligent Environments
-
-
Garcia-Valverde, T.1
Garcia-Sola, A.2
Hagras, H.3
Dooley, J.4
Callaghan, V.5
Botia, J.6
-
5
-
-
5544326540
-
Landmarc: Indoor location sensing using active rfid
-
L. Ni, Y. Liu, Y. Lau, and A. Patil, "Landmarc: indoor location sensing using active rfid", Wireless networks, vol. 10, no. 6, pp. 701-710, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.6
, pp. 701-710
-
-
Ni, L.1
Liu, Y.2
Lau, Y.3
Patil, A.4
-
6
-
-
84886928358
-
Distributed capability-based access control for the internet of things
-
J. Hernández-Ramos, A. Jara, L. Marín, and A. Skarmeta, "Distributed Capability-based Access Control for the Internet of Things", Journal of Internet Services and Information Security (JISIS), vol. 3, no. 3/4, 2013.
-
(2013)
Journal of Internet Services and Information Security (JISIS)
, vol.3
, Issue.3-4
-
-
Hernández-Ramos, J.1
Jara, A.2
Marín, L.3
Skarmeta, A.4
-
7
-
-
33750318741
-
Proximity based access control in smart-emergency departments
-
IEEE
-
S. K. Gupta, T. Mukheriee, K. Venkatasubramanian, and T. Taylor, "Proximity based access control in smart-emergency departments", in Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on. IEEE, 2006, pp. 5-pp.
-
(2006)
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on
, pp. 5
-
-
Gupta, S.K.1
Mukheriee, T.2
Venkatasubramanian, K.3
Taylor, T.4
-
8
-
-
62249144306
-
A statistical indoor localization method for supporting location-based access control
-
C. Gao, Z. Yu, Y. Wei, S. Russell, and Y. Guan, "A statistical indoor localization method for supporting location-based access control", Mobile Networks and Applications, vol. 14, no. 2, pp. 253-263, 2009.
-
(2009)
Mobile Networks and Applications
, vol.14
, Issue.2
, pp. 253-263
-
-
Gao, C.1
Yu, Z.2
Wei, Y.3
Russell, S.4
Guan, Y.5
-
9
-
-
68149091583
-
Lock: A highly accurate, easyto-use location-based access control system
-
Springer
-
Y. Wang, J. Zhao, and T. Fukushima, "Lock: A highly accurate, easyto-use location-based access control system", in Location and Context Awareness. Springer, 2009, pp. 254-270.
-
(2009)
Location and Context Awareness
, pp. 254-270
-
-
Wang, Y.1
Zhao, J.2
Fukushima, T.3
-
10
-
-
80053159537
-
An indoor location-based access control system by rfid
-
IEEE
-
Z. Xin-fang, F. Ming-wei, and W. Jun-jun, "An indoor location-based access control system by rfid", in Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2011 IEEE International Conference on. IEEE, 2011, pp. 43-47.
-
(2011)
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2011 IEEE International Conference on
, pp. 43-47
-
-
Xin-fang, Z.1
Ming-wei, F.2
Jun-jun, W.3
-
11
-
-
10644241802
-
Location-aware access to hospital information and services
-
M. D. Rodriguez, J. Favela, E. A. Martínez, and M. A. Muñoz, "Location-aware access to hospital information and services", Information Technology in Biomedicine, IEEE Transactions on, vol. 8, no. 4, pp. 448-455, 2004.
-
(2004)
Information Technology in Biomedicine, IEEE Transactions on
, vol.8
, Issue.4
, pp. 448-455
-
-
Rodriguez, M.D.1
Favela, J.2
Martínez, E.A.3
Muñoz, M.A.4
-
12
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
D. Ferraiolo, J. Cugini, and R. Kuhn, "Role-based access control (RBAC): Features and motivations", in Proc. of 11th Annual Computer Security Application Conference, 1995, pp. 241-48.
-
(1995)
Proc. of 11th Annual Computer Security Application Conference
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
14
-
-
29244440448
-
Design of a wireless assisted pedestrian dead reckoning system-the navmote experience
-
L. Fang, P. J. Antsaklis, L. A. Montestruque, M. B. McMickell, M. Lemmon, Y. Sun, H. Fang, I. Koutroulis, M. Haenggi, M. Xie et al., "Design of a wireless assisted pedestrian dead reckoning system-the navmote experience", Instrumentation and Measurement, IEEE Transactions on, vol. 54, no. 6, pp. 2342-2358, 2005.
-
(2005)
Instrumentation and Measurement, IEEE Transactions on
, vol.54
, Issue.6
, pp. 2342-2358
-
-
Fang, L.1
Antsaklis, P.J.2
Montestruque, L.A.3
McMickell, M.B.4
Lemmon, M.5
Sun, Y.6
Fang, H.7
Koutroulis, I.8
Haenggi, M.9
Xie, M.10
-
15
-
-
35048887481
-
Flow clustering using machine learning techniques
-
Springer
-
A. McGregor, M. Hall, P. Lorier, and J. Brunskill, "Flow clustering using machine learning techniques", in Passive and Active Network Measurement. Springer, 2004, pp. 205-214.
-
(2004)
Passive and Active Network Measurement
, pp. 205-214
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
16
-
-
10444259853
-
Creating diversity in ensembles using artificial data
-
P. Melville and R. J. Mooney, "Creating diversity in ensembles using artificial data", Information Fusion, vol. 6, no. 1, pp. 99-111, 2005.
-
(2005)
Information Fusion
, vol.6
, Issue.1
, pp. 99-111
-
-
Melville, P.1
Mooney, R.J.2
-
19
-
-
84901244508
-
Constrained application protocol (CoAP)
-
draft-ietf-core-coap-18, June
-
Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP)", Constrained Resources (CoRE) Working group, Internet Engineering Task Force (IETF), work in progress, draft-ietf-core-coap-18, June 2013, http://tools.ietf.org/html/draft-ietf-core-coap-18.
-
(2013)
Constrained Resources (CoRE) Working Group, Internet Engineering Task Force (IETF), Work in Progress
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
20
-
-
77950570266
-
Mobile phones as 3-dof controllers: A comparative study
-
IEEE
-
N. Katzakis and M. Hori, "Mobile phones as 3-dof controllers: A comparative study", in Dependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on. IEEE, 2009, pp. 345-349.
-
(2009)
Dependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on
, pp. 345-349
-
-
Katzakis, N.1
Hori, M.2
|