Version: 2 Status: Review Woo web of Objects Project


List of Tables List of Figures



Download 0.72 Mb.
Page3/12
Date20.10.2016
Size0.72 Mb.
#6467
1   2   3   4   5   6   7   8   9   ...   12

List of Tables



    1. List of Figures


    1. Referenced Documents


[WSAN1] G. F. Coulouris, Distributed Systems: Concepts and Design. Addison Wesley, 2005.

[WSAN2] M. M. Wang, J. N. Cao, J. Li, and S. K. Dasi, "Middleware for Wireless Sensor Networks: A Survey," Journal of Computer Science and Technology, vol. 23, pp. 305-326, May 2008.

[WSAN3] A.B. García, J.F. Martínez, J.M. López, A. Prayati, and L. Redondo, “Problem Solving for Wireless Sensor Networks”. Springer-Verlag, 2008.

[WSAN4] R. Gummadi, O. Gnawali, and R. Govindan, "Macro-programming Wireless Sensor Networks Using Kairos," in Distributed computing in Sensor Systems, S. Berlin/Heidelberg, vol. 3560, pp. 126-140. 2005.

[WSAN5] R. Newton and M. Welsh, "Region Streams: Functional Macroprogramming for Sensor Networks," in First International Workshop on Data Management for Sensor Networks, 2004.

[WSAN6] A. Bakshi, V. K. Prasanna, J. Reich, and D. Larner, "The Abstract Task Graph: A Methodology for Architecture-Independent Programming of Networked Sensor Systems," in Workshop on End-to-End, Sense and Respond Systems, Applications and Services, pp. 19-24. 2005.

[WSAN7] K. Whitehouse, F. Zhao, and J. Liu. (2005, Apr.) Microsoft Research. [Online]. http://research.microsoft.com/apps/pubs/default.aspx?id=70161.

[WSAN8] M. Welsh and G. Mainland, "Programming Sensor Networks Using Abstract Regions," in First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI '04), 2004.

[WSAN9] T. Abdelzaher, et al., "Enviro Track: Towards an Environmental Computing Paradigm for Distributed Sensor Networks," in 24th IEEE International Conference on Distributed Computing Systems (ICDCS'04), 2004.

[WSAN10] S. Madden, M. Franklin, J. Hellerstein, and W. Hong, "TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks," in Fifth Symposium on Operating Systems Design and implementation (OSDI'02), Boston, 2002, pp. 136-146.

[WSAN11] K. Römer, C. Frank, P. J. Marrón, and C. Becker, "Generic role assignment for Wireless Sensor Networks," in 11th Workshop on ACM SIGOPS European workshop, Leuven, 2004.

[WSAN12] P. Levis and D. Culler, "Maté: a tiny virtual machine for sensor networks," in 10th International conference on Architectural support for programming languages and operating systems, San Jose, California, 2002, pp. 85-95.

[WSAN13] D. Simon, C. Cifuentes, D. Cleal, J. Daniels, and D. White, "Java™ on the bare metal of wireless sensor devices: the squawk Java virtual machine," in 2nd International conference on virtual execution environments, Ottawa, 2006, pp. 78-88.

[WSAN14] T. Liu and M. Martonosi, "Impala: a middleware system for managing autonomic, parallel sensor systems," in ninyh ACM SIGPLAN symposium on Principles and practice of parallel programming, San Diego, California, 2003, pp. 107-118.

[WSAN15] P. Kang, et al., "Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems," The Computer Journal, vol. 47, no. Special Issue on Mobile and Pervasive Computing, pp. 475-494, 2004.

[WSAN16] S. Madden, J. Hellerstein, and W. Hong. (2003, Sep.) TinyDB: In Network Query Processing in TinyOS. http://telegraph.cs.berkeley.edu/tinydb/tinydb.pdf.

[WSAN17] C.C. Shen, C. Srisathapornphat, and C. Jaikaeo, "Sensor information networking architecture and applications," Personal Communications, IEEE, vol. 8, no. 4, pp. 52-59, Aug. 2001.

[WSAN18] S. Li, Y. Lin, S. H. Son, J. A. Stankovic, and Y. Wei, "Event Detection Services Using Data Service Middleware in Distributed Sensor Networks," Telecommunication Systems, vol. 26, pp. 351-368, Dec. 2004.

[WSAN19] A. L. Murphy and W. B. Heinzelman, "MiLAN: Middleware Linking Applications and Networks," University of Rochester, NY, Technical Report, 2002.

[WSAN20] E. Souto, et al., "A message-oriented middleware for sensor networks," in 2nd Workshop on Middleware for pervasive and ad-hoc computing, Toronto, 2004, pp. 127-134.

[WSAN21] A. R. Ribeiro, F. C. Silva, L. C. Freitas, J. C. Costa, and C. R. Francês, "SensorBus: a Middleware model for Wireless Sensor Networks," in 3rd International IFIP/ACM Latin American conference on Networking, Cali, 2005, pp. 1-9.

[WSAN22] A. Taherkordi and R. Rouvoy, "A Self‐Adaptive Context Processing Framework for Wireless Sensor Networks," in Middleware Conference. Proceedings of the 3rd international workshop on Middleware for sensor networks, Leuven, Belgium, 2008.

[WSAN23] A. Ranganathan and R. Campbell, "A Middleware for Context-Aware Agents in Ubiquitous Computing Environments in Ubiquitous Computing Environments," in CM/IFIP/USENIX International Middleware Conference, Brazil, 2003.

[WSAN24] L. Ni, Y. Zhu, and M. Jian, Semantic Sensor Net: An Extensible Framework. Heildelberg: Springer, 2005.

[WSAN25] H. Quin and X. Zhou, "Integrating Context Aware with Sensornet," in Proceedings of the First International Conference on Semantics, 2005.

[WSAN26] A. Dey and G. Abowd, "Towards a Better Understanding of Context and Context‐Awareness," in Workshop on The What, Who, Where, When, and How of Context‐Awareness, as part of 2000 Conference on Human Factors in Computing Systems (CHI 2000), Hague, Holland, 2000.

[WSAN27] P. Patel, J. Sunil, S. Chaudhary, P. Ranjan, and D. Ambani, "Context Aware Middleware Architecture for Wireless Sensor Network," in IEEE International Conference on Services Computing, 2009.

[WSAN28] Y. Hu, Z. Wu, and M. Guo, "Ontology Driven Adaptive Data Processing In Wireless Sensor Networks," in Infoscale '07, Suzhou, China, 2007.

[WSAN29] I. Horrocks et al., "SWRL: A Semantic Web Rule Language Combining OWL and RuleML". W3C member submission, 2004.

[WSAN30] S. Avancha, C. Patel, and A. Joshi, "Ontology-driven adaptive sensor networks," in MOBIQUITOUS, 2004.

