-
1
-
-
84857508468
-
Closed benchmarks for network community structure characterization
-
R. Aldecoa, and I. Marín, "Closed Benchmarks for Network Community Structure Characterization," Physical Review E, vol. 85, no. 2, 2012, pp. 026109-1 - 026109-8.
-
(2012)
Physical Review E.
, vol.85
, Issue.2
, pp. 0261091-0261098
-
-
Aldecoa, R.1
Marín, I.2
-
2
-
-
77956877124
-
The internet of things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey," Computer Networks, vol. 54, no. 15, Oct. 2010, pp. 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
82155166351
-
SIoT: Giving a social structure to the internet of things
-
Nov
-
L. Atzori, A. Iera, and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," IEEE Communication Letters, vol. 15, no. 11, Nov. 2011, pp. 1193-1195.
-
(2011)
IEEE Communication Letters
, vol.15
, Issue.11
, pp. 1193-1195
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
84867693994
-
Dynamic trust management for internet of things applications
-
San Jose, California, USA, September
-
F. Bao, and I. R. Chen, "Dynamic Trust Management for Internet of Things Applications," 2012 International Workshop on Self-Aware Internet of Things, San Jose, California, USA, September 2012.
-
(2012)
2012 International Workshop on Self-Aware Internet of Things
-
-
Bao, F.1
Chen, I.R.2
-
5
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
San Francisco, CA, USA, June
-
F. Bao, and I. R. Chen, "Trust Management for the Internet of Things and Its Application to Service Composition," IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services, San Francisco, CA, USA, June 2012.
-
(2012)
IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services
-
-
Bao, F.1
Chen, I.R.2
-
6
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection," IEEE Transactions on Network and Service Management, vol. 9, no. 2, 2012, pp. 161-183.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 161-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
8
-
-
84873877605
-
Health care applications: A solution based on the internet of things
-
Barcelona, Spain, Oct
-
N. Bui, and M. Zorzi, "Health Care Applications: A Solution Based on The Internet of Things," the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, Oct. 2011, pp. 1-5.
-
(2011)
4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
, pp. 1-5
-
-
Bui, N.1
Zorzi, M.2
-
9
-
-
84866346403
-
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
-
Oct
-
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things," Computer Science and Information Systems, vol. 8, no. 4, Oct. 2011, pp. 1207-1228.
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
10
-
-
79551636196
-
Trust management for encounter-based routing in delay tolerant networks
-
Miami, Florida, USA, Dec
-
I. R. Chen, F. Bao, M. Chang, and J. H. Cho, "Trust Management for Encounter-Based Routing in Delay Tolerant Networks," IEEE Global Communications Conference, Miami, Florida, USA, Dec. 2010, pp. 1-6.
-
(2010)
IEEE Global Communications Conference
, pp. 1-6
-
-
Chen, I.R.1
Bao, F.2
Chang, M.3
Cho, J.H.4
-
11
-
-
0032121578
-
Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
-
I. R. Chen, and T. H. Hsi, "Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers," Performance Evaluation, vol. 33, no. 2, 1998, pp. 89-112.
-
(1998)
Performance Evaluation
, vol.33
, Issue.2
, pp. 89-112
-
-
Chen, I.R.1
Hsi, T.H.2
-
12
-
-
33746659142
-
Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks
-
I. R. Chen, O. Yilmaz, and I. Yen, "Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks," Wireless Personal Communications, vol. 38, no. 3, 2006, pp. 357-376.
-
(2006)
Wireless Personal Communications
, vol.38
, Issue.3
, pp. 357-376
-
-
Chen, I.R.1
Yilmaz, O.2
Yen, I.3
-
13
-
-
78449242569
-
Robot as a service in cloud computing
-
Nanjing, China, Jan
-
Y. Chen, Z. Du, and M. García-Acosta, "Robot as a Service in Cloud Computing," IEEE 5th Symp. on Service Oriented System Engineering, Nanjing, China, Jan. 2010, pp. 151-158.
-
(2010)
IEEE 5th Symp. on Service Oriented System Engineering
, pp. 151-158
-
-
Chen, Y.1
Du, Z.2
García-Acosta, M.3
-
14
-
-
0037645949
-
Dynamic quota-based admission control with sub-rating in multimedia servers
-
S. T. Cheng, C. M. Chen, and I. R. Chen, "Dynamic Quota-Based Admission Control with Sub-Rating in Multimedia Servers," Multimedia Systems, vol. 8, no. 2, 2000, pp. 83-91.
-
(2000)
Multimedia Systems
, vol.8
, Issue.2
, pp. 83-91
-
-
Cheng, S.T.1
Chen, C.M.2
Chen, I.R.3
-
15
-
-
0037350733
-
Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation
-
S. T. Cheng, C. M. Chen, and I. R. Chen, "Performance Evaluation of an Admission Control Algorithm: Dynamic Threshold with Negotiation," Performance Evaluation, vol. 52, no. 1, 2003, pp. 1-13.
