[HTML][HTML] A survey on wearable technology: History, state-of-the-art and current challenges

A Ometov, V Shubina, L Klus, J Skibińska, S Saafi… - Computer Networks, 2021 - Elsevier
Technology is continually undergoing a constituent development caused by the appearance
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …

[LIBRO][B] P2P networking and applications

J Buford, H Yu, EK Lua - 2009 - books.google.com
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio,
video, and text files) as well as real-time data (such as telephony traffic) with other users …

{BOSS}: Building operating system services

S Dawson-Haggerty, A Krioukov, J Taneja… - … USENIX Symposium on …, 2013 - usenix.org
Commercial buildings are attractive targets for introducing innovative cyber-physical control
systems, because they are already highly instrumented distributed systems which consume …

Wireless speaker for receiving from a mobile phone directions to receive and render a playlist from a content server on the internet

M Weel - US Patent 9,554,405, 2017 - Google Patents
An apparatus for playing media includes a network trans ceiver for communicating with a
remote control device and a server. The apparatus provides a device identifier to the remote …

Simplifying cyber foraging for mobile devices

RK Balan, D Gergle, M Satyanarayanan… - Proceedings of the 5th …, 2007 - dl.acm.org
Cyber foraging is the transient and opportunistic use of compute servers bymobile devices.
The short market life of such devices makes rapid modification of applications for remote …

Discovery systems in ubiquitous computing

WK Edwards - IEEE Pervasive Computing, 2006 - ieeexplore.ieee.org
Ubiquitous computing introduces unique requirements for discovery technologies, which let
services and devices become aware of each other without explicit human administration …

Effective iterative techniques for fingerprinting design IP

AE Caldwell, HJ Choi, AB Kahng, S Mantik… - Proceedings of the 36th …, 1999 - dl.acm.org
While previous watermarking-based approaches to intellectual property protection (IPP)
have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ensure the …

A survey on M2M service networks

J Latvakoski, A Iivari, P Vitic, B Jubeh, M Ben Alaya… - Computers, 2014 - mdpi.com
The number of industrial applications relying on the Machine to Machine (M2M) services
exposed from physical world has been increasing in recent years. Such M2M services …

Connecting and managing m2m devices in the future internet

JS Song, A Kunz, M Schmidt, P Szczytowski - Mobile Networks and …, 2014 - Springer
As a cutting edge technology, Machine to Machine (M2M) communications are gaining
ground for managing and controlling M2M devices. Since these objects have intelligence …

A categorization of discovery technologies for the internet of things

A Bröring, SK Datta, C Bonnet - … of the 6th International Conference on …, 2016 - dl.acm.org
Discovery of things as well as their resources, metadata, properties, and capabilities is a
fundamental requirement in any Internet of Things (IoT) ecosystem. This paper analyzes the …