Author of the publication

Defining the Stack for Service Delivery Models and Interoperability in the Internet of Things: A Practical Case With OpenIoT-VDK.

, , , , , , , and . IEEE J. Sel. Areas Commun., 33 (4): 676-689 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Organizing Architecture for Cloud by Means of Infrastructure Performance and Event Data., , , and . CloudCom (1), page 481-486. IEEE Computer Society, (2013)APDL: A reference XML schema for process-centered definition of RFID solutions., , , and . J. Syst. Softw., 84 (7): 1244-1259 (2011)Defining the Stack for Service Delivery Models and Interoperability in the Internet of Things: A Practical Case With OpenIoT-VDK., , , , , , , and . IEEE J. Sel. Areas Commun., 33 (4): 676-689 (2015)Digital Platform and Operator 4.0 Services for Manufacturing Repurposing During COVID19., , , , and . APMS (4), volume 633 of IFIP Advances in Information and Communication Technology, page 311-320. Springer, (2021)Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform., , , , and . Middleware (Companion), page 66-69. ACM, (2008)Deep Learning Analytics for IoT Security over a Configurable BigData Platform : Data-Driven IoT Systems., , , , and . WPMC, page 1-6. IEEE, (2019)Middleware Building Blocks for Architecting RFID Systems., , , and . MOBILIGHT, volume 13 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 325-336. Springer, (2009)A Configurable Distributed Data Analytics Infrastructure for the Industrial Internet of things., , and . DCOSS, page 179-181. IEEE, (2019)End-to-end industrial IoT platform for Quality 4.0 applications., , , and . Comput. Ind., (2022)Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems., , , , , and . GIoTS, page 1-6. IEEE, (2019)