2016 IEEE Tenth International Conference on Semantic Computing (ICSC) 2016
DOI: 10.1109/icsc.2016.75
|View full text |Cite
|
Sign up to set email alerts
|

Using Semantic Queries to Enable Dynamic Service Invocation for Processes in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Some other recent applications of QE are plagiarism detection [203], event search [89,15,43], text classification [269], patent retrieval [180,181,268], dynamic process in IoT [122,123], classification of e-commerce [128], biomedical IR [1], enterprise search [174], code search [205], parallel computing in IR [179] and twitter search [151,304]. Table 7 summarizes some of the prominent and recent applications of QE in literature based on the above discussion.…”
Section: Other Applicationsmentioning
confidence: 99%
“…Some other recent applications of QE are plagiarism detection [203], event search [89,15,43], text classification [269], patent retrieval [180,181,268], dynamic process in IoT [122,123], classification of e-commerce [128], biomedical IR [1], enterprise search [174], code search [205], parallel computing in IR [179] and twitter search [151,304]. Table 7 summarizes some of the prominent and recent applications of QE in literature based on the above discussion.…”
Section: Other Applicationsmentioning
confidence: 99%
“…MobIoT takes care of registry performance and search functionality [47]. In [48] a resource detection infrastructure has been developed based on Q-learning techniques to enable context awareness. In this method, heterogeneous neighboring detection protocol are developed which reduce energy dissipation and detection delay.…”
Section: Introduction To Resource Detection In Iot and Big Datamentioning
confidence: 99%
“…The protocol has been developed based on the clouds and enterprise computing environment. Huber et al (2016) presents the semantic access method for the internet of things and this helps to make the communication between the web services and IoT devices. This technique uses the capability based scheme and for the resource allocation process used the context sensitive method.…”
Section: Introductionmentioning
confidence: 99%