Design and deployment challenges in immersive and wearable technologies
暂无分享,去创建一个
Mehmet A. Orgun | Joel J. P. C. Rodrigues | Mohammed Zakariah | Jalal Al-Muhtadi | Kashif Saleem | Basit Shahzad | J. Al-Muhtadi | M. Orgun | K. Saleem | J. Rodrigues | B. Shahzad | Mohammed Zakariah
[1] Jean-Yves Fourniols,et al. Smart wearable systems: Current status and future challenges , 2012, Artif. Intell. Medicine.
[2] M. Petre,et al. Wearables , 2014 .
[3] Basit Shahzad,et al. Maximization of Tweet's viewership with respect to time , 2014, 2014 World Symposium on Computer Applications & Research (WSCAR).
[4] Joel J. P. C. Rodrigues,et al. Analysis of mobile health applications for a broad spectrum of consumers: A user experience approach , 2014, Health Informatics J..
[5] Robert Ilg,et al. An efficient robotic tendon for gait assistance. , 2006, Journal of biomechanical engineering.
[6] V. Venkatesh,et al. AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .
[7] Kashif Saleem,et al. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.
[8] Bruno M. C. Silva,et al. An IoT-based mobile gateway for intelligent personal assistants on mobile health environments , 2016, J. Netw. Comput. Appl..
[9] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.
[10] Azween Abdullah,et al. A probabilistic model for risk forecasting in medical informatics , 2011, ICSE 2011.
[11] Abdelouahid Derhab,et al. Low delay and secure M2M communication mechanism for eHealthcare , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[12] Joel J. P. C. Rodrigues,et al. On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[13] Cason D. Schmit,et al. The Role of Law in Supporting Secondary Uses of Electronic Health Information , 2015, Journal of Law, Medicine & Ethics.
[14] B. Shahzad,et al. Enhanced Risk Analysis-Relative Impact Factorization , 2005, 2005 International Conference on Information and Communication Technologies.
[15] Jeremy Straub,et al. OpenOrbiter: A Low-Cost, Educational Prototype CubeSat Mission Architecture , 2013 .
[16] Mehmet Rasit Yuce,et al. Review of Medical Implant Communication System (MICS) band and network , 2016, ICT Express.
[17] S. Led,et al. Design of a Wearable Device for ECG Continuous Monitoring Using Wireless Technology , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[18] Joel J. P. C. Rodrigues,et al. Digital signature of network segment for healthcare environments support , 2014 .
[19] Mehmet A. Orgun,et al. Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.
[20] Helena M. Mentis,et al. Strategies for conducting situated studies of technology use in hospitals , 2015, Cognition, Technology & Work.
[21] Hsien-Hsin S. Lee,et al. Test Challenges for 3D Integrated Circuits , 2009, IEEE Design & Test of Computers.
[22] Tao Zhang,et al. Software for Wearable Devices: Challenges and Opportunities , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[23] Abdelouahid Derhab,et al. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..
[24] Abdullah S. Al-Mudimigh,et al. Empirical selection of risk identification methodology in software , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[25] Timm Faulwasser,et al. Towards pervasive computing in health care – A literature review , 2008, BMC Medical Informatics Decis. Mak..
[26] Saudi Arabia,et al. Software Risk Management and Avoidance Strategy , 2011 .
[27] Gengfa Fang,et al. Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks , 2017, IEEE Journal of Biomedical and Health Informatics.
[28] Abdullah S. Al-Mudimigh,et al. Risk Identification, Mitigation and Avoidance Model for Handling Software Risk , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.
[29] Kashif Saleem,et al. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.
[30] Rachel V. Rose,et al. Appreciating Healthcare Data Privacy Laws in Canada, the United Kingdom, and the United States , 2014 .
[31] Blaine A. Price,et al. Wearables: has the age of smartwatches finally arrived? , 2015, Commun. ACM.
[32] Michael M. Resch,et al. Distributed Computing in a Heterogeneous Computing Environment , 1998, PVM/MPI.
[33] Sophia Alim,et al. Impact of social media usage on students academic performance in Saudi Arabia , 2015, Comput. Hum. Behav..
[34] Xiaolei Dong,et al. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions , 2015, IEEE Wireless Communications.
[35] B. Betts. All-wireless on the rise [enterprise workplace networked communications] , 2014 .
[36] P Lukowicz,et al. Wearable Systems for Health Care Applications , 2004, Methods of Information in Medicine.
