2014
DOI: 10.1007/s11042-014-2095-y
|View full text |Cite
|
Sign up to set email alerts
|

Advanced verification on WBAN and cloud computing for u-health environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…However, the work was based on the existing routing schemes (similar to [32,39]) and presented a theoretical analysis. Wireless network protocols such as the Bluetooth device discovery, and those encompassing the wireless sensor and local area networks, have been verified extensively in the literature [43]. However, the verification of opportunistic routing of offloaded data received less attention comparatively.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the work was based on the existing routing schemes (similar to [32,39]) and presented a theoretical analysis. Wireless network protocols such as the Bluetooth device discovery, and those encompassing the wireless sensor and local area networks, have been verified extensively in the literature [43]. However, the verification of opportunistic routing of offloaded data received less attention comparatively.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Records the N_IDs of Com-N, N_IDs of Ds of messages to be relayed by CI, ICT-based utilities of Com-N. specification, and verification of the correctness of systems [43]. Model checking is a verification technique, used to verify the properties of a system.…”
Section: Verification Of Hsm Far and Ubsmentioning
confidence: 99%
See 1 more Smart Citation
“…AODVLP can be further improved by limiting overhead of unnecessary control messages To solve the above discussed problems in the table 1, [19][20][21][22][23][24][25], we have proposed a novel approach based on hybrid technique. Like [29][30][31] our work is also multi-objective i.e.…”
Section: Related Workmentioning
confidence: 99%
“…The IoT can be implemented through various areas of technology such as wireless/broadband connectivity, sensors, cloud services, and data analytics, and the wireless connectivity is an indispensable component for the creation of a large-scale IoT [6][7][8]. Here, we consider the technological features that wireless connectivity technologies should have for the IoT.…”
Section: Introductionmentioning
confidence: 99%