[WSAN31] E. Dekneuvel., Intelligent Sensor: Analysis and Design, T. a. F. G. R. Zurawski, Ed. Embedded System Handbook, 2006.

[WSAN32] J. Cañada-Bago, M. A. Gadeo, J. A. Fernández, and V. J.R., "A Knowledge Based Wireless Sensor Network. ," in European Wireless Sensors Network (EWSN09), Cork, Ireland, 2009.

[WSAN33] T. Srinivasan, R. Chandrasekar, and V. Vijaykumar, "A fuzzy, energy-efficient scheme for data centric multipath routing in wireless sensor networks. ," in IFIP International Conference on Wireless and Optical Communications Networks., Bangalore, India,, 2006.

[WSAN34] C. X., H. T., R. R., and A. Elmaghraby, "A swarm-based fuzzy logic control mobile sensor network for hazardous contaminants localization. In Proceedings of the . ," in 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’04)., Fort Lauderdale, , 2004, p. 194–203.

[WSAN35] A. Kulakov and D. Davcev, "Tracking of unusual events in wireless sensor networks based on artificial neural-networks algorithms," in IEEE International Conference on Information Technology: Coding and Computing, Washington, DC, USA, 2005, pp. 534-539.

[WSAN36] E. Benoit, R. Dapoigny, and L. Foulloy, "Fuzzy-Based Intelligent Sensor: Modelling, Design, Application," in 8th IEEE International Conference on Emerging Technologies,, 2001, pp. 401-407,.

[WSAN37] A. Averkin and B. A.G., "Soft Computing in Wireless Sensors Networks," in EUSFLAT, Ostrava, Czech Republic., 2007, pp. 387-390.

[WSAN38] M. Marin-Perianu and P. Havinga, "D-FLER: A distributed fuzzy logic engine for rule-based wireless sensor networks," in International Symposium on Ubiquitous Computing Systems (UCS), Twente, Enschede, 2007, p. 86–101.

[WSAN39] J. Yick, B. Mukherjee, and D. Ghosal, "Wireless Sensor Network Survey," Computer Networks, vol. 52, no. 12, pp. 2295-2330, Aug. 2008.

[WSAN40] S. C. and J. T., "Web 2.0 and SOA: Converging concepts enabling the internet of services," IT Professional, vol. 9, no. 3, pp. 36-41, 2007.

[WSAN41] P. M. P., "Service-oriented computing: Concepts, characteristics and directions," in Proc. of WISE, Washington DC, USA, 2003.

[WSAn42] E. Meshkova, J. Riihijärvi, F. Oldewurtel, C. Jardak, and P. Mähönen, "Service-Oriented Design Methodology for Wireless Sensor Networks: A View through Case Studies," in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2008.

[WSAN43] M. R., Agile Software Development: Principles, Patterns, and Practices. NJ, USA: Prentice Hall PTR Upper Saddle River, 2005.

[WSAN44] S. I., Software Engineering. Addison Wesley, 2006.

[WSAN45] P. Pankesh, J. Sunil, C. Sanjay, and R. Prabhat, "Context Aware Middleware Architecture for Wireless Sensor Network," in IEEE International Conference on Service Computing, 2009.

[WSAN46] C. L. Fok, G. C. Roman, and C. Lu, "Enhanced Coordination in Sensor Networks through Flexible Service Provisioning," in 11th International Conference on Coordination Models and Languages, Lisboa, 2009, pp. 66-85.

[WSAN47] Evers, L., Havinga, P.J.M., Kuper, J., Lijding, M.E.M.; Meratnia, N., “SensorScheme: Supply chain management automation using Wireless Sensor Networks”, IEEE Conference on Emerging Technologies and Factory Automation, 2007. ETFA.

[WSAN48] M. Ivester, A. Lim, “Interactive and Extensible Framework for Execution and Monitoring of Wireless Sensor Networks”, First International Conference on Communication System Software and Middleware, 2006. Comsware 2006.

[WSAN49] Elson, J., Girod, L., Estrin, D., “EmStar: Development with high system visibility”. IEEE Wireless Communications, 2004.

[WSAN50] Levis, P., Lee, N., “TOSSIM: A simulator for TinyOS networks”. http://www.cs.berkeley.edu~pal/pubs/nido.pdf. 2006.

[WSAN51] B. Zhang, G. Li, “Analysis of Network Management Protocols in Wireless Sensor Network”, Proceedings of the International Conference on MultiMedia and Information Technology, pp. 546 – 549, 2008.

[WSAN52] W. L. Lee, A. Datta, and R. Cardell-Oliver, Network Management in Wireless Sensor Networks, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited by M. K. Denko and L. T. Yang, American Scientific Publishers, 2006.

[WSAN53] I.F. Akyildiz, T. Melodia and K.R. Chowdhury, “A Survey on Wireless Multimedia Sensor Networks”, Computer Networks Elsevier, 51, pp. 921–960, 2007.

[WSAN54] L. Frye and L. Cheng, “Network management of a WSN”, Technical Report LU-CSE-07-003. Lehigh University 2007.

[WSAN55] W. Liu, Y. Zhang, W. Lou, and Y. Fang, “Managing Wireless Sensor Network with Supply Chain Strategy,” Proceedings of the IEEE Quality of Service in Heterogeneous Wired/Wireless Networks, 2004.

[WSAN56] G. Tolle and D. Culler, “Design of an Application-Cooperative Management System for Wireless Sensor Networks,” Proceedings of the Second European Workshop on In Wireless Sensor Networks, 2005.

[WSAN57] W. Louis Lee, A. Datta, and R. Cardell-Oliver, “WinMS: Wireless Sensor network-Management system, An Adaptive Policy-based Management for Wireless Sensor Networks”. Technical Report UWA-CSSE-06-001, University of Western Australia, 2006.

[WSAN58] H. Song, D. Kim, K. Lee, and J. Sung, “Upnp-Based Sensor Network Management Architecture,” in Proceedings of the International Conference on Mobile Computing and Ubiquitous Networking, 2005.

[WSAN59] L.B. Ruiz, J.M. Nogueira, and A.A.F. Loureiro, “MANNA: A Management Architecture for Wireless Sensor Networks,” IEEE Communications Magazine, Vol. 41, No. 2, pp 116–125, 2003.

[WSAN60] G. Wagenknecht, M. Anwander, T. Braun, T. Staub, J. Matheka and S. Morgenthaler, “MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks”. In Proceedings of the International Conference on Wired/Wireless Internet Communications LNCS 5031, pp. 177–188, 2008.

[WSAN66] L. Atzori et al., The Internet of Things: A survey, Comput. Netw. (2010), doi:10.1016/ j.comnet.2010.05.010.

