Building the Hyperconnected Society
暂无分享,去创建一个
[1] Geoffrey Fox,et al. Architecture and measured characteristics of a cloud based internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[2] Prem Prakash Jayaraman,et al. Defining the Stack for Service Delivery Models and Interoperability in the Internet of Things: A Practical Case With OpenIoT-VDK , 2015, IEEE Journal on Selected Areas in Communications.
[3] Amit P. Sheth,et al. The SSN ontology of the W3C semantic sensor network incubator group , 2012, J. Web Semant..
[4] Sergei P. Skorobogatov. Optically Enhanced Position-Locked Power Analysis , 2006, CHES.
[5] Alfons Kemper,et al. StreamGlobe: adaptive query processing and optimization in streaming P2P environments , 2004, DMSN '04.
[6] John Soldatos,et al. Convergence of Utility Computing with the Internet-of-Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[7] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[8] Sreerama K. Murthy,et al. Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey , 1998, Data Mining and Knowledge Discovery.
[9] Henrich Christopher Pöhls,et al. On Updatable Redactable Signatures , 2014, ACNS.
[10] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[11] Jarmo Laaksolahti,et al. Internet of things marries social media , 2011, Mobile HCI.
[12] Fei Tao,et al. CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System , 2014, IEEE Transactions on Industrial Informatics.
[13] Martin Serrano,et al. A formal approach for the inference plane supporting integrated management tasks in the Future Internet , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.
[14] Johannes A. Buchmann,et al. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey , 2015, Comput. Secur..
[15] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[16] Tatjana Welzer,et al. A universal system for fair non-repudiable certified e-mail without a trusted third party , 2013, Comput. Secur..
[17] A. Sandy Munro. Let's roast engineering's sacred cows , 1995 .
[18] John Black,et al. Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.
[19] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[20] Xun Xu,et al. Key Enabling Technologies , 2009 .
[21] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[22] Frederick Reiss,et al. TelegraphCQ: continuous dataflow processing , 2003, SIGMOD '03.
[23] S. Dowlatshahi. The role of logistics in concurrent engineering , 1996 .
[24] Wouter Joosen,et al. Extending sensor networks into the Cloud using Amazon Web Services , 2010, 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications.
[25] George S. Taylor,et al. Improving smart card security using self-timed circuits , 2002, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems.
[26] Ashish Mishra,et al. A smart forest-fire early detection sensory system: Another approach of utilizing wireless sensor and neural networks , 2010, 2010 IEEE Sensors.
[27] M. Declercq,et al. A low-power CMOS super-regenerative receiver at 1 GHz , 2001, IEEE J. Solid State Circuits.
[28] Madoka Yuriyama,et al. Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[29] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[30] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[31] Henning Schulzrinne,et al. The IETF Geopriv and Presence Architecture Focusing on Location Privacy , 2006 .
[32] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[33] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[34] Thomas Groß. Certification and Efficient Proofs of Committed Topology Graphs , 2014, IACR Cryptol. ePrint Arch..
[35] Anantha Chandrakasan,et al. An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture , 2000, CHES.
[36] S. Kotoulas,et al. High-performance Distributed Stream Reasoning using S4 , 2011 .
[37] Ying Xing,et al. Scalable Distributed Stream Processing , 2003, CIDR.
[38] Jean-Pierre Seifert,et al. Simple photonic emission analysis of AES , 2013, Journal of Cryptographic Engineering.
[39] Louis Goubin,et al. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.
[40] Stephen Berard,et al. Implications of Historical Trends in the Electrical Efficiency of Computing , 2011, IEEE Annals of the History of Computing.
[41] Christian Boit,et al. On charge sensors for FIB attack detection , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[42] George Orwell,et al. Nineteen eighty-four : a novel , 1997 .
[43] Christian Hanser,et al. On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[44] Carsten Bormann. 6LoWPAN Roadmap and Implementation Guide , 2013 .
[45] Thomas Magedanz,et al. Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds , 2013, 2013 10th International Conference on Information Technology: New Generations.
[46] Thomas Groß,et al. Signatures and Efficient Proofs on Committed Graphs and NP-Statements , 2015, Financial Cryptography.
[47] Benedikt Heinz,et al. Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.
[48] Stefan Bouckaert,et al. Future internet research and experimentation: vision and scenarios 2020 , 2013 .
[49] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[50] Mica R. Endsley,et al. Measurement of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[51] Nir Friedman,et al. Probabilistic Graphical Models - Principles and Techniques , 2009 .
[52] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[53] Alexandros G. Fragkiadakis,et al. Enabling reliable and secure IoT-based smart city applications , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[54] Rajesh Vargheese,et al. An IoT/IoE enabled architecture framework for precision on shelf availability: Enhancing proactive shopper experience , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[55] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[56] D. Luckham. Event Processing for Business: Organizing the Real-Time Enterprise , 2011 .
[57] Thomas Eiter,et al. Linked Stream Data Processing Engines: Facts and Figures , 2012, SEMWEB.
