-
1
-
-
84874174122
-
Future Internet: The Internet of Things architecture, possible applications and key challenges
-
Dec
-
R. Khan, S. U. Khan, R. Zaheer, and S. Khan, ‘‘Future Internet: The Internet of Things architecture, possible applications and key challenges,’’ in Proc. FIT, Dec. 2012, pp. 257–260.
-
(2012)
Proc. FIT
, pp. 257-260
-
-
Khan, R.1
Khan, S.U.2
Zaheer, R.3
Khan, S.4
-
2
-
-
77956877124
-
The Internet of Things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, ‘‘The Internet of Things: A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
84899725808
-
The Internet of Things meets cloud computing [standards corner]
-
Apr
-
W. Lumpkins, ‘‘The Internet of Things meets cloud computing [standards corner],’’ IEEE Consum. Electron. Mag., vol. 2, no. 2, pp. 47–51, Apr. 2013.
-
(2013)
IEEE Consum. Electron. Mag.
, vol.2
, Issue.2
, pp. 47-51
-
-
Lumpkins, W.1
-
4
-
-
84962060491
-
Principles for engineering IoT cloud systems
-
Mar./Apr
-
H.-L. Truong and S. Dustdar, ‘‘Principles for engineering IoT cloud systems,’’ IEEE Cloud Comput., vol. 2, no. 2, pp. 68–76, Mar./Apr. 2015.
-
(2015)
IEEE Cloud Comput
, vol.2
, Issue.2
, pp. 68-76
-
-
Truong, H.-L.1
Dustdar, S.2
-
5
-
-
84913546410
-
Computational networks: Challenging traditional program management
-
Nov
-
G. Hurlburt, I. Bojanova, and R. Berezdivin, ‘‘Computational networks: Challenging traditional program management,’’ IT Prof., vol. 16, no. 6, pp. 66–69, Nov. 2014.
-
(2014)
IT Prof
, vol.16
, Issue.6
, pp. 66-69
-
-
Hurlburt, G.1
Bojanova, I.2
Berezdivin, R.3
-
6
-
-
84906841638
-
An information framework for creating a smart city through Internet of Things
-
Apr
-
J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, ‘‘An information framework for creating a smart city through Internet of Things,’’ IEEE Internet Things J., vol. 1, no. 2, pp. 112–121, Apr. 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.2
, pp. 112-121
-
-
Jin, J.1
Gubbi, J.2
Marusic, S.3
Palaniswami, M.4
-
7
-
-
84894668409
-
Context aware computing for the Internet of Things: A survey
-
1st Quart
-
C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ‘‘Context aware computing for the Internet of Things: A survey,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
9
-
-
84902152743
-
Surveillance video: The biggest big data
-
Feb
-
T. Huang, ‘‘Surveillance video: The biggest big data,’’ Computing Now, vol. 7, no. 2, pp. 82–91, Feb. 2014.
-
(2014)
Computing Now
, vol.7
, Issue.2
, pp. 82-91
-
-
Huang, T.1
-
10
-
-
0033640753
-
Looking at people: Sensing for ubiquitous and wearable computing
-
Jan
-
A. Pentland, ‘‘Looking at people: Sensing for ubiquitous and wearable computing,’’ IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 1, pp. 107–119, Jan. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, Issue.1
, pp. 107-119
-
-
Pentland, A.1
-
11
-
-
84925880386
-
Exploiting mobile crowd-sourcing for pervasive cloud services: Challenges and solutions
-
Mar
-
J. Ren, Y. Zhang, K. Zhang, and X. Shen, ‘‘Exploiting mobile crowd-sourcing for pervasive cloud services: Challenges and solutions,’’ IEEE Commun. Mag., vol. 53, no. 3, pp. 98–105, Mar. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.3
, pp. 98-105
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Shen, X.4
-
13
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
Oct./Dec
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, ‘‘The case for VM-based cloudlets in mobile computing,’’ IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, Oct./Dec. 2009.
-
(2009)
IEEE Pervasive Comput
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
14
-
-
84925450955
-
-
Cham, Switzerland: Springer
-
F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, Fog Computing: A Platform for Internet of Things and Analytics (Studies in Computational Intelligence in Big Data and Internet of Things: A Roadmap for Smart Environments), vol. 546. Cham, Switzerland: Springer, 2014, pp. 169–186.
-
(2014)
Fog Computing: A Platform for Internet of Things and Analytics (Studies in Computational Intelligence in Big Data and Internet of Things: A Roadmap for Smart Environments)
, vol.546
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
15
-
-
81355138520
-
SPITFIRE: Toward a semantic Web of things
-
Nov
-
D. Pfisterer et al., ‘‘SPITFIRE: Toward a semantic Web of things,’’ IEEE Commun. Mag., vol. 49, no. 11, pp. 40–48, Nov. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.11
, pp. 40-48
-
-
Pfisterer, D.1
-
17
-
-
30344440798
-
Prototypes and paratypes: Designing mobile and ubiquitous computing applications
-
Oct
-
G. D. Abowd et al., ‘‘Prototypes and paratypes: Designing mobile and ubiquitous computing applications,’’ IEEE Pervasive Comput., vol. 4, no. 4, pp. 67–73, Oct. 2005.
-
(2005)
IEEE Pervasive Comput
, vol.4
, Issue.4
, pp. 67-73
-
-
Abowd, G.D.1
-
18
-
-
0038032339
-
Issues and challenges in ubiquitous computing: Introduction
-
Dec
-
K. Lyytinen and Y. Yoo, ‘‘Issues and challenges in ubiquitous computing: Introduction,’’ Commun. ACM, vol. 45, no. 12, pp. 62–65, Dec. 2002.
