2010 IEEE Globecom Workshops 2010
DOI: 10.1109/glocomw.2010.5700330
|View full text |Cite
|
Sign up to set email alerts
|

Context-aware location in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…The ICT of service-oriented architectures shift the paradigm of energy measurement from host-centric to content-centric [8]. Meanwhile, the paradigm of energy services shifts from inventory-centric to just-in-time, which enables sustainable energy services by dynamic monitoring and decision systems [9].…”
Section: International Journal Of Distributed Sensor Networkmentioning
confidence: 99%
“…The ICT of service-oriented architectures shift the paradigm of energy measurement from host-centric to content-centric [8]. Meanwhile, the paradigm of energy services shifts from inventory-centric to just-in-time, which enables sustainable energy services by dynamic monitoring and decision systems [9].…”
Section: International Journal Of Distributed Sensor Networkmentioning
confidence: 99%
“…Numerous activist groups have established their concepts .Uncontrolled environment (visibility, availability, and confidence), variety, scalability, interactive, plurality, intimacy, vast array interdependence, unattendedness, and shared resource efficiency have some features or aspects of IoT [2]. This is the major objectives performed in IoT are object confirmation, action triggering, object processing and object activation [3]. • RFID (Radio Frequency Identification): It's one of IoT's key components and it is a relatively small a bonding visible that have just receives the signals as good.…”
Section: Introductionmentioning
confidence: 99%
“…WoT is inherently closely connected to its context. Nearly all applications in WoT are designed to be context‐aware . Obviously, context information, including environment context, temporal context, user context, and system context, must be considered in the security and privacy issues of WoT.…”
Section: Introductionmentioning
confidence: 99%