Object Name Service
149 resources related to Object Name Service
- Topics related to Object Name Service
- IEEE Organizations related to Object Name Service
- Conferences related to Object Name Service
- Periodicals related to Object Name Service
- Most published Xplore authors for Object Name Service
2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.
Innovative Smart Grid Technologies
2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
One of the flagship conferences for the IEEE Robotics and Automation Society (RAS)
ICC 2020 - 2020 IEEE International Conference on Communications
All topics relating to existing and emerging communications networking technologies.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
2011 Second International Conference on Intelligent Systems, Modelling and Simulation, 2011
In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process can be used to break privacy ...
2016 IEEE International Conference on Services Computing (SCC), 2016
Bluetooth Low Energy beacon service is the newest Online-to-Offline technology. A beacon application in users smartphone connects an offline physical beacon with an online service produced by a service provider. However, since the BLE beacon separately operates by each service provider, users need to run multiple providers applications to access different providers service. This leads to much energy and resource ...
European Workshop on Smart Objects: Systems, Technologies and Applications, 2010
Using the Electronic Product Code (EPC) in the future mostly stored on a Radio Frequency Identification (RFID)-chip, it is possible via e.g. the ONS of the EPC Architecture Framework to distinguish each item worldwide and to trace it back in the supply chain to the producer and furthermore to the subcontractors. The paper describes the comparison of two mechanisms with ...
2010 International Conference on Web Information Systems and Mining, 2010
As the traditional security and defense systems appear some defects, such as wiring problems, higher construction and maintenance expense and delay of receiving alarm messages, a scheme based on Internet of Things is proposed. Embedded ARM9 S3C2440A micro controller is adopted as system master controller, which carries out receiving and processing the transmission alarm message of RF chip worked at ...
IEEE Conference Anthology, 2013
EPC (Electronic Product Code) Network provides public services for companies to share product data throughout the supply chain, and enables trading partners to track and trace the items. In EPC Network, Name Service serves as a centralized tracker to locate the EPCIS (EPC Information Service) repositories that store the distributed data of the EPC-tagged products at item-level. It is an ...
Handling of a Single Object by Multiple Mobile Robots based on Caster-Like Dynamics
Back to the Present: Exploring an Ancient World with Cultural Algorithms
Recording and Using 3D Object Models with RoboEarth
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Virtual Reality Support for Teleoperation Using Online Grasp Planning
Computing Conversations: Bertrand Meyer: Eiffel Programming Language
Critical use cases for video capturing systems in autonomous driving applications
2019 ICRA Keynote- Mocap as a Service
IMS 2010 Special Features: Recognizing Chuck Swift's 52 Years of Service
CB: Exploring Neuroscience with a Humanoid Research Platform
Michele Nitti: Searching the Social Internet of Things by Exploiting Object Similarity - Special Session on SIoT: WF-IoT 2016
David G. Green - IEEE Haraden Pratt Award, 2019 IEEE Honors Ceremony
Daniel E. Rivera: The CSS Outreach Program: Providing Community Service - Studio Tech Talks: Sections Congress 2017
Zipline - IEEE Spectrum Technology in the Service of Society Award - 2019 IEEE Honors Ceremony
IEEE, IEEE-HKN and Public Service
Teacher In-Service Workshop
Finger Mechanism Equipped with Omnidirectional Driving Roller (Omni-Finger)
Control of a Fully-Actuated Airship for Satellite Emulation
IROS TV 2019- Pohang University of Science and Technology- Haptics and Virtual Reality Laboratory
In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process can be used to break privacy of inquirers, e.g. to derive product and user profiles. We share details about our security enhancement prototypes to protect the privacy of querying parties. Our developed enhancements are designed for easy integration into existing network infrastructures without major efforts.
Bluetooth Low Energy beacon service is the newest Online-to-Offline technology. A beacon application in users smartphone connects an offline physical beacon with an online service produced by a service provider. However, since the BLE beacon separately operates by each service provider, users need to run multiple providers applications to access different providers service. This leads to much energy and resource consumption which potentially hinders other common uses of the smartphone. In this paper, we proposed GS1beacon, a GS1 standard based integrated BLE beacon service platform which could find the desired service regardless of providers applications, and provide multiple services in a single BLE beacon. To realize this, we construct a global discovery system by using an Object Name Service (ONS) and unify format of a BLE beacon ID by using a GS1 ID keys. Additionally, we prototyped GS1beacon service platform and showed its feasibility through case study, and performance evaluation.
Using the Electronic Product Code (EPC) in the future mostly stored on a Radio Frequency Identification (RFID)-chip, it is possible via e.g. the ONS of the EPC Architecture Framework to distinguish each item worldwide and to trace it back in the supply chain to the producer and furthermore to the subcontractors. The paper describes the comparison of two mechanisms with different security goals to improve the trust level of ONS: DNSSEC and DNSCurve. DNSSEC enables integrity and authenticity - DNSCurve additionally enables confidentiality and a higher availability. The necessary manpower to install DNSCurve is much lower compared to DNSSEC.
