参考文献
|
-
Atzori, L.,Iera, A.,Morabito, G.(2010).The Internet of Things: A survey.Computer Networks,54(15),2787-2805.
-
Bouwman, H.,Dihal, S.,de Reuver, M.,Warnier, M.,Carlsson, C.(2013).Mobile cloud computing: State of the art and outlook.info,15(1),4-16.
-
Chana, M.,Estèvea, D.,Fourniolsa, J.Y.,Escribaa, C.,Campoa, E.(2012).Smart wearable systems: Current status and future challenges.Artificial Intelligence in Medicine,56(3),137-156.
-
Gueguen, G.,Isckia, T.(2011).The borders of mobile handset ecosystems: Is coopetition inevitable?.Telematics and Informatics,28(1),5-11.
-
Hancke, G.P.,Markantonakis, K.,Mayes, K.E.(2010).Security challenges for user-oriented RFID applications within the “Internet of things”.Journal of Internet Technology,11(3),307-313.
-
Holzer, A.,Ondrus, J.(2011).Mobile application market: A developer’s perspective.Telematics and Informatics,28(1),22-31.
-
Ilie-Zudor, E.,Kemény, Z.,van Blommestein, F.,Monostori, L.,van der Meulen, A.(2011).A survey of applications and requirements of unique identification systems and RFID techniques.Computers in Industry,62(3),227-252.
-
Kim, H.,Feamster, N.(2013).Improving network management with Software Defined Networking.IEEE Communications Magazine,51(2),114-119.
-
Leong, L.Y.,Hew, T.S.,Tan, G.W.H.,Ooi, K.B.(2013).Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach.Expert Systems with Applications,40(14),5604-5620.
-
Lerche, C.,Hartke, K.,Kovatsch, M..Industry adoption of the Internet of Things: A constrained application protocol survey.International Conference on Emerging Technologies & Factory Automation,Krakow, Poland:
-
Mietzner, D.,Reger, G.(2005).Advantages and disadvantages of scenario approaches for strategic foresight.International Journal of Technology Intelligence and Planning,1(2),220-239.
-
Mills, L.A.,Knezek, G.,Khaddage, F.(2014).Information seeking, information sharing, and going mobile: Three bridges to informal learning.Computers in Human Behavior,32,324-334.
-
Ngai, E.W.T.,Moon, K.K.L.,Riggins, F.J.,Yi, C.Y.(2008).RFID research: An academic literature review (1995-2005) and future research directions.International Journal Production Economics,112(2),510-520.
-
Piran, M.J.,Murthy, G.R.,Babu, G.P.(2011).Vehicular ad hoc and sensor networks principles and challenges.International Journal of Ad hoc, Sensor & Ubiquitous Computing,2(2),38-49.
-
Sengupta, S.(2013).An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism.Computer Networks,57(11),2313-2330.
-
Serrano, N.,Hernantes, J.,Gallardo, G.(2013).Mobile Web Apps.IEEE Software,30(5),22-27.
-
Shin, S.,Kim, K.,Kim, K.-H.,Yeh, H.(2012).A remote user authentication scheme with anonymity for mobile devices.International Journal of Advanced Robotic Systems,9,1-8.
-
Smajda, J.(2011).Open source and the moral field of computing.Journal of Information Technology & Politics,8(3),304-322.
-
SRI(1996).SRI, Integrated Technology Planning. SRI International Report, Menlo Park, California, 1996..
-
Subashini, S.,Kavitha, V.(2011).A survey on security issues in service delivery models of cloud computing.Journal of Network and Computer Applications,34(1),1-11.
-
Tan, G.W.H.,Ooi, K.B.,Chong, S.C.,Hew, T.S.(2014).NFC mobile credit card: The next frontier of mobile payment?.Telematics and Informatics,31(2),292-307.
-
Villanueva, F.J.,Villa, D.,Moya, F.,Santofimia, M.J.,Lopez, J.C..Internet of things architecture for an RFID-based product tracking business model.International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,Palermo, Italy:
-
Watson, C.,McCarthy, J.,Rowley, J.(2013).Consumer attitudes towards mobile marketing in the smart phone era.International Journal of Information Management,33(5),840-849.
-
Yu, O.S.(2006).Technology portfolio planning and management: Practical concepts and tools.New York:Springer.
|