[37] Susan A. Brown. Household technology adoption, use, and impacts: Past, present, and future , 2008, Inf. Syst. Frontiers.
[38] Guangjie Han,et al. Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial] , 2015, IEEE Netw..
[39] 박현길. Wearable Device 시장은 매력적일까 , 2014 .
[40] Hsiao-Cheng Yu,et al. Challenges to Global RFID Adoption , 2006, 2006 Technology Management for the Global Future - PICMET 2006 Conference.
[41] Emil Jovanov,et al. Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.
[42] Basit Shahzad,et al. Identification of Risk Factors in Large Scale Software Projects: A Quantitative Study , 2014, Int. J. Knowl. Soc. Res..
[43] Dirk Helbing,et al. Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society , 2015, Springer International Publishing.
[44] Fred D. Davis. A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .
[45] Gary Gereffi,et al. Manufacturing Miracles: Paths of Industrialization in Latin America and East Asia , 1990 .
[46] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[47] Vibhor Sharma,et al. Near Field Communication , 2013, Encyclopedia of Biometrics.
[48] Hadi Hariyanto,et al. Emergency broadband access network using low altitude platform , 2009, International Conference on Instrumentation, Communication, Information Technology, and Biomedical Engineering 2009.
[49] Jyh-Yeong Chang,et al. Gaming control using a wearable and wireless EEG-based brain-computer interface device with novel dry foam-based sensors , 2012, Journal of NeuroEngineering and Rehabilitation.
[50] S. Broadberry,et al. India and the great divergence: an Anglo-Indian comparison of GDP per capita, 1600–1871 , 2015 .
[51] Viktor K. Prasanna,et al. Heterogeneous computing: challenges and opportunities , 1993, Computer.
[52] J. Iqbal,et al. Iterative project scheduling - a time bound technique , 2006, 2006 International Conference on Computing & Informatics.
[53] Sanjiv D. Vaidya,et al. Challenges in the adoption of E-Commerce technologies in India: The role of organizational factors , 2006, Int. J. Inf. Manag..
[54] A. Feld,et al. Social Media in the Health-Care Setting: Benefits but Also a Minefield of Compliance and Other Legal Issues , 2014, The American Journal of Gastroenterology.
[55] E. Coiera. Four rules for the reinvention of health care , 2004, BMJ : British Medical Journal.
[56] Basit Shahzad,et al. Effective risk mitigation: a user prospective , 2008 .
[57] V. C. Padaki,et al. Smart Vest: wearable multi-parameter remote physiological monitoring system. , 2008, Medical engineering & physics.
[58] Basit Shahzad,et al. When are Tweets Better Valued? An Empirical Study , 2014, J. Univers. Comput. Sci..
[59] Athanasios K. Tsakalidis,et al. Enhanced healthcare personnel rostering solution using mobile technologies , 2015, J. Syst. Softw..
[60] Basit Shahzad,et al. Risk Mitigation And Management Scheme Based On Risk Priority , 2010 .
[61] Paul Jen-Hwa Hu,et al. Information Technology Acceptance by Individual Professionals: A Model Comparison Approach , 2001, Decis. Sci..
[62] Paul Lukowicz,et al. Design of the QBIC wearable computing platform , 2004, Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004..
[63] Jaegon Jung,et al. The Uses of the Smartphone for Doctors: An Empirical Study from Samsung Medical Center , 2011, Healthcare informatics research.
[64] Qing Hu,et al. Positioning Error Analysis of Ranging-Mode Using AIS Signals in China , 2016, J. Sensors.
[65] Joel J. P. C. Rodrigues,et al. Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.
[66] Zahid Ullah,et al. Statistical methods for sustainable risk identification methodologies , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[67] Chris Greenhalgh,et al. Social Access vs. Privacy in Wearable Computing: A Case Study of Autism , 2015, IEEE Pervasive Computing.
[68] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[69] Yoshiyuki Sankai,et al. Development of noise resistant hybrid capacitive-resistive electrodes for wearable robotics, computing and welfare , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[70] Basit Shahzad,et al. Does a Change in Weekend Days Have an Impact on Social Networking Activity? , 2014, J. Univers. Comput. Sci..
[71] B. Shahzad,et al. Identification of Methodology for Analysis of the Risk Factors in Software Development Environment , 2010 .
[72] Kashif Saleem,et al. Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..