-
(2003)
Performance Evaluation
, vol.52
, Issue.1
, pp. 1-13
-
-
Cheng, S.T.1
Chen, C.M.2
Chen, I.R.3
-
16
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
May
-
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," ACM Transactions on Sensor Networks, vol. 4, no. 3, May 2008, pp. 1-37.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
17
-
-
81355147383
-
A survey on facilities for experimental internet of things research
-
Nov
-
A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, "A Survey on Facilities for Experimental Internet of Things Research," IEEE Communications Magazine, vol. 49, no. 11, Nov. 2011, pp. 58-67.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.11
, pp. 58-67
-
-
Gluhak, A.1
Krco, S.2
Nati, M.3
Pfisterer, D.4
Mitton, N.5
Razafindralambo, T.6
-
18
-
-
79958007710
-
An internet of things-based personal device for diabetes therapy management in Ambient Assisted Living (AAL)
-
A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, "An Internet of Things-Based Personal Device for Diabetes Therapy Management in Ambient Assisted Living (AAL)," Personal and Ubiquitous Computing, vol. 15, no. 4, 2011, pp. 431-440.
-
(2011)
Personal and Ubiquitous Computing
, vol.15
, Issue.4
, pp. 431-440
-
-
Jara, A.J.1
Zamora, M.A.2
Skarmeta, A.F.G.3
-
19
-
-
77956055129
-
Power law and exponential decay of intercontact times between mobile devices
-
T. Karagiannis, J.-Y. Le Boudec, and M. Vojnović, "Power Law and Exponential Decay of Intercontact Times between Mobile Devices," IEEE Transactions on Mobile Computing, vol. 8, no. 10, 2007, pp. 1377-1390.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.10
, pp. 1377-1390
-
-
Karagiannis, T.1
Le Boudec, J.-Y.2
Vojnović, M.3
-
20
-
-
77953319755
-
Routing in socially selfish delay tolerant networks
-
San Diego, CA, March
-
Q. Li, S. Zhu, and G. Cao, "Routing in Socially Selfish Delay Tolerant Networks," IEEE Conference on Computer Communications, San Diego, CA, March 2010, pp. 1-9.
-
(2010)
IEEE Conference on Computer Communications
, pp. 1-9
-
-
Li, Q.1
Zhu, S.2
Cao, G.3
-
22
-
-
42149144140
-
Trust-aware recommender systems
-
Minneapolis, Minnesota, USA, Oct
-
P. Massa, and P. Avesani, "Trust-aware Recommender Systems," ACM Recommender Systems Conference, Minneapolis, Minnesota, USA, Oct. 2007.
-
(2007)
ACM Recommender Systems Conference
-
-
Massa, P.1
Avesani, P.2
-
25
-
-
79960492499
-
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things
-
July
-
W. Ren, "QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things," International Journal of Network Management, vol. 21, no. 4, July 2011, pp. 284-299.
-
(2011)
International Journal of Network Management
, vol.21
, Issue.4
, pp. 284-299
-
-
Ren, W.1
-
26
-
-
80052854156
-
Securing the internet of things
-
Sep
-
R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, Sep. 2011, pp. 51-58.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
27
-
-
4544328209
-
Admission control algorithms integrated with pricing for revenue optimization with QoS guarantees in mobile wireless networks
-
Newport Beach, USA, July
-
N. Verma, and I. R. Chen, "Admission Control Algorithms Integrated with Pricing for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks," IEEE 10th International Conference on Parallel and Distributed Systems, Newport Beach, USA, July 2004, pp. 495-502.
-
(2004)
IEEE 10th International Conference on Parallel and Distributed Systems
, pp. 495-502
-
-
Verma, N.1
Chen, I.R.2
-
28
-
-
58149488760
-
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
-
O. Yilmaz, and I. R. Chen, "Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks," Computer Communications, vol. 32, no. 2, 2009, pp. 317-323.
-
(2009)
Computer Communications
, vol.32
, Issue.2
, pp. 317-323
-
-
Yilmaz, O.1
Chen, I.R.2
-
29
-
-
33748981466
-
Building realistic mobility models from coarse-grained traces
-
Applications and Services
-
J. Yoon, B. D. Noble, M. Liu, and M. Kim, "Building Realistic Mobility Models from Coarse-Grained Traces," the 4th International Conference on Mobile Systems, Applications and Services, 2006, pp. 177-190.
-
(2006)
The 4th International Conference on Mobile Systems
, pp. 177-190
-
-
Yoon, J.1
Noble, B.D.2
Liu, M.3
Kim, M.4
-
30
-
-
79957583041
-
Multimedia traffic security architecture for the internet of things
-
May-June
-
L. Zhou, and H.-C. Chao, "Multimedia Traffic Security Architecture for the Internet of Things," IEEE Network, vol. 25, no. 3, May-June 2011, pp. 35-40.
-
(2011)
IEEE Network
, vol.25
, Issue.3
, pp. 35-40
-
-
Zhou, L.1
Chao, H.-C.2
|