[HTML][HTML] A survey on wearable technology: History, state-of-the-art and current challenges
Technology is continually undergoing a constituent development caused by the appearance
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …
[LIBRO][B] P2P networking and applications
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio,
video, and text files) as well as real-time data (such as telephony traffic) with other users …
video, and text files) as well as real-time data (such as telephony traffic) with other users …
{BOSS}: Building operating system services
Commercial buildings are attractive targets for introducing innovative cyber-physical control
systems, because they are already highly instrumented distributed systems which consume …
systems, because they are already highly instrumented distributed systems which consume …
Wireless speaker for receiving from a mobile phone directions to receive and render a playlist from a content server on the internet
M Weel - US Patent 9,554,405, 2017 - Google Patents
An apparatus for playing media includes a network trans ceiver for communicating with a
remote control device and a server. The apparatus provides a device identifier to the remote …
remote control device and a server. The apparatus provides a device identifier to the remote …
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers bymobile devices.
The short market life of such devices makes rapid modification of applications for remote …
The short market life of such devices makes rapid modification of applications for remote …
Discovery systems in ubiquitous computing
WK Edwards - IEEE Pervasive Computing, 2006 - ieeexplore.ieee.org
Ubiquitous computing introduces unique requirements for discovery technologies, which let
services and devices become aware of each other without explicit human administration …
services and devices become aware of each other without explicit human administration …
Effective iterative techniques for fingerprinting design IP
While previous watermarking-based approaches to intellectual property protection (IPP)
have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ensure the …
have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ensure the …
A survey on M2M service networks
J Latvakoski, A Iivari, P Vitic, B Jubeh, M Ben Alaya… - Computers, 2014 - mdpi.com
The number of industrial applications relying on the Machine to Machine (M2M) services
exposed from physical world has been increasing in recent years. Such M2M services …
exposed from physical world has been increasing in recent years. Such M2M services …
Connecting and managing m2m devices in the future internet
As a cutting edge technology, Machine to Machine (M2M) communications are gaining
ground for managing and controlling M2M devices. Since these objects have intelligence …
ground for managing and controlling M2M devices. Since these objects have intelligence …
A categorization of discovery technologies for the internet of things
Discovery of things as well as their resources, metadata, properties, and capabilities is a
fundamental requirement in any Internet of Things (IoT) ecosystem. This paper analyzes the …
fundamental requirement in any Internet of Things (IoT) ecosystem. This paper analyzes the …