An IoT healthcare service model of a vehicle using implantable devices
暂无分享,去创建一个
[1] Soon Myoung Chung,et al. A parallel text document clustering algorithm based on neighbors , 2015, Cluster Computing.
[2] Wei-Tsong Lee,et al. Adaptive Combiner for MapReduce on cloud computing , 2014, Cluster Computing.
[3] Hideyuki Imai,et al. A fuzzy representation for non-additive weights of AHP , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).
[4] Cristina Comaniciu,et al. A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks , 2013, Ad Hoc Networks.
[5] Sergio Camorlinga,et al. Electromagnetic Interference-Aware Transmission Scheduling and Power Control for Dynamic Wireless Access in Hospital Environments , 2011, IEEE Transactions on Information Technology in Biomedicine.
[6] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[7] Zheng Junjun,et al. Study on the Selection of Venture Capitalists Based on Fuzzy AHP , 2010, 2010 3rd International Conference on Information Management, Innovation Management and Industrial Engineering.
[8] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[9] Liangxiu Han,et al. Parallel data intensive applications using MapReduce: a data mining case study in biomedical sciences , 2014, Cluster Computing.
[10] Feng Kong,et al. Analysis of and Improvement on Ranking Method for Fuzzy AHP , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[11] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[12] Hai Jiang,et al. Accelerating MapReduce framework on multi-GPU systems , 2013, Cluster Computing.
[13] Yacine Ouzrout,et al. Fuzzy multi-criteria lifecycle system maturity decision making based on an integrated Fuzzy AHP and VIKOR methodology , 2014, 2014 International Conference on Computational Science and Technology (ICCST).
[14] I-En Liao,et al. Ontology-based library recommender system using MapReduce , 2013, Cluster Computing.
[15] Xiaoping Wu,et al. Information systems security risk assessment on improved fuzzy AHP , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[16] Christoph Schroth,et al. The Internet of Things in an Enterprise Context , 2009, FIS.
[17] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[18] Shahid Raza,et al. Lightweight Security Solutions for the Internet of Things , 2013 .
[19] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[20] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[21] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[22] Vipul Gupta,et al. Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.
[23] Dusit Niyato,et al. An EMI-Aware Prioritized Wireless Access Scheme for e-Health Applications in Hospital Environments , 2010, IEEE Transactions on Information Technology in Biomedicine.
[24] Shijian Fang,et al. A fuzzy AHP approach for service vendor selection under uncertainty , 2011, 2011 International Conference on Business Management and Electronic Information.
[25] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[26] Xiaohui Liang,et al. Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation , 2014, IEEE Journal of Biomedical and Health Informatics.