[WSAN67] http://bit.ly/LyJTjG

[WSAN61] http://intel.ly/iitOqe

[WSAN62] Kim Chang, Anthony Soong, Mitch Tseng, Zhixian Xiang, "Global Wireless Machine-to-Machine Standardization," IEEE Internet Computing, pp. 64-69, March/April, 2011.

[WSAN63] Niyato, D., Xiao, L., and Wang, P., “Machine-to-machine communications for home energy management system in smart grid”, IEEE Communications Magazine, pp. 53-39, vol 49, 2011.

[WSAN64] http://bit.ly/KY4eSp

[WSAN65] Yan Zhang, Rong Yu, Shengli Xie, Wenqing Yao, Yang Xiao, Mohsen Guizani: Home M2M networks: Architectures, standards, and QoS improvement. IEEE Communications Magazine 49(4), pp. 44-52, 2011.

[WSAN68] http://bit.ly/Oxvc11

[WSAN69] Zeng, D., Gou, S., Cheng, Z. “The Web of Things: A Survey”, (Invited Paper). Journal of Communications, North America, 6, sep. 2011.

[CA1] Fielding, R. T.; “Architectural Styles and the Design of Network-based Software Architectures,” Doctoral dissertation, University of California, Irvine, 2000.

[CA2] http://roy.gbiv.com/untangled/2008/rest-apis-must-be-hypertext-driven

[CA3] Richardson, L.; Ruby, S.; “RESTful Web Services,” O'Reilly, ISBN 0-596-52926-0, 2007.

[CA4] Vinoski, S.; "RPC and REST: Dilemma, Disruption, and Displacement," Internet Computing, IEEE , vol.12, no.5, pp.92-95, Sept.-Oct. 2008.

[CA5] Feng, X.; Shen, J.; Fan, Y.; "REST: An alternative to RPC for Web services architecture," Future Information Networks, 2009. ICFIN 2009, First International Conference on, vol., no., pp.7-10, 14-17 Oct. 2009.

[CA6] Vii, S.; "REST Eye for the SOA Guy," Internet Computing, IEEE, vol.11, no.1, pp.82-84, Jan.-Feb. 2007.

[CA7] http://sanitystack.blogspot.com.es/2007/01/leave-rest-to-soap.html

[CA8] McFaddin, S.; Coffman, D.; Han, J.H.; Jang, H.K.; Kim, J.H.; Lee, J.K.; Lee, M.C.; Moon, Y.S.; Narayanaswami, C.; Paik, Y.S.; Park, J.W.; Soroker, D.; , "Modeling and Managing Mobile Commerce Spaces Using RESTful Data Services," 9th International Conference on Mobile Data Management, pp.81-89, 27-30 April 2008.

[CA9] ITU-T Rec. Y.2001, “Next Generation Networks — Frameworks and Functional Architecture Models,” Dec. 2004.

[CA10] Murata, Y.; "Mobile-NGN architecture based on REST concept," Innovations for Digital Inclusions. ITU-T Kaleidoscope, pp.1-8, Aug. 31-Sept. 1 2009.

[CA11] Janowicz, K.; Bröring, A.; Stasch, C.; Schade, S.; Everding, T.; Llaves, A.; “A restful proxy and data model for linked sensor data,” International Journal of Digital Earth, 2011.

[CA12] Antila, V.; Mantyjarvi, J.; "Distributed RESTful Web Services for Mobile Person-to-Person Collaboration", Third International Conference on Next Generation Mobile Applications, Services and Technologies, pp.119-124, 15-18 Sept. 2009.

[CA13] Gang Li; Hongmei Sun; "RESTful Dynamic Framework for Services in Mobile Wireless Networks," International Conference on E-Business and Information System Security, pp.1-5, 23-24 May 2009.

[CA14] Belqasmi, F.; Glitho, R.; Chunyan Fu; "RESTful web services for service provisioning in next-generation networks: a survey," Communications Magazine, IEEE , vol.49, no.12, pp.66-73, December 2011.

[CA15] Aijaz, F.; Ali, S.Z.; Chaudhary, M.A.; Walke, B.; "Enabling resource-oriented Mobile Web Server for short-lived services," IEEE 9th Malaysia International Conference on Communications, pp.392-396, 15-17 Dec. 2009.

[CA16] Louridas, P.; "SOAP and Web Services," Software, IEEE, vol.23, no.6, pp.62-67, Nov.-Dec. 2006.

[CA17] AlShahwan, F.; Moessner, K.; "Providing SOAP Web Services and RESTful Web Services from Mobile Hosts," Fifth International Conference on Internet and Web Applications and Services (ICIW), pp.174-179, 9-15 May 2010.

[CA18] Aijaz, Fahad; Shaikh, Shuja Jamil; Walke, Bernhard; "Performance Analysis of a Framework for Multi-Interfaced Service Level Agreements on Mobile Devices," 11th European Wireless Conference 2011 - Sustainable Wireless Technologies, pp.1-8, 27-29 April 2011.

[CA19] http://www.contactology.com/email-marketing-api/

[CA20] Erbad, A.; Blackstock, M.; Friday, A.; Lea, R.; Al-Muhtadi, J.; "MAGIC Broker: A Middleware Toolkit for Interactive Public Displays," Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp.509-514, 17-21 March 2008.

[CA21] http://www.netdev.co.uk/conferencing.html

[CA22] https://addons.mozilla.org/en-US/firefox/addon/restclient

[CA23] http://restclient.org/

[CA24] http://tiggzi.com/home

[WSNwiki12] http://en.wikipedia.org/wiki/Wireless_sensor_network#Standards_and_specifications

[Environdata12] http://www.environdata.com.au/weather_sensors

[FK11] Farooq, M.O; Kunz, T. Operating Systems for Wireless Sensor Networks: A Survey. Sensors, 2011.

[NFC-FORUM12] NFC-Forum: http://www.nfc-forum.org/

[NFC12] http://www.nfcworld.com/2011/11/09/311213/apple-patents-sim-within-secure-element-technology/

[RFID12] http://en.wikipedia.org/wiki/Radio-frequency_identification

[RFC2616] http://tools.ietf.org/html/rfc2616

[SHB11] Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained Application Protocol (CoAP)," draft-ietf-core-coap-08 (work in progress), October 2011.

[She12] Z. Shelby, "CoRE Link Format,” draft-ietf-core-link-format-11 (work in progress), January 2012.

[MBL12] J. Maenpaa, J. Jimenez Bolonio, S. Loreto, "Using RELOAD and CoAP for Wide Area Sensor and Actuator Networking," EURASIP Journal on Wireless Communications and Networking, 2012.

[CPP12] B. Carballido, D. Pesch, R. de Paz, S. Fedor, and M. Boubekeur, "Constrained Application Protocol for Low Power Embedded Networks: A Survey," Extending Seamlessly to the Internet of Things (esIoT) 2012.