As the traditional security and defense systems appear some defects, such as wiring problems, higher construction and maintenance expense and delay of receiving alarm messages, a scheme based on Internet of Things is proposed. Embedded ARM9 S3C2440A micro controller is adopted as system master controller, which carries out receiving and processing the transmission alarm message of RF chip worked at 2.4GHz ISM band and searching the alarm message server by Object Name Service (ONS). Alarm message is transmitted on the internet in time by using socket, and the remote terminal will real-time monitor the home security situation. The experiment results show the system obtains expected impressions.
EPC (Electronic Product Code) Network provides public services for companies to share product data throughout the supply chain, and enables trading partners to track and trace the items. In EPC Network, Name Service serves as a centralized tracker to locate the EPCIS (EPC Information Service) repositories that store the distributed data of the EPC-tagged products at item-level. It is an essential component that enables interoperability across companies. In this paper, we propose an efficient and flexible distributed Name Service architecture for large scale application in the EPC network. Our architecture includes a novel ONS (Object Name Service) design that supports customized EPC encoding and a scalable distributed DS (Discovery Service) architecture that enables efficient register/query for massive item-level records.
We have developed an open and scalable network-oriented architecture that integrates the physical world with the virtual world and admits the efficient storage and retrieval of data and information. The architecture works with existing and future network and Automated Identification (Auto-ID) technologies and requires the use of Globally Unique IDentifiers (GUIDes). An Auto-ID tag affixed to a physical object stores the GUIDe for that object. Networked tag readers wirelessly communicate with the Auto-ID tags, thereby connecting the physical objects to the network. An object's GUIDe acts as a pointer to storage locations for data and information about that object, operating in a similar manner to pointers in programming languages. Given a GUIDe, the Object Name Service (ONS), a facility similar to the Domain Name Service (DNS), is queried to identify these storage locations on the local network and over the Internet. Storing an object's data and information in a standardized XML-based language such as PML allows the use of Internet friendly query languages such as XQL and Quilt and enables the automated storage and retrieval of data and information at remote locations. Our architecture efficiently networks the physical world, allowing effective and truly automated information search, information retrieval, and functionality.
Internet of things is a latest technology which has good number of benefits to its users. It's an emerging technology where we connect daily objects to the internet for sending and receiving data. For an example home automation system, various durable goods, vehicles (cars and trucks) sensors. We can combine all these with internet. We can send and receive information as per user's requirement. IoT is facing security challenges as the devices are providing security to the personal properties like money or intellectual property via automated devices. IoT devices are connected with each other and share information during any haphazard situation. So there are equally more chances for hacking the systems or blocking the services in between transmission. Although fast information exchange is first and foremost requirement so it is not necessary to provide cosmplete security solutions for IoT. This paper contains various security challenges for internet of things and proposing solutions to overcome those security issues.
Internet of Things (IoT) technologies have great potential in protecting safety and quality of agriculture products. Convenient and efficient identification and name service (NS) are the basis of such IoT technologies. An enterprise-oriented name service for the application of the IoT for agriculture products, iotNS, is proposed in this work. The iotNS reduces the complexity of the object name service (ONS) and improves the access efficiency. An IoT application for agriculture products based on the iotNS is developed and deployed in actual scenarios.
Real-time system software is notoriously hard to share and reuse. The paper walks through the methodology and application of ControlShell, a component- based programming system real-time system software development. ControlShell combines graphical system-building tools, an execution-time configuration manager, a real-time matrix package, and an object name service into an integrated development environment. It targets complex systems that require on-line reconfiguration and strategic control. ControlShell takes advantage of functional object hierarchies to enable code sharing and reuse. It gains flexibility by supporting easy interconnectivity of these objects. It features a unique configuration control system for changing operating modes.
Smart cities generate huge amounts of data, which are often shared openly by multi-domain service providers. However, due to the lack of common standard interfaces, data models, and global ID management, smart city services suffers from fragmentation. It prevents data from being readily shared and accessible in a seamless way and restricts various services from being developed and discovered. To tackle this problem, we propose an open smart city platform, Oliot-OpenCity, built on the top of global standards ratified by GS1. The platform uses standardized event/master data to capture and store smart city data into an independently distributed repositories called EPC Information System (EPCIS), which can provide standard open interfaces to share resources and creates smart city data hub. Through Object Name Service (ONS) and Discovery Service (DS), it offers service and resource discovery to resolve distributed repositories and services from the various smart city domains. Moreover, to integrate the legacy city platforms, mediation gateways are proposed, which harmonize the fragmented key management and different data model into GS1 standards-based globally unique identifier and event/master data respectively. To show the feasibility of Oliot-OpenCity, we developed bus and vehicle information use cases which demonstrated its interoperability with other legacies, and the standardized data collection and sharing.
This recommended practice defines a procedure for naming time sequence data (TSD) files that originate from digital protection and measurement devices, such as transient data records, event sequences, and periodic data logs. The filename includes, among other features, key portions of the information contained in the file, including, but not limited to, the names of the circuit, substation and recording ...
This document is part of the POSIX series of standards for applications and user interfaces to open systems. It defines the Ada language bindings as package specifications and accompanying textual descriptions of the applications program interface (API). This standard supports application portability at the source code level through the binding between ISO 8652:1995 (Ada) and ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990 ...
IEEE Standard for Information Technology--Test Methods for Measuring Conformance to Open Systems Interconnection (OSI) Abstract Data Manipulation C Language Interfaces--Binding for Application Program Interface (API)