Cite

L. Janczewski and A. Colarik, Managerial guide for handling cyber-terrorism and information warfare. Idea Group Publishing, 2005. [Online]. Available: http://books.google.com/books?id=vnjfMHWdKHQC10.4018/978-1-59140-583-2 Search in Google Scholar

T. Holt and B. Schell, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Igi Global, 2010. [Online]. Available: http://books.google.com/books?id=LAIjG_OGuIMC10.4018/978-1-61692-805-6 Search in Google Scholar

D. Mortimer, “Homeland security public safety dive teams: how technology can help,” in OCEANS, 2005. Proceedings of MTS/IEEE, 2005, pp. 178 – 183 Vol. 1. Search in Google Scholar

A. Koyuncugil and N. Ozgulbas, Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection, ser. Premier Reference Source. Igi Global, 2010. [Online]. Available: http://books.google.com/books?id=l4Ir1nvyURIC10.4018/978-1-61692-865-0 Search in Google Scholar

C. Reddick, Homeland security preparedness and information systems: strategies for managing public policy. Information Science Reference, 2010. [Online]. Available: http://books.google.com/books?id=NaT_Fob6lBIC10.4018/978-1-60566-834-5.ch001 Search in Google Scholar

Warner Bros. Likes Facebook Rentals. http://online.wsj.com/article/SB10001424052748703386704576186913491751144.html. Search in Google Scholar

July 2011, Sensor Web Enablement. Available: http://www.opengeospatial.org/standards. Search in Google Scholar

M. Ortner, A. Nehorai, and A. Jeremic, “Biochemical transport modeling and bayesian source estimation in realistic environments,” Signal Processing, IEEE Transactions on, vol. 55, no. 6, pp. 2520 –2532, june 2007. Search in Google Scholar

2004-2006, MITRA: Monitoring and intervention for the transportation of dangerous goods. http://www.mitraproject.info/. Search in Google Scholar

2009, SMARTFREIGHT project, FP7-216353. http://www.smartfreight.info//. Search in Google Scholar

F. Valente, G. Zacheo, P. Losito, andP. Camarda, “A telecommunications framework for real-time monitoring of dangerous goods transport,” in Intelligent Transport Systems Telecommunications,(ITST),2009 9th International Conference on, October 2009, pp. 13 –18.10.1109/ITST.2009.5399390 Search in Google Scholar

Z. Yingjun, X. Shengwei, X. Peng, and W. Xinquan, “Shipping containers of dangerous goods condition monitoring system based on wireless sensor network,” in Networked Computing (INC), 2010 6th International Conference on, may 2010, pp. 1 –3. Search in Google Scholar

I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared,” in Grid Computing Environments Workshop, 2008. GCE ‘08, 2008, pp. 1–10.10.1109/GCE.2008.4738445 Search in Google Scholar

NIST Cloud Computing Reference Architecture http://www.mstgov/customcf/get_pdf.cfm?pub_id=909505 December 2011. Search in Google Scholar

F. Tusa, M. Paone, M. Villari, and A. Puliafito., “CLEVER: A CLoud-Enabled Virtual EnviRonment,” in 15th IEEE Symposium on Computers and CommunicationsS Computing and Communications, 2010. ISCC ‘10. Riccione, June 2010.10.1109/ISCC.2010.5546555 Search in Google Scholar

S. Pandey, W. Voorsluys, S. Niu, A. Khandoker, and R. Buyya, “An autonomic cloud environment for hosting ecg data analysis services,” Future Generation Computer Systems, vol. 55, no. 6, June 2011. Search in Google Scholar

S. Alam, M. Chowdhury, and J. Noll, “Senaas: An event-driven sensor virtualization approach for internet of things cloud,” in Networked Embedded Systems for Enterprise Applications (NESEA), 2010 IEEE International Conference on, nov. 2010, pp. 1 –6.10.1109/NESEA.2010.5678060 Search in Google Scholar