[BHG12] O. Bergmann, K.T. Hillmann, and S. Gerdes, "A CoAP-gateway for smart homes," in Proceedings of the International Conference on Computing, Networking and Communications (ICNC), 446-450, 2012.

[XMPP12] XMPP: http://xmpp.org/

[XML2008] Extensible Markup Language (XML) 1.0 (Fifth Edition), http://www.w3.org/TR/2008/REC-xml-20081126/

[ISOIEC10646] ISO (International Organization for Standardization), ISO/IEC 10646-1:2000. Information technology - Universal Multiple-Octet Coded Character Set (UCS).

[XML-Schema01] W3C, P. Biron et al, XML Schema Part 2: Datatypes (XML Schema 2), May 2001, (see: http://www.w3.org/TR/xmlschema-2/).

[JSON12] JSON: http://www.json.org/

[GEOJSON12] GeoJSON: http://www.geojson.org/

[SJSON12] Standard spatial data in JSON: http://www.directionsmag.com/articles/emerging-technology-ajax-and-geojson/122845

[EXI11] Efficient XML Interchange (EXI) Format 1.0, W3C Recommendation 10 March 2011. URL: http://www.w3.org/TR/exi/

[XML Infoset04] XML Information Set (Second Edition), J. Cowan and R. Tobin, Editors. World Wide Web Consortium, 24 October 2001, revised 4 February 2004. URL: http://www.w3.org/TR/xml-infoset

[EXI Measurements07] Efficient XML Interchange Measurements Note, W3C Working Draft 25 July 2007. URL: http://www.w3.org/TR/2007/WD-exi-measurements-20070725/

[DPWS06] S. Chan, et al, “Devices Profile for Web Services”, February 2006.(See http://schemas.xmlsoap.org/ws/2006/02/devprof/).

[UPnP08] “UPnP Device Architecture 1.0”, April 2008. (See http://www.upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.0.pdf).

[DPWS 1.1] “Devices Profile for Web Services Version 1.1”, OASIS Standard, July 2009. (See http://docs.oasis-open.org/ws-dd/dpws/1.1/os/wsdd-dpws-1.1-spec-os.pdf).

[WS-Discovery05] J. Beatty, et al, "Web Services Dynamic Discovery (WS-Discovery)", April 2005. (See http://schemas.xmlsoap.org/ws/2005/04/discovery).

[WS-Discovery 1.1] “Web Services Dynamic Discovery (WS-Discovery) Version 1.1”, OASIS Standard, July 2009. (See http://docs.oasis-open.org/ws-dd/discovery/1.1/os/wsdd-discovery-1.1-spec-os.pdf).

[SOAP-over-UDP04] H. Combs, et al, "SOAP-over-UDP", September 2004. (See http://schemas.xmlsoap.org/ws/2004/09/soap-over-udp).

[SOAP-over-UDP 1.1] “SOAP-over-UDP Version 1.1”, OASIS Standard, July 2009. (See http://docs.oasis-open.org/ws-dd/soapoverudp/1.1/os/wsdd-soapoverudp-1.1-spec-os.pdf).

[WS-Transfer] J. Alexander, et al, "Web Service Transfer (WS-Transfer)", September 2004. (See http://schemas.xmlsoap.org/ws/2004/09/transfer/).

[WS-MetadataExchange04] K. Ballinger, et al, "Web Services Metadata Exchange (WS-MetadataExchange)", September 2004. (See http://schemas.xmlsoap.org/ws/2004/09/mex/).

[WS-Eventing04] L. Cabrera, et al, "Web Services Eventing (WS-Eventing)", August 2004. (See http://schemas.xmlsoap.org/ws/2004/08/eventing/).

[Edw06] W. Keith Edwards, "Discovery Systems in Ubiquitous Computing," IEEE Pervasive Computing, 70-77, April 2006.

[MRP08] E. Meshkova, J. Riihijarvi, M. Petrova, and P. Mahonen, "A Survey on Resource Discovery Mechanisms, Peer-to-Peer and Service Discovery Frameworks," Computer Networks, 2097-2128, August 2008.

[GTK10] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, "Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services," IEEE Trans. Serv. Comput, 223-235, July 2010.

[MBB09] A. Noor Mian, R. Baldoni, and R. Beraldi, "A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks," IEEE Pervasive Computing, 66-74, January 2009.

[ZMN05] F. Zhu, M. W. Mutka, and L. M. Ni, "Service Discovery in Pervasive Computing Environments," IEEE Pervasive Computing, 81-90, October 2005.

[JLR10] C. Jennings, B. Lowekamp, E. Rescorla, S., Baset, and H. Schulzrinne, "REsource LOcation And Discovery (RELOAD) Base Protocol", draft-ietf-p2psip-base-11 (work in progress), October 2010.

[WSMan] “Web Services Management (WS-Management), (see http://dmtf.org/standards/wsman).

[DMTF05] “Distributed Management Task Force”, (see http://www.dmtf.org).

[HTTPS00] IETF RFC 2818, E. Rescorla, “HTTP over TLS (HTTPS)”, May 2000, (see http://www.ietf.org/rfc/rfc2818.txt ).

[SOAP1.2] W3C, M. Gudgin, et al, “SOAP Version 1.2 Part 1 (Messaging Framework)” and “2 (Adjuncts): Messaging Framework”, June 2003 (see: http://www.w3.org/TR/soap12-part1/ and http://www.w3.org/TR/2003/REC-soap12-part2-20030624 ).

[XML00] W3C, Extensible Markup Language (XML) 1.0, W3C Recommendation, October 2000, (see http://www.w3.org/TR/2000/REC-xml-20001006 ).

[XSD01] W3C, H. Thompson et al, XML Schema Part 1: Structures (XML Schema 1), May 2001, (See : http://www.w3.org/TR/xmlschema-1/ ).

[XPath1.0] W3C, J. Clark et al, XML Path Language Version 1.0 (XPath 1.0), November 1999, (see: http://www.w3.org/TR/1999/REC-xpath-19991116).

[WS-Addressing06] W3C, “Web Services Addressing 1.0 – Core, W3C Recommendation, May 2006, (see http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/ ).

[WS-Transfer] J.Alexander et al, “Web Service Transfer (WS-Transfer)”, September 2004 (see: http://specs.xmlsoap.org/ws/2004/09/transfer/WS-Transfer.pdf).

[WS-Enumeration04] W3C, “Web Services Enumeration”, September 2004 (see: http://schemas.xmlsoap.org/ws/2004/09/enumeration/ ).

[WS-Eventing04] L. Cabrera et al, “Web Services Eventing (WS-Eventing)”, August 2004 (see: http://schemas.xmlsoap.org/ws/2004/08/eventing ).

[WS-Security04] OASIS, A. Nadalin et al, Web Services Security: SOAP Message Security 1.0 (WS-Security 2004),March 2004, (see http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf ).

