Building the Hyperconnected Society

[1]  Geoffrey Fox,et al.  Architecture and measured characteristics of a cloud based internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).

[2]  Prem Prakash Jayaraman,et al.  Defining the Stack for Service Delivery Models and Interoperability in the Internet of Things: A Practical Case With OpenIoT-VDK , 2015, IEEE Journal on Selected Areas in Communications.

[3]  Amit P. Sheth,et al.  The SSN ontology of the W3C semantic sensor network incubator group , 2012, J. Web Semant..

[4]  Sergei P. Skorobogatov Optically Enhanced Position-Locked Power Analysis , 2006, CHES.

[5]  Alfons Kemper,et al.  StreamGlobe: adaptive query processing and optimization in streaming P2P environments , 2004, DMSN '04.

[6]  John Soldatos,et al.  Convergence of Utility Computing with the Internet-of-Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[7]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[8]  Sreerama K. Murthy,et al.  Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey , 1998, Data Mining and Knowledge Discovery.

[9]  Henrich Christopher Pöhls,et al.  On Updatable Redactable Signatures , 2014, ACNS.

[10]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[11]  Jarmo Laaksolahti,et al.  Internet of things marries social media , 2011, Mobile HCI.

[12]  Fei Tao,et al.  CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System , 2014, IEEE Transactions on Industrial Informatics.

[13]  Martin Serrano,et al.  A formal approach for the inference plane supporting integrated management tasks in the Future Internet , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.

[14]  Johannes A. Buchmann,et al.  Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey , 2015, Comput. Secur..

[15]  Carsten Bormann,et al.  6LoWPAN: The Wireless Embedded Internet , 2009 .

[16]  Tatjana Welzer,et al.  A universal system for fair non-repudiable certified e-mail without a trusted third party , 2013, Comput. Secur..

[17]  A. Sandy Munro Let's roast engineering's sacred cows , 1995 .

[18]  John Black,et al.  Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.

[19]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[20]  Xun Xu,et al.  Key Enabling Technologies , 2009 .

[21]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[22]  Frederick Reiss,et al.  TelegraphCQ: continuous dataflow processing , 2003, SIGMOD '03.

[23]  S. Dowlatshahi The role of logistics in concurrent engineering , 1996 .

[24]  Wouter Joosen,et al.  Extending sensor networks into the Cloud using Amazon Web Services , 2010, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications.

[25]  George S. Taylor,et al.  Improving smart card security using self-timed circuits , 2002, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems.

[26]  Ashish Mishra,et al.  A smart forest-fire early detection sensory system: Another approach of utilizing wireless sensor and neural networks , 2010, 2010 IEEE Sensors.

[27]  M. Declercq,et al.  A low-power CMOS super-regenerative receiver at 1 GHz , 2001, IEEE J. Solid State Circuits.

[28]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[29]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[30]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[31]  Henning Schulzrinne,et al.  The IETF Geopriv and Presence Architecture Focusing on Location Privacy , 2006 .

[32]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[33]  Ron Steinfeld,et al.  Content Extraction Signatures , 2001, ICISC.

[34]  Thomas Groß Certification and Efficient Proofs of Committed Topology Graphs , 2014, IACR Cryptol. ePrint Arch..

[35]  Anantha Chandrakasan,et al.  An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture , 2000, CHES.

[36]  S. Kotoulas,et al.  High-performance Distributed Stream Reasoning using S4 , 2011 .

[37]  Ying Xing,et al.  Scalable Distributed Stream Processing , 2003, CIDR.

[38]  Jean-Pierre Seifert,et al.  Simple photonic emission analysis of AES , 2013, Journal of Cryptographic Engineering.

[39]  Louis Goubin,et al.  A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.

[40]  Stephen Berard,et al.  Implications of Historical Trends in the Electrical Efficiency of Computing , 2011, IEEE Annals of the History of Computing.

