Deploying RFID - Challenges, Solutions, and Open Issues 2011
DOI: 10.5772/19997
|View full text |Cite
|
Sign up to set email alerts
|

Building Blocks of the Internet of Things: State of the Art and Beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(21 citation statements)
references
References 17 publications
0
20
0
1
Order By: Relevance
“…We perform a comparative study on the service discovery methods using the OWL-S service retrieval test collection OWLS-TC v3.0 10 (which consists of 1007 services). The services are divided into seven categories and a total of 29 queries are provided together with a relevant answer set for each query.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…We perform a comparative study on the service discovery methods using the OWL-S service retrieval test collection OWLS-TC v3.0 10 (which consists of 1007 services). The services are divided into seven categories and a total of 29 queries are provided together with a relevant answer set for each query.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Recent works in [9,10] propose a modelling approach in which resources in the IoT are able to expose standard service interfaces (we term the services exposed by the connected Things in the physical world as "IoT Services"), embodying the "EntityDevice-Resource" modelling approach.…”
Section: Introductionmentioning
confidence: 99%
“…Common attacks of this nature include Sybil, node-replication attack, Hello flood attack, selective forwarding, and sinkhole attack / black holes (Serbanati et al, 2011).…”
Section: Attacks On Sensor Networkmentioning
confidence: 99%
“…The recent work in [6] and [7] proposes a modeling approach in which resources on the IoT are able to expose standard service interfaces. This coincides with the principle of the Service Oriented Computing [8] and potentially provides a scalable, distributed and service-oriented means to access IoT information.…”
Section: Introductionmentioning
confidence: 99%