[WSMan1.1] “Web Services for Management (WS-Management) Specification”, version 1.1.0, DMTF standard, March 2010 (see http://dmtf.org/sites/default/files/standards/documents/DSP0226_1.1.pdf).

[OAuth12] http://oauth.net/

[OpenID12] http://openid.net/

[OEXCHANGE12] http://www.oexchange.org/

[JBSSL11] Janowicz, K.; Bröring, A.; Stasch, C.; Schade, S.; Everding, T.; Llaves, A.; “A restful proxy and data model for linked sensor data,” International Journal of Digital Earth, 2011.

[LS10] Li, W.; Svärd, P.; "REST-Based SOA Application in the Cloud: A Text Correction Service Case Study," 6th World Congress on Services (SERVICES-1), pp.84-90, 5-10 July 2010.

[SWS10] Shirazi, A.S.; Winkler, C.; Schmidt, A.; "SENSE-SATION: An extensible platform for integration of phones into the Web," Internet of Things (IOT), pp.1-8, Nov. 29-Dec. 1 2010.

[QLSZL11] Qin, W.; Li, Q.; Sun, L.; Zhu, H.; Liu, Y.; "RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources," IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), pp.197-204, 24-26 Oct. 2011.

[TEC12] http://www.tec-it.com/en/software/android/getblue/android-smartphone/Default.aspx

[LCHT07] Lee, R.; Chen, K.; Hsiao, C.; Tseng, C.; "A Mobile Care System With Alert Mechanism," IEEE Transactions on Information Technology in Biomedicine, vol.11, no.5, pp.507-517, Sept. 2007.

[Cdn12] http://cdn.intechopen.com/pdfs/5914/InTechA_mobile_device_based_ecg_analysi_system.pdf

[FG10] Farrahi, K.; Gatica-Perez, D.; "Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data," IEEE Journal of Selected Topics in Signal Processing, vol.4, no.4, pp.746-755, Aug. 2010.

[PRP09] Patil, P.R.; Revankar, P.; Joshi, P.; "The Application of Data Mining for Direct Marketing," 2009 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp.312-316, 16-18 Dec. 2009.

[Arduino12] http://arduino.cc/

[Amarino12] http://www.amarino-toolkit.net/

[ED10] Estrin, D.; ”Participatory sensing: applications and architecture [Internet Predictions]," Internet Computing, IEEE, vol.14, no.1, pp.12-42, Jan.-Feb. 2010.

[S09] Sheth, A.; "Citizen Sensing, Social Signals, and Enriching Human Experience," Internet Computing, IEEE, vol.13, no.4, pp.87-92, July-Aug. 2009.

[C97] http://www.cityofboston.gov/police/crimeprevention/cristop.asp Apte, C.; "Data mining: an industrial research perspective," Computational Science & Engineering, IEEE, vol.4, no.2, pp.6-9, Apr-Jun 1997.

[Realtimerome12] http://senseable.mit.edu/realtimerome/

[BCHLUVV11] Becker,R.; Caceres,R; Hanson, K; Loh,J.M.; Urbanek, S.; Varshavsky,A.;Volinsky,C.; “Clustering anonymized mobile call detail records to find usage groups,” Ist Workshop on Pervasive Urban Applications, 2011.

[VPBFO11] Veloso,M.; Phithakkitnukoon,S.; Bento,C.; Fonseca,N.; Olivier,P.; ”Exploratory Study of Urban Flow using Taxi Traces,” Ist Workshop on Pervasive Urban Applications, 2011.

[YHY08] Yin,X.; Han,J.; Yu, P.S.; ,”Truth discovery with multiple conflicting information providers on the web,” IEEE Trans. on Knowl. and Data Eng., 20:796–808, June 2008.

[Dietsense12] http://urban.cens.ucla.edu/projects/dietsense/

[Nericell12] http://research.microsoft.com/en-us/projects/nericell/

[Obsairve12] http://www.obsairve.eu

[itunes12] http://itunes.apple.com/us/app/obsairve/id490939811?mt=8

[Noxdroid12] http://www.noxdroid.org/?p=project

[Sparkfun12] http://www.sparkfun.com/products/10748

[LPT12] http://www.xml.com/lpt/a/1281

[Xforms12] http://partners.adobe.com/public/developer/en/xml/xfa_spec_3_3.pdf

[NOKIA12] http://projects.developer.nokia.com/XFormsJ2ME

[Chiba12] http://chiba.sourceforge.net/

[XFA12] http://xml.coverpages.org/spec_xhtml-fml.html



[Mitchell11] Mitchell, Michael J., "Context and Bio-Aware Mobile Applications" (2011). Electronic Theses, Treatises and Dissertations. Paper 2376. http://diginole.lib.fsu.edu/etd/2376

[DAML Spec] Darpa Agent Markup Language specification, available at http://www.daml.org/

[DAML+OIL] Darpa Agent Markup Language, Ontology Integration Layer specification, available at http://www.w3.org/TR/daml+oil-reference

[Guo2010] Guo Junjie; Tang Liantao;, "A SUMO-Based Ontology of Expressway Network for Domain Knowledge Management," International Conference on Optoelectronics and Image Processing (ICOIP), vol.1, pp.177-180, Nov. 2010.

[OGCSpec] Open Geospatial Consortium sensorML specification, available at http://www.opengeospatial.org/standards/sensorml

[OWL2009] OWL 2 Web Ontology Language: Structural Specification and Functional-Style Syntax Boris Motik, Peter F. Patel-Schneider, Bijan Parsia, eds. W3C Recommendation, 27 October 2009, http://www.w3.org/TR/2009/REC-owl2-syntax-20091027/

[Pease-2003] Pease, A., "SUMO: a sharable knowledge resource with linguistic inter-operability," International Conference on Natural Language Processing and Knowledge Engineering. Proceedings. Vol., no., pp. 827, Oct- 2003.

[RDF2004] RDF/XML Syntax Specification (Revised), Dave Beckett, Editor, W3C Recommendation, 10 February 2004, http://www.w3.org/TR/2004/REC-rdf-syntax-grammar-20040210/

[RDFSpec] Resource Description Framework specification, available at http://www.w3.org/RDF/

[SA-REST] SA-REST: Semantic Annotation of Web Resources - W3C Member Submission 2010 - http://www.w3.org/Submission/SA-REST/

[SUMO-Portal] Suggested Upper Merged Ontology (SUMO), available at http://www.ontologyportal.org/

[WSDL-S Spec] Web Service Description Language for Semantics, available at http://www.w3.org/Submission/WSDL-S/

[Ardagna07] D. Ardagna, M. Comuzzi, E. Mussi, B. Pernici, and P. Plebani. Paws: A framework for executing adaptive web-service processes. IEEE Software, 24:39-46, 2007..

