pervasive communication
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 2)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Vijaya Nirmala Mitnala ◽  
Martin J. Reed ◽  
Ian Kegel ◽  
John Bicknell


2021 ◽  
Vol 30 ◽  
pp. 100508
Author(s):  
Siddhant Banyal ◽  
Kartik Krishna Bharadwaj ◽  
Deepak Kumar Sharma ◽  
Ashish Khanna ◽  
Joel J.P.C. Rodrigues


2020 ◽  
Vol 162 ◽  
pp. 152-159
Author(s):  
Abid Hussain ◽  
Muddesar Iqbal ◽  
Sohail Sarwar ◽  
Muhammad Safyan ◽  
Zia ul Qayyum ◽  
...  


2019 ◽  
Vol 11 (3) ◽  
pp. 1-22 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet of Things (IoT) is seen as a novel paradigm enabling ubiquitous and pervasive communication of objects with each other and with the physical/virtual world via internet. With the exponential rise of sensor and RFID-based communication, much data is getting generated; which becomes arduous to manage given the constrained power and computation of low-powered devices. To resolve this issue, the integration of Cloud and IoT, also known as CloudIoT, is seen as panacea to create more heterogeneous smart services and handle increasing data demands. In this article, the authors examine and survey literature with a focus on the integration components of CloudIoT and present diverse applications including driving factors for CloudIoT integration. The article also identifies security vulnerabilities implied by the integration of Cloud and IoT and outlines some suggested measures to mitigate the challenge. Finally, the article presents some open issues and challenges providing potential directions for future research in this area.



Author(s):  
Martin Pfannemuller ◽  
Janick Edinger ◽  
Markus Weckesser ◽  
Roland Kluge ◽  
Manisha Luthra ◽  
...  




2018 ◽  
Vol 26 (1) ◽  
pp. 373-386 ◽  
Author(s):  
Charles T. B. Garrocho ◽  
Maurício J. da Silva ◽  
Ricardo A. R. Oliveira


Author(s):  
Zhen-Yu You ◽  
Yu-Shiuan Tsai ◽  
Wen-Hsiang Tsai


2014 ◽  
Vol 644-650 ◽  
pp. 1714-1716
Author(s):  
Xiao Peng Wang

Recent advances in semantic algorithms and pervasive communication are based entirely on the assumption that DHTs and hierarchical databases are not in conflict with write-back caches. Here, we argue the emulation of the partition table that would allow for further study into information retrieval systems. Our focus in this paper is not on whether the famous embedded algorithm for the study of e-business by Harris et al. is NP-complete, but rather on motivating an application for Byzantine fault tolerance (Mesophryon).



Sign in / Sign up

Export Citation Format

Share Document