2012 8th International Symposium on Communication Systems, Networks &Amp; Digital Signal Processing (CSNDSP) 2012
DOI: 10.1109/csndsp.2012.6292779
|View full text |Cite
|
Sign up to set email alerts
|

Machine-to-Machine communication and data processing approach in Future Internet applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…However, the Event Manager remains a black box component without any details about its design or technology. In a similar manner, Walczak et al (2012), Glezer et al (2007), and Isoyama et al (2011) suggest to employ complex event processing for handling of streams of machine data. Walczak et al (2012) report no concrete design details.…”
Section: M2m Systems and Event Processingmentioning
confidence: 97%
“…However, the Event Manager remains a black box component without any details about its design or technology. In a similar manner, Walczak et al (2012), Glezer et al (2007), and Isoyama et al (2011) suggest to employ complex event processing for handling of streams of machine data. Walczak et al (2012) report no concrete design details.…”
Section: M2m Systems and Event Processingmentioning
confidence: 97%
“…Today's trendy instant messaging service WhatsApp, which is also based on XMPP technology, although customized to fit their needs, now has over 350 million monthly users. XMPP is also utilized as a basis for many other commercial products and solutions, and is used, e.g., in gaming, geolocation and cloud computing [37], but also in sensing of campus areas [42], smart cities [43] and home environments [44], [12], [45], public transport [46], disaster management [47], [48], to retrieve Internet Abuse handling related information, in smart grids [49] and cyber security exercises, and in medical instruments and systems to monitor patients [6], [50], [51]. The potential of the XMPP technology is huge and, as we can see, some of the biggest companies are utilizing that potential on their top end products and services.…”
Section: The Extensible Messaging and Presence Protocol (Xmpp)mentioning
confidence: 99%
“… XEP-0060: Publish-Subscribe [64] provides generic publishsubscribe functionalities such as creating and managing nodes and publishing information at nodes, and subscribing to nodes. Pubsub is used in several XMPP based IoT and M2M systems, such as in [52], [10], [42] and [12] [79] defines practices for using the XMPP's pubsub to persistently store semi-public data objects such as public keys and personal profiles. In M2M systems this public information may be, e.g, public key of a sensor or an actuator.…”
Section: E Relevant Informational Final and Draft Standards Xmpp Exmentioning
confidence: 99%
“…Karnouskos [15] supports such an approach, and points out that communication between objects and other entities, with "alternative energy resources which are smaller and decentralized," is one way to "achieve common goals such as energy efciency." Walczak et al [16] also describe M2M communication as part of the IoT and the Future Internet Engineering.…”
Section: Related Workmentioning
confidence: 99%
“…When an object has the chance to get powered, it sends a message to the next-in-line object, which can be either of the same priority but with a higher power demand (lines [11][12][13][14], or one of the next lower priority (lines 7-10). The second part of the Power Algorithm (lines [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30] describes the behavior of objects upon receiving such a message. In the first place, objects check if the message was directed to them (lines [17][18].…”
Section: B Algorithms: Flood Exploration Exit and Powermentioning
confidence: 99%