Topic
Internet appliance
About: Internet appliance is a(n) research topic. Over the lifetime, 1974 publication(s) have been published within this topic receiving 43571 citation(s).
Papers published on a yearly basis
Papers
More filters
TL;DR: The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday.
Abstract: It has been next to impossible in the past months not to come across the term ‘‘Internet of Things’’ (IoT) one way or another. Especially the past year has seen a tremendous surge of interest in the Internet of Things. Consortia have been formed to define frameworks and standards for the IoT. Companies have started to introduce numerous IoTbased products and services. And a number of IoT-related acquisitions have been making the headlines, including, e.g., the prominent takeover of Nest by Google for $3.2 billion and the subsequent acquisitions of Dropcam by Nest and of SmartThings by Samsung. Politicians as well as practitioners increasingly acknowledge the Internet of Things as a real business opportunity, and estimates currently suggest that the IoT could grow into a market worth $7.1 trillion by 2020 (IDC 2014). While the term Internet of Things is now more and more broadly used, there is no common definition or understanding today of what the IoT actually encompasses. The origins of the term date back more than 15 years and have been attributed to the work of the Auto-ID Labs at the Massachusetts Institute of Technology (MIT) on networked radio-frequency identification (RFID) infrastructures (Atzori et al. 2010; Mattern and Floerkemeier 2010). Since then, visions for the Internet of Things have been further developed and extended beyond the scope of RFID technologies. The International Telecommunication Union (ITU) for instance now defines the Internet of Things as ‘‘a global infrastructure for the Information Society, enabling advanced services by interconnecting (physical and virtual) things based on, existing and evolving, interoperable information and communication technologies’’ (ITU 2012). At the same time, a multitude of alternative definitions has been proposed. Some of these definitions exhibit an emphasis on the things which become connected in the IoT. Other definitions focus on Internet-related aspects of the IoT, such as Internet protocols and network technology. And a third type centers on semantic challenges in the IoT relating to, e.g., the storage, search and organization of large volumes of information (Atzori et al. 2010). The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday. The most prominent areas of application include, e.g., the smart industry, where the development of intelligent production systems and connected production sites is often discussed under the heading of Industry 4.0. In the smart home or building area, intelligent thermostats and security systems are receiving a lot of attention, while smart energy applications focus on smart electricity, gas and water meters. Smart transport solutions include, e.g., vehicle fleet tracking and mobile ticketing, while in the smart health area, topics such as patients’ surveillance and chronic disease management are being addressed. And in the context of Accepted after one revision by Prof. Dr. Sinz.
2,891 citations
TL;DR: A survey of the core functionalities of Information-Centric Networking (ICN) architectures to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.
Abstract: The current Internet architecture was founded upon a host-centric communication model, which was appropriate for coping with the needs of the early Internet users. Internet usage has evolved however, with most users mainly interested in accessing (vast amounts of) information, irrespective of its physical location. This paradigm shift in the usage model of the Internet, along with the pressing needs for, among others, better security and mobility support, has led researchers into considering a radical change to the Internet architecture. In this direction, we have witnessed many research efforts investigating Information-Centric Networking (ICN) as a foundation upon which the Future Internet can be built. Our main aims in this survey are: (a) to identify the core functionalities of ICN architectures, (b) to describe the key ICN proposals in a tutorial manner, highlighting the similarities and differences among them with respect to those core functionalities, and (c) to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.
1,275 citations
Patent•
24 Jul 2000
TL;DR: In this article, a cross-referencing resource, which may take the form of an independent HTTP server, an LDAP directory server or the existing Internet Domain Name Service (DNS), receives Internet request messages containing all or part of a universal product code and returns the Internet address at which information about the identified product, or the manufacturer of that product, may be obtained.
Abstract: Methods and apparatus for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys A cross-referencing resource, which may take the form of an independent HTTP server, an LDAP directory server, or the existing Internet Domain Name Service (DNS), receives Internet request messages containing all or part of a universal product code and returns the Internet address at which information about the identified product, or the manufacturer of that product, may be obtained By using preferred Web data storage formats which conform to XML, XLS, XLink, Xpointer and RDF specifications, product information may be seamlessly integrated with information from other sources A “web register” module can be employed to provide an Internet interface between a shared sales Internet server and an otherwise conventional inventory control system, and operates in conjunction with the cross-referencing server to provide detailed product information to Internet shoppers who may purchase goods from existing stores via the Internet
1,022 citations
Patent•
06 May 1997
TL;DR: In this paper, a client-based monitoring and filtering of access to an open network, such as a WAN or the Internet, is described, which includes one or more clients, each operating application or process (e.g., Netscape Navigator™ or Microsoft Internet Explorer™ browser software) requiring Internet (or other open network) access, and a centralized enforcement supervisor.
Abstract: A computing environment with methods for monitoring access to an open network, such as a WAN or the Internet, is described. The system includes one or more clients, each operating applications or processes (e.g., Netscape Navigator™ or Microsoft Internet Explorer™ browser software) requiring Internet (or other open network) access (e.g., an Internet connection to one or more Web servers). Client-based monitoring and filtering of access is provided in conjunction with a centralized enforcement supervisor. The supervisor maintains access rules for the client-based filtering and verifies the existence and proper operation of the client-based filter application. Access rules which can be defined can specify criteria such as total time a user can be connected to the Internet (e.g., per day, week, month, or the like), time a user can interactively use the Internet (e.g., per day, week, month, or the like), a list of applications or application versions that a user can or cannot use in order to access the Internet, a list of URLs (or WAN addresses) that a user application can (or cannot) access, a list of protocols or protocol components (such as Java Script™) that a user application can or cannot use, and rules to determine what events should be logged (including how long are logs to be kept). By intercepting process loading and unloading and keeping a list of currently-active processes, each client process can be checked for various characteristics, including checking executable names, version numbers, executable file checksums, version header details, configuration settings, and the like. With this information, the system can determine if a particular process in question should have access to the Internet and what kind of access (i.e., protocols, Internet addresses, time limitations, and the like) is permissible for the given specific user.
919 citations
20 Sep 2010
TL;DR: This paper aims to show a skeleton of the Internet of Things and tries to address some essential issues of the internet of Things like its architecture and the interoperability, etc.
Abstract: Nowadays, the main communication form on the Internet is human-human. But it is foreseeable that in a near soon that any object will have a unique way of identification and can be addressed so that every object can be connected. The Internet will become to the Internet of Things. The communicate forms will expand from human-human to human-human, human-thing and thing-thing (also called M2M).This will bring a new ubiquitous computing and communication era and change people's life extremely. Radio Frequency Identification techniques (RFID) and related identification technologies will be the cornerstones of the upcoming Internet of Things (IOT).This paper aims to show a skeleton of the Internet of Things and we try to address some essential issues of the Internet of Things like its architecture and the interoperability, etc. At the beginning we describe an overview of the Internet of Things. Then we give our architecture design proposal of the Internet of Things and then we design a specific the Internet of Things application model which can apply to automatic facilities management in the smart campus. At last, we discuss some open questions about the Internet of Things.
773 citations