[41]  Christian Boit,et al.  On charge sensors for FIB attack detection , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[42]  George Orwell,et al.  Nineteen eighty-four : a novel , 1997 .

[43]  Christian Hanser,et al.  On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[44]  Carsten Bormann 6LoWPAN Roadmap and Implementation Guide , 2013 .

[45]  Thomas Magedanz,et al.  Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds , 2013, 2013 10th International Conference on Information Technology: New Generations.

[46]  Thomas Groß,et al.  Signatures and Efficient Proofs on Committed Graphs and NP-Statements , 2015, Financial Cryptography.

[47]  Benedikt Heinz,et al.  Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.

[48]  Stefan Bouckaert,et al.  Future internet research and experimentation: vision and scenarios 2020 , 2013 .

[49]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[50]  Mica R. Endsley,et al.  Measurement of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[51]  Nir Friedman,et al.  Probabilistic Graphical Models - Principles and Techniques , 2009 .

[52]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[53]  Alexandros G. Fragkiadakis,et al.  Enabling reliable and secure IoT-based smart city applications , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[54]  Rajesh Vargheese,et al.  An IoT/IoE enabled architecture framework for precision on shelf availability: Enhancing proactive shopper experience , 2014, 2014 IEEE International Conference on Big Data (Big Data).

[55]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[56]  D. Luckham Event Processing for Business: Organizing the Real-Time Enterprise , 2011 .

[57]  Thomas Eiter,et al.  Linked Stream Data Processing Engines: Facts and Figures , 2012, SEMWEB.

[58]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[59]  Zoya Dyka,et al.  Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks , 2013, Wireless Networks and Security.

[60]  Clara Pizzuti,et al.  Fast Outlier Detection in High Dimensional Spaces , 2002, PKDD.

[61]  John Soldatos,et al.  Internet of Things Research on Semantic Interoperability to Address Manufacturing Challenges , 2015 .

[62]  Osmar R. Zaïane,et al.  A Nonparametric Outlier Detection for Effectively Discovering Top-N Outliers from Engineering Data , 2006, PAKDD.

[63]  Guerino Giancola,et al.  Understanding Ultra Wide Band Radio Fundamentals , 2004 .

[64]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[65]  Kerry L. Taylor,et al.  Semantics for the Internet of Things: Early Progress and Back to the Future , 2019 .

[66]  Peter Friess,et al.  Internet of Things Applications - From Research and Innovation to Market Deployment , 2014 .

[67]  David Sinreich,et al.  An architectural blueprint for autonomic computing , 2006 .

[68]  George Danezis,et al.  Introducing Traffic Analysis , 2007 .

[69]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[70]  Kecheng Liu,et al.  Big Data Architecture for Pervasive Healthcare: A Literature Review , 2015, ECIS.

[71]  Jean-Baptiste Begueret,et al.  Bandpass sampling Rx system design issues and architecture comparison for low power RF standards , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[72]  Henrich Christopher Pöhls,et al.  Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures , 2013, EuroPKI.

[73]  Tim Berners-Lee,et al.  Linked Data on the Web , 2008, LDOW.

[74]  George Pallis,et al.  Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).

[75]  Chris D. Nugent,et al.  Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services , 2014, Lecture Notes in Computer Science.

[76]  B. V. Subba Rao,et al.  The Evolution of Internet Of Things (IOT) And Its Impact on Existing Technology , 2016 .

[77]  Hoan Quoc Nguyen-Mau,et al.  Elastic and Scalable Processing of Linked Stream Data in the Cloud , 2013, SEMWEB.

[78]  Robert H. Sloan,et al.  Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.

[79]  Carl E. Rasmussen,et al.  Evaluating Predictive Uncertainty Challenge , 2005, MLCW.

[80]  W. Arden,et al.  More Than Moore White Paper , 2021, 2021 IEEE International Roadmap for Devices and Systems Outbriefs.

[81]  Andrew J. Blumberg,et al.  Verifying computations without reexecuting them , 2015, Commun. ACM.