[58] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[59] Zoya Dyka,et al. Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks , 2013, Wireless Networks and Security.
[60] Clara Pizzuti,et al. Fast Outlier Detection in High Dimensional Spaces , 2002, PKDD.
[61] John Soldatos,et al. Internet of Things Research on Semantic Interoperability to Address Manufacturing Challenges , 2015 .
[62] Osmar R. Zaïane,et al. A Nonparametric Outlier Detection for Effectively Discovering Top-N Outliers from Engineering Data , 2006, PAKDD.
[63] Guerino Giancola,et al. Understanding Ultra Wide Band Radio Fundamentals , 2004 .
[64] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[65] Kerry L. Taylor,et al. Semantics for the Internet of Things: Early Progress and Back to the Future , 2019 .
[66] Peter Friess,et al. Internet of Things Applications - From Research and Innovation to Market Deployment , 2014 .
[67] David Sinreich,et al. An architectural blueprint for autonomic computing , 2006 .
[68] George Danezis,et al. Introducing Traffic Analysis , 2007 .
[69] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[70] Kecheng Liu,et al. Big Data Architecture for Pervasive Healthcare: A Literature Review , 2015, ECIS.
[71] Jean-Baptiste Begueret,et al. Bandpass sampling Rx system design issues and architecture comparison for low power RF standards , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[72] Henrich Christopher Pöhls,et al. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures , 2013, EuroPKI.
[73] Tim Berners-Lee,et al. Linked Data on the Web , 2008, LDOW.
[74] George Pallis,et al. Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).
[75] Chris D. Nugent,et al. Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services , 2014, Lecture Notes in Computer Science.
[76] B. V. Subba Rao,et al. The Evolution of Internet Of Things (IOT) And Its Impact on Existing Technology , 2016 .
[77] Hoan Quoc Nguyen-Mau,et al. Elastic and Scalable Processing of Linked Stream Data in the Cloud , 2013, SEMWEB.
[78] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[79] Carl E. Rasmussen,et al. Evaluating Predictive Uncertainty Challenge , 2005, MLCW.
[80] W. Arden,et al. More Than Moore White Paper , 2021, 2021 IEEE International Roadmap for Devices and Systems Outbriefs.
[81] Andrew J. Blumberg,et al. Verifying computations without reexecuting them , 2015, Commun. ACM.
[82] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[83] Neil Gershenfeld,et al. When things start to think , 1999 .
[84] David Lachartre. A 550µW inductorless bandpass quantizer in 65 nm CMOS for 1.4-to-3GHz digial RF receivers , 2011, 2011 Symposium on VLSI Circuits - Digest of Technical Papers.
[85] Christian Wittke,et al. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks , 2015, IACR Cryptol. ePrint Arch..
[86] Anand S. Rao,et al. BDI Agents: From Theory to Practice , 1995, ICMAS.
[87] Sergei Skorobogatov. Low temperature data remanence in static RAM , 2002 .
[88] Vermesan Ovidiu,et al. Internet of Things Strategic Research and Innovation Agenda , 2014 .
[89] Eamonn J. Keogh,et al. A symbolic representation of time series, with implications for streaming algorithms , 2003, DMKD '03.
[90] Yoshua Bengio,et al. Scaling learning algorithms towards AI , 2007 .
[91] Antonio Ruiz-Martínez,et al. A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..
[92] Jack Keating,et al. Design to Cost/Life Cycle Cost a Way of Life , 1979 .
[93] Jean-Pierre Seifert,et al. Breaking and entering through the silicon , 2013, CCS.
[94] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[95] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[96] S. Hyakin,et al. Neural Networks: A Comprehensive Foundation , 1994 .
[97] B. Preneel,et al. Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[98] Jean Hennebert,et al. Toward Web Enhanced Building Automation Systems , 2014, Big Data and Internet of Things.
[99] Jan Camenisch,et al. Electronic Identities Need Private Credentials , 2012, IEEE Security & Privacy.
[100] Daniele Braga,et al. An execution environment for C-SPARQL queries , 2010, EDBT '10.
[101] Johannes Braun,et al. Long term confidentiality: a survey , 2014, Des. Codes Cryptogr..
[102] Payam Barnaghi,et al. Digital Technology Adoption in the Smart Built Environment , 2015 .
[103] Helen Rebecca Schindler,et al. Europe's policy options for a dynamic and trustworthy development of the Internet of Things , 2013 .
[104] Rodolfo Milito,et al. Big and Small Data: The Fog , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.
[105] Mohammed J. Zaki. Generating non-redundant association rules , 2000, KDD '00.
[106] Arif Sasongko,et al. Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.
[107] Dario Catalano,et al. Homomorphic Signatures and Message Authentication Codes , 2014, SCN.
[108] Gian Marco Revel,et al. A wireless sensor network for intelligent building energy management based on multi communication standards - a case study , 2012, J. Inf. Technol. Constr..
