期刊文献+

Smart Body Sensor Object Networking 被引量:2

Smart Body Sensor Object Networking
下载PDF
导出
摘要 This paper discusses smart body sensor objects (BSOs), including their networking and internetworking. Smartness can be incorpo-rated into BSOs by embedding virtualization, predictive analytics, and proactive computing and communications capabilities. A few use cases including the relevant privacy and protocol requirements are also presented. General usage and deployment eti-quette along with the relevant regulatory implications are then discussed. This paper discusses smart body sensor objects (BSOs), including their networking and internetworking. Smartness can be incorpo-rated into BSOs by embedding virtualization, predictive analytics, and proactive computing and communications capabilities. A few use cases including the relevant privacy and protocol requirements are also presented. General usage and deployment eti-quette along with the relevant regulatory implications are then discussed.
出处 《ZTE Communications》 2014年第3期38-45,共8页 中兴通讯技术(英文版)
关键词 body sensor objects body sensor networking object VIRTUALIZATION predictive analytics body sensor usage etiquette body sensor objects body sensor networking object virtualization predictive analytics body sensor usage etiquette
  • 相关文献

参考文献28

  • 1A. S. EsguevilJas, B. Carro, B. Khasnabish, and A. Gupta, "Guest editorial: Applications and support technologies for mobility and enterprise services," IEEE Wireless Communications Magazine, vol. 16, no. 3, pp. 6-7, Jun. 2009. 被引量:1
  • 2H. Tschofenig and J. Arkko. (2012, Apr.). Report from the smart object workshop. [Online]. Available: http://tools.ietf.orglrfclrfc6574.txt. 被引量:1
  • 3B. Khasnabish. (2012 Sept.). Mobile cloud for personalized any-media services. ZTE Communications [Online]. 10(3), pp. 47-54. Available: http://tinyurl.com/ bhurnip-mobile-cloud. 被引量:1
  • 4J. Gilger and H. Tschofenig. (2012 Oct.). Smart object security workshop report. [Online]. Available: http://tools.ietf.orglidldraft - gilger - smart - object - security - workshop-OO.txt. 被引量:1
  • 5IETF. (2014). Light- Weight Implementation Guidance (LWIG) activities. [Online]. Available: http://datatracker.ietf.orglwgllwiglcharter. 被引量:1
  • 6IETF. (2014). Network Virtualization Overlays (NV03) activities. [Online]. Available: http://datatracker.ietf.orglwglnv03/charter. 被引量:1
  • 7IETF. (2014). System for Cross-Domain Identity Management (SCIM) activities. [Online]. Available: http://datatracker.ietf.orglwglscimlcharter. 被引量:1
  • 8IETF. (2014). Mobile Ad-hoc Networks (MANEn activities. [Online]. Available: http://datatracker.ietf.orglwglmanetlcharter. 被引量:1
  • 9IETF. (2014). Software Defined Networking Research Group (SDN - RG) activities. [Online]. Available: https://irtf.orglsdnrg. 被引量:1
  • 10T. Plevyak and V. Sabin, Next Generation Telecommunications Networks, Seroices, and Management. New Jersey: Wiley-IEEE Press Book, Apr. 2010. 被引量:1

同被引文献8

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部