[Chinnici07] R. Chinnici, J.-J. Moreau, A. Ryman, and S. Weerawarana. Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. World Wide Web Consortium, Recommendation REC-wsdl20-20070626, June 2007.

[Fujii06] K. Fujii and T. Suda. Semantics-based dynamic web service composition. Int. J. Cooperative Inf. Syst., 15(3):293-324, 2006.

[Fujii09] K. Fujii and T. Suda. Semantics-based context-aware dynamic service composition. TAAS, 4(2), 2009.

[Hull05] R. Hull and J. Su. Tools for composite web services: a short overview. SIGMOD Record, 34(2):86-95, 2005.

[Kavantzas05] N. Kavantzas, D. Burdett, G. Ritzinger, T. Fletcher, Y. Lafon, and C. Barreto. Web services choreography description language version 1.0. World Wide Web Consortium, Candidate Recommendation CR-ws-cdl-10-20051109, November 2005.

[Kuster05] U. Kuster, M. Stern, and B. Konig-Ries. A classification of issues and approaches in automatic service composition. In Intl. Workshop WESC 05, 2005.

[Majithia04] S. Majithia, D. W. Walker, and W. A. Gray. A framework for automated service composition in service-oriented architectures. In C. Bussler, J. Davies, D. Fensel, and R. Studer, editors,ESWS, volume 3053 of Lecture Notes in Computer Science, pages 269-283. Springer, 2004.

[OASIS06] Orgnization for the Advancement of Structured Information Standards (OASIS). Web Services Composite Application Framework. Internet (http://www.oasisopen.org/committees/ ), 2006.

[OASIS07] OASIS. Web services business process execution language version 2.0. Padra o, April 2007.

[Papazoglou07] M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service-oriented computing: State of the art and research challenges.IEEE Computer, 40(11):38-45, 2007.

[RomanEtAl05] Roman, D., Keller, U., Lausen, H., de Bruijna, J., Lara, R., Stollberg, M., Polleres, A., Feier, C., Bussler, C., Fensel, D., “Web Service Modeling Ontology”, Applied Ontology 1 (2005) pp. 77–106, IOS Press, 2005[Service07] O. S. Collaboration. Service Component Architecture. Internet (http://www.osoa.org/display/Main/Service+Component+Architecture+Home) , 2007.

[OASIS-Security] Web Services Security: SOAP Message Security 1.1, http://www.oasis-open.org/committees/download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf, 01/02/2006.

[XML-Security] Getting Started With XML Security, http://home.comcast.net/~fjhirsch/xml/xmlsec/starting-xml-security.html, 2002.

[OASIS-WSS] OASIS Web Services Security (WSS) TC, http://www.oasis-open.org/committees/wss/ipr.php

[W3C-XML] XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenc-core/, 10/12/2002.

[OASIS-DPWS] OASIS Devices Profile for Web Services (DPWS) Version 1.1, http://docs.oasis-open.org/ws-dd/dpws/1.1/os/wsdd-dpws-1.1-spec-os.pdf, 01/07/2009.

[W3C-Encription] Researchers crack W3C encryption standard for XML,

http://arstechnica.com/business/news/2011/10/researchers-break-w3c-encryption-standard-for-xml.ars, 21/10/2011.

[XML-Encryption] How to Break XML Encryption, http://www.nds.rub.de/media/nds/veroeffentlichungen/2011/10/22/HowToBreakXMLenc.pdf, 21/10/2011.

[W3C-patent] W3C Patent Policy, http://www.w3.org/Consortium/Patent-Policy-20040205,

[Cryptographic Object] Distributed cryptographic object method, United States Patent 5 898 781, http://patft.uspto.gov/, 27/04/1999.

[XML-Encryption-2004] XML encryption scheme, United States Patent 6 694 433, http://patft.uspto.gov/, 17/02/2004.

[XML-Signature] XML Signature Syntax and Processing Version 2.0, http://www.w3.org/TR/2012/CR-xmldsig-core2-20120124/#sec-MessageDigests, 24/01/2012.

[Key-Validation] Key validation scheme, United States Patent 7 215 773, http://patft.uspto.gov/, 08/05/2007.

[Strengthened-PublicKey] Strengthened public key protocol, United States Patent 6 563 928, http://patft.uspto.gov/, 13/05/2003.

[W3C-Patent] W3C Patent Policy, http://www.w3.org/Consortium/Patent-Policy-20040205, 05/02/2004.

[Signature-Smartcard] Digital signatures on a Smartcard, United States Patent 6 704 870, http://patft.uspto.gov/, 09/03/2004.

[Amazon-AWSattack] Researchers demo cloud security issue with Amazon AWS attack, http://www.networkworld.com/news/2011/102611-researchers-demo-cloud-security-issue-252403.html, 26/10/2011.

[XMLsignature-Best Parctice] XML Signature Best Practices, http://www.w3.org/TR/xmldsig-bestpractices/, 09/08/2011.

[XML-Patent] XML Security Patent Advisory Group Charter, http://www.w3.org/2011/02/xmlsec-pag-charter.html, 03/08/2011.

[Cavoukian, 2007] A. Cavoukian. Guidelines for the use of video surveillance cameras in public places. Information and Privacy Commissioner of Ontario, Canada, 2007.

[Cavoukian, 2012] A. Cavoukian. Beware of “Surveillance by Design:” Stand Up for Freedom and Privacy. Information and Privacy Commissioner of Ontario, Canada, January 2012.

[Cavoukian, 2009] A. Cavoukian. Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada, 2009.

[Gürser et al., 2011] S. F. Gürses, C. Troncoso, and C. Diaz. Engineering privacy by design. In Computers, Privacy & Data Protection, 2011.

[Cavoukian, 2008] A. Cavoukian. Privacy and Video Surveillance in Mass Transit Systems: A Special Investigation Report. Privacy Investigation Report MC07-68, March 3, 2008.

[Harris et al., 1988] C. Harris and M. Stephens. A combined corner and edge detection. In Proceedings of The Fourth Alvey Vision Conference, pages 147–151, 1988.

[Tuytelaars et al., 2008] T. Tuytelaars, K. Mikolajczyk. Local Invariant Feature Detectors: A Survey. Now Publishers Inc. 2008.

[Smith & Brady, 1997] S. M. Smith and J. M. Brady. SUSAN - a new approach to low level image processing. Int. Journal of Computer Vision, 23(1):45–78, May 1997.

[Rosten et al., 2005] E. Rosten and T. Drummond. Fusing points and lines for high performance tracking. In Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on, volume 2, pages 1508–1515 Vol. 2, 2005.

[Rowley et al., 1998] H. A. Rowley, S. Baluja, and T. Kanade. Neural network-based face detection. PAMI, (1):23–38, January 1998.

[Schneiderman et al., 2000] H. Schneiderman and T. Kanade. A statistical method for 3D object detection applied to faces and cars. In CVPR, 2000.

