Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim
The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.
{"title":"Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook","authors":"Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim","doi":"10.1109/IMIS.2014.94","DOIUrl":"https://doi.org/10.1109/IMIS.2014.94","url":null,"abstract":"The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.
{"title":"A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/IMIS.2014.73","DOIUrl":"https://doi.org/10.1109/IMIS.2014.73","url":null,"abstract":"In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert
The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.
{"title":"An Overview of Application Traffic Management Approaches: Challenges and Potential Extensions","authors":"I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert","doi":"10.1109/IMIS.2014.7","DOIUrl":"https://doi.org/10.1109/IMIS.2014.7","url":null,"abstract":"The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.
{"title":"Towards Implementing Web-Based Adaptive Application Mobility Using Web Real-Time Communications","authors":"Dan Johansson, Mikael Holmgren","doi":"10.1109/IMIS.2014.60","DOIUrl":"https://doi.org/10.1109/IMIS.2014.60","url":null,"abstract":"Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen
This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.
{"title":"QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode","authors":"J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen","doi":"10.1109/IMIS.2014.68","DOIUrl":"https://doi.org/10.1109/IMIS.2014.68","url":null,"abstract":"This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.
{"title":"Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV Autopilot","authors":"V. Tyan, Doohyun Kim, Young-guk Ha, Dongwoon Jeon","doi":"10.1109/IMIS.2014.14","DOIUrl":"https://doi.org/10.1109/IMIS.2014.14","url":null,"abstract":"This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called "The Time Machine", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.
{"title":"Developing Useful Mobile Applications in Cross-Media Platforms","authors":"C. Hermansson, Mikael Söderström, Dan Johansson","doi":"10.1109/IMIS.2014.59","DOIUrl":"https://doi.org/10.1109/IMIS.2014.59","url":null,"abstract":"As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called \"The Time Machine\", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh
In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.
{"title":"A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks","authors":"Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh","doi":"10.1109/IMIS.2014.69","DOIUrl":"https://doi.org/10.1109/IMIS.2014.69","url":null,"abstract":"In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.
{"title":"Media Coverage and Stock Return an Impulse Response Analysis","authors":"Kuei-Yuan Wang, Chien-Kuo Chen, Hsiao-Chi Wei","doi":"10.1109/IMIS.2014.83","DOIUrl":"https://doi.org/10.1109/IMIS.2014.83","url":null,"abstract":"This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.
{"title":"Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks","authors":"M. P. Pawlowski, A. Jara, M. Ogorzałek","doi":"10.1109/IMIS.2014.93","DOIUrl":"https://doi.org/10.1109/IMIS.2014.93","url":null,"abstract":"Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}