-
(2002)
Commun. ACM
, vol.45
, Issue.12
, pp. 62-65
-
-
Lyytinen, K.1
Yoo, Y.2
-
19
-
-
84864303136
-
Cloudlets: Bringing the cloud to the mobile user
-
T. Verbelen, P. Simoens, F. De Turck, and B. Dhoedt, ‘‘Cloudlets: Bringing the cloud to the mobile user,’’ in Proc. MCS, 2012, pp. 29–36.
-
(2012)
Proc. MCS
, pp. 29-36
-
-
Verbelen, T.1
Simoens, P.2
De Turck, F.3
Dhoedt, B.4
-
20
-
-
84897768409
-
Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems
-
Jun
-
L. Gkatzikis and I. Koutsopoulos, ‘‘Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems,’’ IEEE Wireless Commun., vol. 20, no. 3, pp. 24–32, Jun. 2013.
-
(2013)
IEEE Wireless Commun
, vol.20
, Issue.3
, pp. 24-32
-
-
Gkatzikis, L.1
Koutsopoulos, I.2
-
21
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its role in the Internet of Things,’’ in Proc. MCC, 2012, pp. 13–16.
-
(2012)
Proc. MCC
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
24
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
Oct
-
L. M. Vaquero and L. Rodero-Merino, ‘‘Finding your way in the fog: Towards a comprehensive definition of fog computing,’’ ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27–32, Oct. 2014.
-
(2014)
ACM SIGCOMM Comput. Commun. Rev.
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
25
-
-
84875870920
-
Performance-driven load balancing with a primary-backup approach for computational grids with low communication cost and replication cost
-
May
-
J. Balasangameshwara and N. Raju, ‘‘Performance-driven load balancing with a primary-backup approach for computational grids with low communication cost and replication cost,’’ IEEE Trans. Comput., vol. 62, no. 5, pp. 990–1003, May 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.5
, pp. 990-1003
-
-
Balasangameshwara, J.1
Raju, N.2
-
26
-
-
84941286216
-
Policy-driven security management for fog computing: Preliminary framework and a case study
-
Aug
-
C. Dsouza, G.-J. Ahn, and M. Taguinod, ‘‘Policy-driven security management for fog computing: Preliminary framework and a case study,’’ in Proc. IRI, Aug. 2014, pp. 16–23.
-
(2014)
Proc. IRI
, pp. 16-23
-
-
Dsouza, C.1
Ahn, G.-J.2
Taguinod, M.3
-
28
-
-
85009710498
-
-
C. Babcock. (2014). 9 Worst Cloud Security Threats. [Online]. Available: http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085n?pagenumber=1
-
(2014)
9 Worst Cloud Security Threats
-
-
Babcock, C.1
-
29
-
-
84912130127
-
The fog computing paradigm: Scenarios and security issues
-
Sep
-
I. Stojmenovic and S. Wen, ‘‘The fog computing paradigm: Scenarios and security issues,’’ in Proc. FedCSIS, Sep. 2014, pp. 1–8.
-
(2014)
Proc. FedCSIS
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
30
-
-
0033357103
-
Securing ad hoc networks
-
Nov
-
L. Zhou and Z. J. Haas, ‘‘Securing ad hoc networks,’’ IEEE Netw., vol. 13, no. 6, pp. 24–30, Nov. 1999.
-
(1999)
IEEE Netw
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
31
-
-
77958084781
-
Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]
-
Oct
-
A. Wasef, R. Lu, X. Lin, and X. Shen, ‘‘Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks],’’ IEEE Wireless Commun., vol. 17, no. 5, pp. 22–28, Oct. 2010.
-
(2010)
IEEE Wireless Commun
, vol.17
, Issue.5
, pp. 22-28
-
-
Wasef, A.1
Lu, R.2
Lin, X.3
Shen, X.4
-
32
-
-
77957929278
-
Securing cluster-based ad hoc networks with distributed authorities
-
Oct
-
L.-C. Li and R.-S. Liu, ‘‘Securing cluster-based ad hoc networks with distributed authorities,’’ IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3072–3081, Oct. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.10
, pp. 3072-3081
-
-
Li, L.-C.1
Liu, R.-S.2
-
33
-
-
84874876498
-
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
-
Apr
-
R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, ‘‘A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation,’’ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 4, pp. 629–641, Apr. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.4
, pp. 629-641
-
-
Lacuesta, R.1
Lloret, J.2
Garcia, M.3
Peñalver, L.4
-
34
-
-
84963853667
-
Privacy preserving deep computation model on cloud for big data feature learning
-
May
-
Q. Zhang, L. T. Yang, and Z. Chen, ‘‘Privacy preserving deep computation model on cloud for big data feature learning,’’ IEEE Trans. Comput., vol. 65, no. 5, pp. 1351–1362, May 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.5
, pp. 1351-1362
-
-
Zhang, Q.1
Yang, L.T.2
Chen, Z.3
-
35
-
-
84993949465
-
PPHOCFS: Privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data
-
Q. Zhang, H. Zhong, L. T. Yang, F. Bu, and Z. Chen, ‘‘PPHOCFS: Privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data,’’ ACM Trans. Multimedia Comput., Commun., Appl., vol. 12, no. 4s, p. 66:1–66:15, 2016.
-
(2016)
ACM Trans. Multimedia Comput., Commun., Appl.
, vol.12
, Issue.4 s
-
-
Zhang, Q.1
Zhong, H.2
Yang, L.T.3
Bu, F.4
Chen, Z.5
|