[1] | J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, Sep. 2013. [Online]http:dx.doi.org/10.1016/j.future.2013.01.010. |
[2] | C. Bornhovd, T. Lin, S. Haller, and J. Schaper, “Integrating automatic data acquisition with business processes experiences with sap’s auto-id infrastructure,” in Proceedings of the Thirtieth International Conference on Very Large Data Bases - Volume 30, VLDB ’04.VLDB Endowment, 2004, pp.1182 –1188. |
[3] | F. Wang, S. Liu, and P. Liu, “Complex rfid event processing,” The VLDB Journal, vol. 18, no. 4, pp. 913–931, Aug. 2009. [Online]. http://dx.doi.org/10. 1007/ s00778-009-0139-0 |
[4] | A. T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, “Sp 80098. guidelines for securing radio frequency identification (rfid) systems,” Gaithers burg, MD, United States, Tech. Rep., 2007. |
[5] | R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” in Proceedings of the 2012 10th International Conference on Frontiers of Information Technology, ser. FIT ’12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 257–260. http://dx.doi.org/10.1109/FIT.2012.53. |
[6] | V. Turner, D. Reinsel, J. F. Gantz, and S. Minton, “The Digital universe of opportunities: Rich data and the increasing value of the internet of things,” in WHITE PAPER of IDC iview. IDC Analyze the Future, 2014.http://www.emc.com/leadership/digital-universe/index.htm. |
[7] | P. Gouvas, A. Zafeiropoulos, A. Liakopoulos, G. Mentzas, and N. Mitrou, “Integrating overlay protocols for providing autonomic services in mobile ad-hoc networks,” IEICE Transactions, vol. 93-B, no. 8, pp. 2022–2034, 2010. [Online]. http://search. ieice.org/ bin/summary.php?id=e93-b 8 2022. |
[8] | “Upnp forums,” accessed: 1999-09-30. [Online]. Available: http://www.upnp.org/ |
[9] | E. Guttman, C. Perkins, and J. Veizades. (1999) Service location protocol, version 2. [Online]. Available: http://tools.ietf.org/html/rfc2608. |
[10] | E. Guttman. (2002) Vendor extensions for service location protocol, version 2. [Online]. Available: http://tools.ietf.org/html/rfc3224. |
[11] | “Zeroconf website,” accessed: 1999-07-17. [Online]. Available: http://www.zeroconf.org/. |
[12] | S. Cheshire and M. Krochmal. (2013) Multicast dns. Available: http://tools.ietf.org/html/rfc6762. |
[13] | (2013) Dns-based service discovery. [Online]. Available: http://tools.ietf.org/html/rfc6763. |
[14] | N. Yulin, S. Huayou, L. Weiping, and C. Zhong, “Pdus: P2p-based distributed uddi service discovery approach,” in Proceedings of the 2010 International Conference on Service Sciences, ser. ICSS ’10. Washington, DC, USA: IEEE Computer Society, 2010, pp.3–8.http://dx.doi.org/10.1109/ICSS.2010.48. |
[15] | S. Kaffille, K. Loesing, and G. Wirtz, “Distributed ser vice discovery with guarantees in peer-to-peer networks using distributed hashtables.” in PDPTA, H. R.Arabnia, Ed. CSREAPress, 2005, pp. 578–584.http://dblp.uni-trier.de/db/conf/pdpta/pdpta2005-2. html#KaffilleLW05 |
[16] | M. Cai, A. Chervenak, and M. Frank, “A peer-to-peer replica location service based on a distributed hash table,” in Proceedings of the 2004 ACM/IEEE Confe rence on Supercomputing, ser. SC ’04. Washington, DC, USA: IEEE Computer Society, 2004, pp. 56–. [Online]. http://dx.doi.org/10.1109/SC.2004.7. |
[17] | M. Picone, M. Amoretti, and F. Zanichelli, “Geokad: A p2p distributed localization protocol.” in PerCom Workshops. IEEE, 2010, pp. 800–803. [Online]. Available: http://dblp.uni-trier.de/db/conf/percom/percomw2010.html#PiconeAZ10. |
[18] | D. Krioukov, F. Papadopoulos, M. Kitsak, A. Vahdat, and M. Bogu, “Hyperbolic Geometry of Complex Networks,” Physical Review E, vol. 82, no. 036106, Oct 2010. |
[19] | T. Tiendrebeogo, D. Ahmat, and D. Magoni, “Relia ble and scalable distributed hash tables harnessing hyperbolic coordinates,” in New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, 2012, pp. 1–6. |
[20] | T. Munzner, “H3: Laying out large directed graphs in 3d Hyperbolic space,” in Proceedings of the 1997 IEEE Symposium on Information Visualization (Info Vis ’97), Washington, DC, USA: IEEE Computer Society, 1997, pp. 2–. [Online]. Available:http://dl.acm.org/citation.cfm?id=857188.857627 |
[21] | M. Zabka, “The minkowski geometry of numbers applied to the theory of tone systems.” in MCM, ser. Lecture Notes in Computer Science, J. Yust, J. Wild, and J. A. Burgoyne, Eds., vol. 7937. Springer, 2013, pp. 226–240.[Online].http://dblp.uni-trier.de/db/conf/mcm2/mcm2013.html#Za. |
[22] | P. Fraigniaud and G. Giakkoupis, “Greedy routing in small-world networks with power-law degrees,” Distributed Computing, vol. 27, no. 4, pp. 231–253, 2014. |
[23] | T. Lee, C. Qiao, M. Demirbas, and J. Xu, “Abc: A simple geographic forwarding scheme capable of by passing routing holes in sensor networks,” Ad Hoc Netw., vol. 8, no. 4, pp. 361–377, Jun. 2010.http://dx.doi.org/10.1016/j.adhoc.2009.08.004. |
[24] | B. Karp and H. T. Kung, “Gpsr: Greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ser. MobiCom ’00. New York, NY, USA: ACM, 2000, pp. 243–254. [Online]. Available:http://doi.acm.org/10. 11 45/345910.345953. |
[25] | H. Yang, K. Tang, J. Yu, L. Zhu, H. Xu, and Y. Cao, “Virtual coordinates in hyperbolic space based on ricci flow for wlans,” Appl. Math. Comput., vol. 243, pp. 537–545, Sep. 2014. [Online]. Available:http://dx.doi.org/10.1016/j.amc.2014.05.023. |
[26] | A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica, “Geographic routing without location information,” in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, ser. MobiCom ’03. New York, NY, USA: ACM, 2003, pp.96–108. [Online]. Available: http://doi.acm.org/10.1145/938985.938996. |
[27] | R. Kleinberg, “Geographic routing using hyperbolic space,” in proceedings of the 26th IEEE International Conference on Computer Communications, May 2007, pp. 1902–1909. |
[28] | Cvetkovski and M. Crovella, “Hyperbolic embedding and routing for dynamic graphs,” in proceedings of the 28th IEEE International Conference on Computer Communications, April 2009. |
[29] | D. Krioukov, F. Papadopoulos, M. Bogu˜n´a, and A. Vahdat, “Greedy forwarding in scale-free networks embedded in hyperbolic metric spaces,” SIGMETRICS Perform. Eval. Rev., vol. 37, no. 2, pp. 15–17, 2009. |
[30] | I. Kazmi and S. F. Y. Bukhari, “Peersim: An efficient & scalable testbed for heterogeneous cluster-based p2p network protocols.” Washington, DC, USA: IEEE Computer Society, 2011, pp. 420–425. [Online].http://dx.doi.org/10.1109/UKSIM.2011.86. |