• No results found

[PDF] Top 20 Symbiotic attention management in the context of internet of things

Has 10000 "Symbiotic attention management in the context of internet of things" found on our website. Below are the top 20 most common "Symbiotic attention management in the context of internet of things".

Symbiotic attention management in the context of internet of things

Symbiotic attention management in the context of internet of things

... recting attention is subliminal cueing ...user’s attention, as inves- tigated in peripheral interaction [6, ...of attention-aware smart ob- jects as discussed earlier in this ... See full document

6

Social Context Representation in  Product Service Systems with Internet  of Things

Social Context Representation in Product Service Systems with Internet of Things

... with internet of things, social context representations could be used in analyzing and comparing key aspects of social interaction types to retrieve simi- lar cases to exploit related interaction ... See full document

7

ONTOLOGY-BASED CONTEXT MASHUP MODEL FOR CONTEXT-AWARE SERVICES IN INTERNET OF THINGS ENVIRONMENTS

ONTOLOGY-BASED CONTEXT MASHUP MODEL FOR CONTEXT-AWARE SERVICES IN INTERNET OF THINGS ENVIRONMENTS

... (the Internet of Things) environment, a common context information model is essential for active things to share common knowledge, reason their situations, and support adaptive ... See full document

10

Prototype for multidisciplinary research in the context of the Internet of Things

Prototype for multidisciplinary research in the context of the Internet of Things

... the Internet of Things (IoT), poses important challenges requiring multidisciplinary solutions that take into account the potential mutual effects and interactions among the different dimensions of future ... See full document

16

Object Classification based Context Management for Identity Management in Internet of Things

Object Classification based Context Management for Identity Management in Internet of Things

... the Internet of Things (IoT), security mechanism is more stringent, flexible and less ...identity management (IdM) of ubiquitous objects more challenging, and there is a need of context-aware ... See full document

6

Authentication and Context Awareness Access Control in Internet of Things

Authentication and Context Awareness Access Control in Internet of Things

... is achieved by using another method as compare to the old way. The need for security and privacy for IoT devices is illuminated here. Moreover, assessment of various schemes related to access control in IoT over the ... See full document

7

An e-Service delivery platform for building indoor environment and energy performance assessment

An e-Service delivery platform for building indoor environment and energy performance assessment

... the context of the emerging ‘Internet of Things’ (IoT) market, an IoT-enabled data management system has been developed comprising new monitoring and data processing ... See full document

6

Garbage Monitoring and Management using Internet of things

Garbage Monitoring and Management using Internet of things

... energy-efficient Internet of Things (IoT) as an enabler of various applications including waste ...the context of Internet of Things (IoT) and Smart Cities for waste ... See full document

5

Data Management for Internet of things : A Survey and Discussion

Data Management for Internet of things : A Survey and Discussion

... IoT context, queries can be issued either to request real-time data to be collected for temporal monitoring purposes or to retrieve a certain view of the data stored within the ...the Things within the IoT ... See full document

5

Global identity management in the Internet of Things

Global identity management in the Internet of Things

... The Internet is a communication medium of entities oblivious to the underlining technology being used, for instance the communication between RFID tag and reader, or between a Fitbit and a ...IoT context ... See full document

180

Internet Of Things and Trust Management in IOT – Review

Internet Of Things and Trust Management in IOT – Review

... the Internet of Things” discusses the applicability and limitations of existing IP-based Internet security protocols and other security protocols used in wireless sensor networks, which are ... See full document

7

A Pervasive Computing Model of Internet of Things based on Computing Area Network

A Pervasive Computing Model of Internet of Things based on Computing Area Network

... of Things makes changes to the environment of pervasive computing, and the internet of users expanded the spaces and ...of internet of ...The internet of things is composition of a ... See full document

8

A Survey on Internet of Things for Healthcare and Medication Management

A Survey on Internet of Things for Healthcare and Medication Management

... Charalampos Doukas et al (2012) presents a platform based on Cloud Computing for mobile and wearable healthcare sensors management, demonstrating this way the IoT paradigm applied on pervasive healthcare. Author ... See full document

5

Towards cloud based big data analytics for smart future cities

Towards cloud based big data analytics for smart future cities

... ICT is becoming increasingly pervasive to urban envi- ronments and providing the necessary basis for sustain- ability and resilience of the smart future cities. With the rapid increase in the presence of Internet ... See full document

11

Smartphone-Controlled Localisation and Management of Indoor Devices using the Internet of Things

Smartphone-Controlled Localisation and Management of Indoor Devices using the Internet of Things

... The principle of IoT can be applied to many real world scenarios, as shown in Figure 1. This includes indoor and outdoor networks such as shopping malls, offices, and homes. At shopping malls, the concept can be applied ... See full document

5

Internet of Things

Internet of Things

... “The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects will be connected to the Internet and be able to identify themselves to other ... See full document

7

Design and Implementation of Smart Living System using Internet of Things and Robotics

Design and Implementation of Smart Living System using Internet of Things and Robotics

... [1]. Fatma, et al. "Smart mirror applications with raspberry Pi." Computer Science and Engineering (UBMK), 2017 International Conference on. IEEE, 2017. [2]. Ghazal, Mohammed, et al. "A Mobile-Programmable ... See full document

5

Supply Chain Management using Internet of Things

Supply Chain Management using Internet of Things

... RFID technology and the impact on the supply chain can be significant, from the combination and execution to the profit and challenges that faces today. There is no doubt that companies can grow with the use of the ... See full document

5

Integrated Manufacturing Management using Internet of Things

Integrated Manufacturing Management using Internet of Things

... The integration between programmable logic controllers (PLCs) and supervision and control software’s has been a critical factor for industrial production management. The goal of this work is to show a new approach ... See full document

6

Survey on Flooding Detection System Using Internet of Things

Survey on Flooding Detection System Using Internet of Things

... The internet of things or IOT provides the ability for human and machines to interact from billions of things that include sensors, services or other internet connected ...of internet ... See full document

5

Show all 10000 documents...