[Viola et al., 2001] P. Viola and M. Jones. Rapid object detection using a boosted cascade of simple features. In CVPR, 2001.

[Huang et al., 2007] C. Huang, H. Ai, Y. Li, and S. Lao. High performance rotation invariant multiview face detection. PAMI, 29(4):671–686, April 2007.

[Frome et al., 2009] A. Frome, G. Cheung, A. Abdulkader, M. Zennaro, B. Wu, A. Bissacco, H. Adam, H. Neven, and L. Vincent. Large-scale privacy protection in google street view. In ICCV, 2009.

[Hoiem et al., 2006] D. Hoiem, A. A. Efros, and M. Hebert. Putting objects in perspective. In CVPR, 2006.

[Cheung et al., 2006] Sen-Ching Samson Cheung, Jian Zhao, and M Vijay Venkatesh. Efficient Object-Based Video Inpainting. In Proceedings of the International Conference on Image Processing, pages 705–708, 2006.

[Pankati et al., 2005] Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. Enabling Video Privacy through Computer Vision. IEEE Security & Privacy Magazine, 3(3):50–57, 2005.

[Tansuriyavong et al., 2001] S.Tansuriyavong, S. Hanaki. Privacy Protection by Concealing Persons in Circumstantial Video Image. In Proceedings of the Workshop on Perceptive User Interfaces, page 4, 2001.

[Zhang et al., 2005] W. Zhang, SS Cheung, and M. Chen, “Hiding privacy information in video surveillance system” in Proc. IEEE Int. Conf. Image Process., Genova, Italy, Sep. 2005.

[Newton et al., 2003] E. Newton, L. Sweeney, and B. Malin, “Preserving Privacy by De-identifying Facial Images”, Carnegie Mellon University,Technical Report CMU-CS-03-119, 2003.

[Youtube Privacy] YouTube Tool Blurs Faces To Protect Privacy, 29 March 2012.

http://www.informationweek.com/news/security/privacy/232700524

[Chinomi et al., 2008] Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, and Noboru Babaguchi. PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. In Proceedings of the International Multimedia Modeling Conference, pages 144–154, 2008.

[Wickramasuriya et al., 2004] Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. Privacy Protecting Data Collection in Media Spaces. In Proceedings of the International Conference on Multimedia, pages 48–55,2004.

[Boyle et al., 2000] Michael Boyle, Christopher Edwards, and Saul Greenberg. The Effects of Filtered Video on Awareness and Privacy. In Proceedings of the Conference on Computer Supported Cooperative Work, pages 1–10, 2000.

[Gross et al., 2006] R. Gross, L. Sweeney, F. De Torre, S. Baker. Model-Based Face De-Identification. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, page 8, 2006.

[Zeng et al., 1999] W. Zeng and S. Lei, “Efficient Frequency Domain Video Scrambling for Content Access Control”, in Proc. ACM Multimedia, Orlando, FL, Oct. 1999.

[Dufaux et al., 2006] Frederic Dufaux and Touradj Ebrahimi. Scrambling for Video Surveillance with Privacy. In Proceedings of the International Conference on Computer Vision and Pattern Recognition Workshop, pages 160–166, 2006.

[Dufaux et al., 2004] F. Dufaux and T. Ebrahimi, “Video Surveillance using JPEG 2000”, SPIE Proc. Appl. of Digital Image Proc., Denver, CO, Aug. 2004.

[Ponte et al., 2005] I. Martinez Ponte, X. Desurmont, J. Meessen, and J.-F. Delaigle, "Robust Human Face Hiding Ensuring Privacy" in Proc. Of International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, April 2005.

[Taubman & Marcellin] D. Taubman and M. Marcellin, “JPEG 2000: Image Compression Fundamentals, Standards and Practice”, Kluwer Academic Publishers, 2002.

[Dufaux et Ebrahimi, 2006] F. Dufaux and T. Ebrahimi, “Region-Based Transform-Domain Video Scrambling”, in SPIE Proc. Visual Communications and Image Processing 2006, San Jose, CA, Jan. 2006.

[Dufaux et Ebrahimi, 2010] F. Dufaux, T. Ebrahimi. A Framework for the Validation of Privacy Protection Solutions in Video Surveillance. In Proceedings of the International Conference on Multimedia and Expo, pages 66–71, 2010.

[Abomhara et al., 2010] Abomhara, M., O. Zakaria, H. O. Alanazi,O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010. Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. 2010.

[Spindler et al., 2006] T. Spindler, C. Wartmann , L. Hovestadt , D. Roth , L. van Gool , A. Steffen. Privacy in video surveilled areas. Proceedings of the 2006 International Conference on Privacy, Security and Trust, 2006.

[Alanazi et al., 2010] Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2: 152-157.

[Zakaria et al., 2010] Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010. Enhancing selective encryption for H.264/AVC using advance encryption standard. Int. J. Comput. Electr. Eng., 2: 223-229.

[Furht et al., 2005] Furht, B., Muharemagic, E. & Socek, D. Multimedia encryption and watermarking, Springer-Verlag, New York., 2005.

[Khalifa et al., 2010] M. Abomhara, Omar Zakaria, Othman O. Khalifa. An Overview of Video Encryption Techniques. International Journal of Computer Theory and Engineering, 2010.

[Alvarez et al., 2004] Alvarez, G., Montoya, F., Romera, M. & Pastor, G. (2004). Breaking two secure communication systems based on chaotic masking, IEEE Transaction on Circuit and Systems II: Express Briefs Vol.51(No.10): 505–506.

[Qian et al., 2010] He, J., Qian, H., Zhou, Y. & Li, Z. (2010). Cryptanalysis and improvement of a block cipher based on multiple chaotic systems, Mathematical Problems in Engineering Vol.2010: 14 Pages.

[Solak, 2005] Solak, E. (2005). Cryptanalysis of observer based discrete-time chaotic encryption schemes, International Journal of Bifurcation and Chaos Vol.2(No.15): 653–658.

[Alvarez and Li, 2006] Alvarez, G. & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems, International Journal of Bifurcation and Chaos Vol.16(No.7): 2129–2151.

[Cheng and Li, 2000] Cheng, H. & Li, X. (2000). Partial encryption of compressed images and videos, IEEE Transactions on Signal Processing Vol.48(No.8): 2439–2451.

[Benedett et al., 2002] Droogenbroeck, M. & Benedett, R. (2002). Techniques for a selective encryption of uncompressed and compressed images, Proceedings of ACIVS 2002, IEEE Press, Ghent, Belgium, pp. 90–97.

[Pommer & Uhl, 2003] Pommer, A. & Uhl, A. (2003). Selective encryption of wavelet-packet encoded image data: efficiency and security, Multimedia Systems Vol.9(No.3): 279–287.