[82]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[83]  Neil Gershenfeld,et al.  When things start to think , 1999 .

[84]  David Lachartre A 550µW inductorless bandpass quantizer in 65 nm CMOS for 1.4-to-3GHz digial RF receivers , 2011, 2011 Symposium on VLSI Circuits - Digest of Technical Papers.

[85]  Christian Wittke,et al.  Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks , 2015, IACR Cryptol. ePrint Arch..

[86]  Anand S. Rao,et al.  BDI Agents: From Theory to Practice , 1995, ICMAS.

[87]  Sergei Skorobogatov Low temperature data remanence in static RAM , 2002 .

[88]  Vermesan Ovidiu,et al.  Internet of Things Strategic Research and Innovation Agenda , 2014 .

[89]  Eamonn J. Keogh,et al.  A symbolic representation of time series, with implications for streaming algorithms , 2003, DMKD '03.

[90]  Yoshua Bengio,et al.  Scaling learning algorithms towards AI , 2007 .

[91]  Antonio Ruiz-Martínez,et al.  A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..

[92]  Jack Keating,et al.  Design to Cost/Life Cycle Cost a Way of Life , 1979 .

[93]  Jean-Pierre Seifert,et al.  Breaking and entering through the silicon , 2013, CCS.

[94]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[95]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[96]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[97]  B. Preneel,et al.  Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".

[98]  Jean Hennebert,et al.  Toward Web Enhanced Building Automation Systems , 2014, Big Data and Internet of Things.

[99]  Jan Camenisch,et al.  Electronic Identities Need Private Credentials , 2012, IEEE Security & Privacy.

[100]  Daniele Braga,et al.  An execution environment for C-SPARQL queries , 2010, EDBT '10.

[101]  Johannes Braun,et al.  Long term confidentiality: a survey , 2014, Des. Codes Cryptogr..

[102]  Payam Barnaghi,et al.  Digital Technology Adoption in the Smart Built Environment , 2015 .

[103]  Helen Rebecca Schindler,et al.  Europe's policy options for a dynamic and trustworthy development of the Internet of Things , 2013 .

[104]  Rodolfo Milito,et al.  Big and Small Data: The Fog , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.

[105]  Mohammed J. Zaki Generating non-redundant association rules , 2000, KDD '00.

[106]  Arif Sasongko,et al.  Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.

[107]  Dario Catalano,et al.  Homomorphic Signatures and Message Authentication Codes , 2014, SCN.

[108]  Gian Marco Revel,et al.  A wireless sensor network for intelligent building energy management based on multi communication standards - a case study , 2012, J. Inf. Technol. Constr..

[109]  Kevin R. Page,et al.  The SSN Ontology of the Semantic Sensor Networks Incubator Group , 2011 .

[110]  Jean-François Raymond,et al.  Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[111]  Nicolas Pasquier,et al.  Discovering Frequent Closed Itemsets for Association Rules , 1999, ICDT.

[113]  Stefan Mangard,et al.  Exploiting the Difference of Side-Channel Leakages , 2012, COSADE.

[114]  Amit P. Sheth,et al.  Physical-Cyber-Social Computing: Looking Back, Looking Forward , 2015, IEEE Internet Comput..

[115]  Johann Heyszl,et al.  Impact of localized electromagnetic field measurements on implementations of asymmetric cryptography , 2013 .

[116]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[117]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[118]  Reza Safabakhsh,et al.  TASOM: a new time adaptive self-organizing map , 2003, IEEE Trans. Syst. Man Cybern. Part B.

[119]  Alois Paulin,et al.  Towards the Foundation for Read-Write Governance of Civilizations , 2011 .

[120]  Pedro Malo,et al.  Simpler IoT Word(s) of Tomorrow, More Interoperability Challenges to Cope Today , 2013 .

[121]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[122]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[123]  A. Cavoukian Evolving FIPPs: Proactive Approaches to Privacy, Not Privacy Paternalism , 2015 .

[124]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[125]  Elisa Bertino,et al.  Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.

