Author:
Ma Yi-Wei,Cho Wei-Ting,Chen Jiann-Liang,Huang Yueh-Min,Zhu Rongbo
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference24 articles.
1. Ahmed, A., & Zhang, N. (2010). Towards the realisation of context-risk-aware access control in pervasive computing. Telecommunication Systems, 45(2–3), 127–137.
2. Bessler, S., Nisanyan, A., Peterbauer, K., Pailer, R., & Stadler, J. (2000). A service platform for internet-telecom services using sip. In IFIP conference on Intelligence in Networks.
3. Boukhatem, N., & Tran, P. (2008). Ip-based RFID architecture and location management. In Software, Telecommunications and Computer Networks.
4. Chung, H., & Wu, Q. (2012). Managing heterogeneous wireless sensor networks with the session initiation protocol (sip). In International Conference on Advanced Communication Technology (pp. 1042–1045).
5. Gierlowski, K., Kostuch, A., Wozniak, J., & Nowicki, K. (2011). Testbed analysis of video and voip transmission performance in ieee 802.11 b/g/n networks. Telecommunication Systems, 48(3–4), 247–260.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献