Reference: | [1] J. Greenough, "THE INTERNET OF EVERYTHING: 2015," Business Insider2015/04/08 2015.
[2] Gartner. (2016). Gartner says worldwide IoT security spending to reach $348 Million in 2016. Available: http://www.gartner.com/newsroom/id/3291817
[3] K. Ashton, "That `Internet of things` thing in the real world, things matter more than ideas," 2002.
[4] I. International Telecommunication Union, "The Internet Report 2005 executive summary," 2005.
[5] H. Saito, O. Kagami, M. Umehira, and Y. Kado, "Wide area ubiquitous network: the network operator`s view of a sensor network," IEEE Communications Magazine, vol. 46, pp. 112 - 120, 2008/12 2008.
[6] L. Tan and N. Wang, "Future internet: The Internet of things," vol. 5, pp. 376-5, 2010.
[7] E. T. S. Institute, "Machine-to-Machine communications (M2M); Definitions," European Telecommunication Standard Institute2013.
[8] G. Fersi, "A distributed and flexible architecture for Internet of things," Procedia Computer Science, vol. 73, pp. 130-137, 2015/01/01 2015.
[9] C. Sarkar, V. R. Prasad, A. Rahim, R. Neisse, G. Baldini, and S. N. Akshay Uttama Nambi, "DIAT: A Scalable distributed architecture for IoT," IEEE Internet of Things Journal, vol. 2, pp. 230-239, 2015/06 2015.
[10] M. Wu, T.-J. Lu, F.-Y. Ling, J. Sun, and H.-Y. Du, "Research on the architecture of Internet of things," vol. 5, pp. 484-5, 2010.
[11] M. Starsinic, "System architecture challenges in the home M2M network," pp. 1-7, 2007/05/07 2007.
[12] D. A. Milovanovic, K. R. Rao, and Z. S. Bojkovic, "Wireless networking standards (WLAN, WPAN, WMAN, WWAN)," in Convergence, DSP, QoS, and Security, ed: Informa UK, 2008, pp. 99-166.
[13] J.-J. DeLisle, "NFC prepares for wide adoption," 2014/04/03 2014.
[14] IEEE, "IEEE 802.15 working group for wireless personal area networks (WPANs)," The Institute of Electrical and Electronics Engineers, Inc.
[15] MQTT.ORG. (2014). MQTT. Available: http://mqtt.org/
[16] M. H. Amaran, N. A. M. Noh, M. S. Rohmad, and H. Hashim, "A comparison of lightweight communication protocols in robotic applications," Procedia Computer Science, vol. 76, pp. 400-405, 2015/01/01 2015.
[17] A. Talaminos-Barroso, M. A. Estudillo-Valderrama, L. M. Roa, J. Reina-Tosina, and F. Ortega-Ruiz, "A machine-to-machine protocol benchmark for eHealth applications – use case: Respiratory rehabilitation," Computer Methods and Programs in Biomedicine, vol. 129, pp. 1–11, 2016/06/01 2016.
[18] K. Chooruang and P. Mangkalakeeree, "Wireless heart rate monitoring system using MQTT," Procedia Computer Science, vol. 86, pp. 160–163, 2016.
[19] J. Kreps. (2014). Benchmarking Apache Kafka: 2 Million writes per Second (on Three cheap machines). Available: https://engineering.linkedin.com/kafka/benchmarking-apache-kafka-2-million-writes-second-three-cheap-machines
[20] S. Zhao, M. Chandrashekar, Y. Lee, and D. Medhi, "Real-time network anomaly detection system using machine learning," pp. 267-270.
[21] M. Fussell. (2016). Overview of service fabric. Available: https://azure.microsoft.com/en-us/documentation/articles/service-fabric-overview/
[22] Kong. (2014). Monolithic architecture pattern. Available: http://microservices.io/patterns/monolithic.html
[23] J. Lewis and M. Fowler. (2014). Microservices: a definition of this new architectural term. Available: http://martinfowler.com/articles/microservices.html
[24] J. Lewis and M. Fowler. (2014). Microservices. Available: http://martinfowler.com/articles/microservices.html
[25] C. Richardson. (2015). Introduction to Microservices. Available: https://www.nginx.com/blog/introduction-to-microservices/
[26] M. L. Abbott and M. T. Fisher, The art of Scalability: Scalable web architecture, processes, and organizations for the modern enterprise, 2015.
[27] C. Richardson. (2015). Building Microservices using an API gateway. Available: https://www.nginx.com/blog/building-microservices-using-an-api-gateway/
[28] Kong. (2014). Microservices architecture pattern. Available: http://microservices.io/patterns/microservices.html
[29] C. Hewitt, P. Bishop, and R. Steiger, "A universal modular actor formalism for artificial intelligence," in Proceedings of the 3rd international joint conference on Artificial intelligence, 1973, pp. 235-245.
[30] G. A. Agha, "Actors: A model of concurrent computation in distributed systems," DTIC Document1985.
[31] P. Haller and M. Odersky, "Scala actors: Unifying thread-based and event-based programming," Theoretical Computer Science, vol. 410, pp. 202-220, 2009.
[32] P. Haller and M. Odersky, "Event-based programming without inversion of control," in Joint Modular Languages Conference, 2006, pp. 4-22.
[33] L. Inc. (2015). Actor systems — Akka documentation. Available: http://doc.akka.io/docs/akka/snapshot/general/actor-systems.html
[34] R. T. Fielding, "Architectural styles and the design of network-based software architectures," University of California, Irvine, 2000.
[35] I. Fette and A. Melnikov, "The WebSocket protocol," Internet Engineering Task Force2011/12 2011. |