[El-Khamy et al., 2009] El-Khamy, S., El-Nasr, M. & El-Zein, A. (2009). A partial image encryption scheme based on the dwt and elknz chaotic stream cipher, MASAUM Journal of Basic and Applied Sciences Vol.1(No.3): 389–394.

[Boult, 2005] T. E. Boult. PICO: Privacy through Invertible Cryptographic Obscuration. In Proceedings of the Workshop on Computer Vision for Interactive and Intelligent Environments, pages 27–38, 2005.

[Upmanyu et al., 2009] Upmanyu, M. Namboodiri, A.M. Srinathan, K. Jawahar, C.V. Efficient privacy preserving video surveillance. IEEE 12th International Conference on Computer Vision, 2009.

[Rahman et al., 2012] Rahman, Sk., Hossain, M., Mouftah, Hussein, El Saddik, Abdulmotaleb, Okamoto, Eiji. Chaos-cryptography based privacy preservation technique for video surveillance. Multimedia Systems Journal, Vol. 18, 2012.

[Schaffer & Schartner, 2007] Martin Schaffer and Peter Schartner. Video Surveillance: A Distributed Approach to protect Privacy. In Proceedings of the International Conference on Communications and Multimedia Security, pages 140–149, 2007.

[Cavoukian & Stoianoy, 2007] A. Cavoukian, A. Stoianov. Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy. Information and Privacy Commissioner of Ontario, Canada, March 2007.

[Senior et al., 2003] AW Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin. Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Technical Report RC22886, 2003.

[Winkler&Rinner, 2012] Winkler T., Rinner B.: Security and Privacy Protection in Visual Sensor Networks: A Survey. Klagenfurt: Alpen-Adria-Universität Klagenfurt, März 2012, 46 pp.

[Security Alliance, 2009] Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Prepared by the Cloud Security Alliance, December 2009.

[Nourian et al., 2011] A. Nourian, M. Maheswaran. Privacy and Security Requirements of Data Intensive Computing in Clouds. Handbook of Data Intensive Computing, chapter 19, 2011.

[Mirkovic et al., 2004] J. Mirkovic, P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM CCR 34 (2) (2004) 39–53.

[Prolexic] Prolexic, company profile: http://www.prolexic.com/company/index.html

[Kishi, 2005] G. Kishi. "Method and system for shredding data within a data storage subsystem". U. S. Patent 7308543B2, March, 2005.

[Gutmann, 1996] Peter Gutmann, "Secure deletion of data from magnetic and solid-state memory," in Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, 1996, pp. 8-8.

[Juels&Kaliski,1996] A. Juels and B. Kaliski, "Proofs of retrievability for large files" in CCS '07:Proceedings of the 14th ACM conference on Computer and communications security, 2007 pp. 584-597.

[Paul&Saxena, 2010] Mithun Paul and Ashutosh Saxena. “Zero Data Remnance proof in cloud storage”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.

[Brandel, 2010] Video surveillance as a service: VsaaS dos and don'ts. By M. Brandel, October, 2010. Available online at: http://www.networkworld.com/news/2010/101210-video-surveillance-as-a-service.html

[Salient, 2010] Deploying VSaaS and Hosted Solutions using CompleteView. Salient System Corporation, 2010. Available online at: www.salientsys.com

[Brandel2, 2010] VsaaS: The basics of surveillance as a service. By M. Brandel, October, 2010. Available online at: http://www.csoonline.com/article/622365/vsaas-the-basics-of-surveillance-as-a-service

[AVHS] Axis Video Hosting System: Configuration-free camera connection. Available at: http://www.axis.com/products/avhs/flash.htm

[Archerfish] Archerfish Solo Video Surveillance and Recording System: http://www.myarcherfish.com/products/archerfish-solo

[AVHS2] Axis Video Hosting System: http://www.axis.com/products/avhs/index.htm

[NVMS] DvTel Latitude NVMS Platform: http://www.dvtel.com/products/isoc/network-video-management-system

[LorexIP] Lorex IP network camera: http://www.lorextechnology.com/IP-camera/IP-network-camera/2100.p

[Rogo] Rogo: High-tech video monitoring, at a low-tech price: http://www.rogo.com/

[VIAAS] How VIAAS Works: Cloud-Based Service: http://www.viaas.com/how-viaas-works/cloud-based-service.html

[Honovich, 2011] Video Surveillance as a Service (VSaaS) Comparison 2010. J. Honovich, IPVM posted on Jul 22, 2011. Available at: http://ipvm.com/report/hosted__managed_video_surveillance_comparison_2009

[EMC] Network Attached Storage Solutions by Iomega, an EMC Company: http://iomega.com/nas/network-attached-storage.html

[Moonblink] Moonblink’s Video Surveillance as a Service. Video Surveillance as a Service (VSaaS) for Cost-Effective Video Surveillance, available at: http://cloud.moonblink.com/templates/ibusiness/files/MB_VSaaS_Overview.pdf

[Iomega] Iomega StorCenter px4-300r Network Storage Array, Server Class Series: http://go.iomega.com/es/products/network-attached-storage-nas/px4-px6/px4-300r-sc/?partner=4715#overviewItem_tab

[IMS] IMS Research, Press Releases: Video Surveillance as a Service (VsaaS) Market Set to Double over Next Three Years. Date: 19 March 2012. Available at: http://imsresearch.com/press-release/Video_Surveillance_as_a_Service_VsaaS_Market_Set_to_Double_over_Next_Three_Years

[Cloud'N'Sci] Algorithms-as-a-Service UserGuide. Conceptual design of Cloud'N'Sci.fi. Available at: http://cloudnsci.fi/wiki/index.php?n=UserGuide.ConceptualDesign (Page last modified on April 02, 2012, Copyright © Cloud'N'Sci Ltd 2011).

[Tucker, 2010] The Future of Cloud - Algorithms As A Service?, by Floyd Tucker on Mar 27, 2010. Available at: http://www.dreamsimplicity.com/saas-blog/the-future-of-cloud-algorithms-as-a-service-.html

[Google Prediction] Google Prediction API website: http://code.google.com/apis/predict/

[Beklen et al., 2010] Beklen A, Bilgin TT; “Data Mining Governance for Service Oriented Architecture”, SERVICE COMPUTATION 2010, Conference Proceedings of The Second International Conferences on Advanced Service Computing, Lisbon (2010).

[SimpleGeo Blog] SimpleGeo, Engineering Blog: http://developers.simplegeo.com/

[SimpleGeo] SimpleGeo App Showcase: http://apps.simplegeo.com/

[Open Calais] The Open Calais Web Service: http://www.opencalais.com/about

[Cloud'N'Sci Catalog] Cloud'N'Sci.fi Algorithm Catalog: http://cloudnsci.fi/algorithm/catalog





Download 0.72 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   12




The database is protected by copyright ©ininet.org 2024
send message

    Main page