[109] Kevin R. Page,et al. The SSN Ontology of the Semantic Sensor Networks Incubator Group , 2011 .
[110] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[111] Nicolas Pasquier,et al. Discovering Frequent Closed Itemsets for Association Rules , 1999, ICDT.
[113] Stefan Mangard,et al. Exploiting the Difference of Side-Channel Leakages , 2012, COSADE.
[114] Amit P. Sheth,et al. Physical-Cyber-Social Computing: Looking Back, Looking Forward , 2015, IEEE Internet Comput..
[115] Johann Heyszl,et al. Impact of localized electromagnetic field measurements on implementations of asymmetric cryptography , 2013 .
[116] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[117] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[118] Reza Safabakhsh,et al. TASOM: a new time adaptive self-organizing map , 2003, IEEE Trans. Syst. Man Cybern. Part B.
[119] Alois Paulin,et al. Towards the Foundation for Read-Write Governance of Civilizations , 2011 .
[120] Pedro Malo,et al. Simpler IoT Word(s) of Tomorrow, More Interoperability Challenges to Cope Today , 2013 .
[121] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[122] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[123] A. Cavoukian. Evolving FIPPs: Proactive Approaches to Privacy, Not Privacy Paternalism , 2015 .
[124] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[125] Elisa Bertino,et al. Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.
[126] Alessandro Bassi,et al. Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model , 2013 .
[127] G. Rebitzera,et al. Life cycle assessment Part 1 : Framework , goal and scope definition , inventory analysis , and applications , 2004 .
[128] Alexander Pretschner,et al. Implementing Trust in Cloud Infrastructures , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[129] Manfred Josef Aigner,et al. Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks , 2001, CHES.
[130] Hubertus Feussner,et al. Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing , 2015, 2015 12th International Conference on Information Technology - New Generations.
[131] J. Reades,et al. The Global Information Technology Report 2012 , 2012 .
[132] Alexander S. Szalay,et al. Data Management in the Worldwide Sensor Web , 2007, IEEE Pervasive Computing.
[133] Sebastian Rudolph,et al. EP-SPARQL: a unified language for event processing and stream reasoning , 2011, WWW.
[134] Hugh Lacey,et al. The Ethics Of Science And Technology , 2010 .
[135] Marlien Herselman,et al. Principles of Neuroempiricism and Generalization of Network Topology for Health Service Delivery , 2009 .
[136] Srinivasan Seshan,et al. IrisNet: an internet-scale architecture for multimedia sensors , 2005, MULTIMEDIA '05.
[137] Maximilian Ott,et al. OMF: a control and management framework for networking testbeds , 2010, OPSR.
[138] Duc-Hung Le,et al. Provisioning Software-Defined IoT Cloud Systems , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[139] João Gama,et al. A survey on concept drift adaptation , 2014, ACM Comput. Surv..
[140] John G. Breslin,et al. Integrating Social Networks and Sensor Networks , 2009 .
[141] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[142] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[143] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[144] Claudio Soriente,et al. StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.
[145] John Soldatos,et al. Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things , 2014, Int. J. Web Grid Serv..
[146] Thomas Villmann,et al. How to process uncertainty in machine learning? , 2007, ESANN.
[147] John Klein,et al. Systems Engineering Framework for Integrated Product and Industrial Design Including Trade Study Optimization , 2012, CSER.
[148] Jan Veira. Internet of Things: Opportunities and challenges for semiconductor companies , 2015 .
[149] Tom Heath,et al. Linked Data: Evolving the Web into a Global Data Space , 2011, Linked Data.
[150] Mohammed J. Zaki,et al. Theoretical Foundations of Association Rules , 2007 .
[151] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[152] Jean-Sébastien Coron,et al. An Efficient Method for Random Delay Generation in Embedded Software , 2009, CHES.
[153] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[154] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[155] Jan Craninckx,et al. A 6.1 GS/s 52.8 mW 43 dB DR 80 MHz bandwidth 2.4 GHz RF bandpass ΔΣ ADC in 40 nm CMOS , 2010, 2010 IEEE Radio Frequency Integrated Circuits Symposium.
[156] Alexandros G. Fragkiadakis,et al. Lightweight and secure encryption using channel measurements , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[157] Man Hon Wong,et al. Mining fuzzy association rules in databases , 1998, SGMD.
[158] Óscar Lázaro,et al. FITMAN Future Internet Enablers for the Sending Enterprise: a FIWARE Approach & Industrial Trialing , 2015, IWEI Workshops.
[159] Danh Le Phuoc,et al. A Native and Adaptive Approach for Unified Processing of Linked Streams and Linked Data , 2011, SEMWEB.
[160] Nuno Vasconcelos,et al. Privacy preserving crowd monitoring: Counting people without people models or tracking , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[161] M. V. Velzen,et al. Self-organizing maps , 2007 .
[162] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[163] Alois Paulin,et al. Towards Self-Service Government - A Study on the Computability of Legal Eligibilities , 2013, J. Univers. Comput. Sci..