Big data application to the vegetable production and distribution system
暂无分享,去创建一个
[1] Alireza Ahrary,et al. Big data approach to a novel nutrition-based vegetable production and distribution system , 2013, 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM).
[2] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[3] Sean D Dessureault,et al. Understanding big data , 2016 .
[4] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[5] Atsushi Hashimoto,et al. Advanced application of ICT to the sustainable production of excellent Japanese Mandarin , 2010 .
[6] Luca Veltri,et al. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.
[7] Krish Krishnan,et al. Introduction to Big Data , 2013 .
[8] Bruno Latour,et al. Tarde's idea of quantification , 2010 .
[9] Adam Jacobs,et al. The pathologies of big data , 2009, Commun. ACM.
[10] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[11] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[12] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[13] D. Boyd,et al. Six Provocations for Big Data , 2011 .
[14] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[15] Alireza Ahrary,et al. A Big Data Approach for a New ICT Agriculture Application Development , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[16] P. Balamuralidhar,et al. Towards a Light Weight Internet ofThings Platform Architecture , 2013 .
[17] Habtamu Abie,et al. Metrics-driven security objective decomposition for an e-health application with adaptive security management , 2013, ASPI '13.
[18] James Mussell. Raw Data is an Oxymoron , 2014 .
[19] Yoshinori Yaginuma,et al. Approaches to Creating Human-Centric Solutions , 2012 .
[20] Patrick Gage Kelley,et al. IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network , 2010 .
[21] Alireza Ahrary,et al. Big Data approach in an ICT Agriculture project , 2013, 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013).
[22] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[23] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[24] Emily Troshynski,et al. Accountabilities of presence: reframing location-based systems , 2008, CHI.
[25] P. Balamuralidhar,et al. Towards a LightWeight Internet of Things Platform Architecture , 2013, J. ICT Stand..
[26] Daeyoung Kim,et al. The EPC Sensor Network for RFID and WSN Integration Infrastructure , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[27] L. Manovich,et al. Trending: The Promises and the Challenges of Big Social Data , 2012 .