V. Rajesh, J. Gnanasekar, R. Ponmagal, and P. Anbalagan, “Integration of wireless sensor network with cloud,” in Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on, march 2010, pp. 321 –323.10.1109/ITC.2010.88 Search in Google Scholar

S. Rusitschka, K. Eger, and C. Gerdes, “Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain,” in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, oct. 2010, pp. 483 –488.10.1109/SMARTGRID.2010.5622089 Search in Google Scholar

K. Egami, S. Matsumoto, and M. Nakamura, “Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, march 2011, pp. 123 –128.10.1109/PERCOMW.2011.5766853 Search in Google Scholar

M. Yuriyama and T. Kushida, “Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing,” in Network-Based Information Systems (NBiS), 2010 13th International Conference on, sept. 2010, pp. 1 –8.10.1109/NBiS.2010.32 Search in Google Scholar

The Extensible Messaging and Presence Protocol (XMPP) protocol: http://tools.ietf.org/html/rfc3920. Search in Google Scholar

Ejabberd, the Erlang Jabber/XMPP daemon, http://www.ejabberd.im/ December 2011. Search in Google Scholar

Sedna, Native XML Database System: http://modis.ispras.ru/sedna/ December 2011. Search in Google Scholar

The Apache Cassandra Project develops a highly scalable second-generation distributed database http://cassandra.apache.org/. Search in Google Scholar

A. Kerrouche, J. Leighton, W. Boyle, Y. Gebremichael, T. Sun, K. Grattan, and B. Taljsten, “Strain measurement on a rail bridge loaded to failure using a fiber bragg grating-based distributed sensor system,” Sensors Journal, IEEE, vol. 8, no. 12, pp. 2059 –2065, dec. 2008. Search in Google Scholar

Q. Li, T. Zhang, and Y. Yu, “Using cloud computing to process intensive floating car data for urban traffic surveillance,” Int. J. Geogr. Inf. Sci., vol. 25, pp. 1303–1322, August 2011. [Online]. Available: http://dx.doi.org/10.1080/13658816.2011.57774610.1080/13658816.2011.577746 Search in Google Scholar

N. Sahli, N. Jabeur, and M. Badra, “Agent-based approach to plan sensors relocation in a virtual geographic environment,” in New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, feb. 2011, pp. 1 –5.10.1109/NTMS.2011.5721149 Search in Google Scholar

C.-T. Yang, L.-T. Chen, W.-L. Chou, and K.-C. Wang, “Implementation of a medical image file accessing system on cloud computing,” in Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on, dec. 2010, pp. 321 –326.10.1109/CSE.2010.48 Search in Google Scholar

J. Wang, B. Huang, A. Huang, and M. D. Goldberg, “Parallel computation of the weather research and forecast (wrf) wdm5 cloud microphysics on a many-core gpu,” in Parallel and Distributed Systems (ICPADS), 2011 IEEE 17th International Conference on, dec. 2011, pp. 1032 –1037.10.1109/ICPADS.2011.160 Search in Google Scholar

M. Saini, W. Xiangyu, P. Atrey, and M. Kankanhalli, “Dynamic workload assignment in video surveillance systems,” in Multimedia and Expo (ICME), 2011 IEEE International Conference on, july 2011, pp. 1 –6.10.1109/ICME.2011.6012076 Search in Google Scholar

C. Reed, M. Botts, J. Davidson, and G. Percivall, “OGC Sensor Web Enablement: Overview and High Level Architecture,” IEEE Autotestcon, pp. 372–380, 2007.10.1109/AUTEST.2007.4374243 Search in Google Scholar

A. Celesti, F. Tusa, M. Villari, and A. Puliafito, “How to Enhance Cloud Architectures to Enable Cross-Federation,” in IEEE 3rd International Conference on Cloud Computing (CLOUD’10), Miami, FL, 5-10 July 2010, pp. 337 –345.10.1109/CLOUD.2010.46 Search in Google Scholar

A. Dunkels, B. Grnvall, and T. Voigt, “Contiki - a lightweight and flexible operating system for tiny networked sensors,” in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN ‘04), 2004. Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other