[126]  Alessandro Bassi,et al.  Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model , 2013 .

[127]  G. Rebitzera,et al.  Life cycle assessment Part 1 : Framework , goal and scope definition , inventory analysis , and applications , 2004 .

[128]  Alexander Pretschner,et al.  Implementing Trust in Cloud Infrastructures , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[129]  Manfred Josef Aigner,et al.  Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks , 2001, CHES.

[130]  Hubertus Feussner,et al.  Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing , 2015, 2015 12th International Conference on Information Technology - New Generations.

[131]  J. Reades,et al.  The Global Information Technology Report 2012 , 2012 .

[132]  Alexander S. Szalay,et al.  Data Management in the Worldwide Sensor Web , 2007, IEEE Pervasive Computing.

[133]  Sebastian Rudolph,et al.  EP-SPARQL: a unified language for event processing and stream reasoning , 2011, WWW.

[134]  Hugh Lacey,et al.  The Ethics Of Science And Technology , 2010 .

[135]  Marlien Herselman,et al.  Principles of Neuroempiricism and Generalization of Network Topology for Health Service Delivery , 2009 .

[136]  Srinivasan Seshan,et al.  IrisNet: an internet-scale architecture for multimedia sensors , 2005, MULTIMEDIA '05.

[137]  Maximilian Ott,et al.  OMF: a control and management framework for networking testbeds , 2010, OPSR.

[138]  Duc-Hung Le,et al.  Provisioning Software-Defined IoT Cloud Systems , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[139]  João Gama,et al.  A survey on concept drift adaptation , 2014, ACM Comput. Surv..

[140]  John G. Breslin,et al.  Integrating Social Networks and Sensor Networks , 2009 .

[141]  Jean-Sébastien Coron,et al.  Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.

[142]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[143]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[144]  Claudio Soriente,et al.  StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.

[145]  John Soldatos,et al.  Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things , 2014, Int. J. Web Grid Serv..

[146]  Thomas Villmann,et al.  How to process uncertainty in machine learning? , 2007, ESANN.

[147]  John Klein,et al.  Systems Engineering Framework for Integrated Product and Industrial Design Including Trade Study Optimization , 2012, CSER.

[148]  Jan Veira Internet of Things: Opportunities and challenges for semiconductor companies , 2015 .

[149]  Tom Heath,et al.  Linked Data: Evolving the Web into a Global Data Space , 2011, Linked Data.

[150]  Mohammed J. Zaki,et al.  Theoretical Foundations of Association Rules , 2007 .

[151]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[152]  Jean-Sébastien Coron,et al.  An Efficient Method for Random Delay Generation in Embedded Software , 2009, CHES.

[153]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[154]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[155]  Jan Craninckx,et al.  A 6.1 GS/s 52.8 mW 43 dB DR 80 MHz bandwidth 2.4 GHz RF bandpass ΔΣ ADC in 40 nm CMOS , 2010, 2010 IEEE Radio Frequency Integrated Circuits Symposium.

[156]  Alexandros G. Fragkiadakis,et al.  Lightweight and secure encryption using channel measurements , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[157]  Man Hon Wong,et al.  Mining fuzzy association rules in databases , 1998, SGMD.

[158]  Óscar Lázaro,et al.  FITMAN Future Internet Enablers for the Sending Enterprise: a FIWARE Approach & Industrial Trialing , 2015, IWEI Workshops.

[159]  Danh Le Phuoc,et al.  A Native and Adaptive Approach for Unified Processing of Linked Streams and Linked Data , 2011, SEMWEB.

[160]  Nuno Vasconcelos,et al.  Privacy preserving crowd monitoring: Counting people without people models or tracking , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[161]  M. V. Velzen,et al.  Self-organizing maps , 2007 .

[162]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[163]  Alois Paulin,et al.  Towards Self-Service Government - A Study on the Computability of Legal Eligibilities , 2013, J. Univers. Comput. Sci..