{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:42:46Z","timestamp":1761648166842},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2014,5,17]],"date-time":"2014-05-17T00:00:00Z","timestamp":1400284800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11042-014-2095-y","type":"journal-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T07:02:41Z","timestamp":1400223761000},"page":"6151-6168","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Advanced verification on WBAN and cloud computing for u-health environment"],"prefix":"10.1007","volume":"74","author":[{"given":"Minwoo","family":"Jung","sequence":"first","affiliation":[]},{"given":"Kabsu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jeonghun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,17]]},"reference":[{"issue":"7","key":"2095_CR1","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","volume":"30","author":"P Baronti","year":"2007","unstructured":"Baronti P, Pillai P, Chook VWC, Chessa S, Alberto Gotta Y, Fun H (2007) Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards. Comput Commun 30(7):1655\u20131695","journal-title":"Comput Commun"},{"key":"2095_CR2","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1007\/978-3-642-16612-9_25","volume":"6418","author":"A Basu","year":"2010","unstructured":"Basu A, Bensalem S, Bozga M, Delahaye B, Legay A, Sifakis E (2010) Verification of an AFDX infrastructure using simulations and probabilities. Runtime Verification 6418:330\u2013344","journal-title":"Runtime Verification"},{"key":"2095_CR3","doi-asserted-by":"crossref","unstructured":"Camara D, Loureiro AAF, Filali F (2007) Methodology for Formal Verification of Routing Protocols for Ad Hoc Wireless Networks. In: Proc. Global Telecommunication Conference, pp 705\u2013709","DOI":"10.1109\/GLOCOM.2007.137"},{"key":"2095_CR4","doi-asserted-by":"crossref","unstructured":"Cavin D, Sasson Y, Schiper A (2002) On the accuracy of MANET simulators. In: Proc. the 2nd ACM International Workshop on Principles of Mobile Computing, pp 38\u201343","DOI":"10.1145\/584490.584499"},{"issue":"10","key":"2095_CR5","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1016\/j.sysarc.2011.04.005","volume":"57","author":"I Corredor","year":"2011","unstructured":"Corredor I, Martinez JF, Familiar MS (2011) Bringing pervasive embedded networks to the service cloud: a lightweight middleware approach. J Syst Archit 57(10):916\u2013933","journal-title":"J Syst Archit"},{"key":"2095_CR6","doi-asserted-by":"crossref","unstructured":"Demaille A, H\u00e9rault T, Peyronnet S (2006) Probabilistic verification of sensor networks. In: Proc. the 14th IEEE International Conference on Computer Sciences, Research, Innovation and Vision for the Future, pp 45\u201354","DOI":"10.1109\/RIVF.2006.1696417"},{"issue":"6","key":"2095_CR7","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s10009-006-0014-x","volume":"8","author":"M Duflot","year":"2006","unstructured":"Duflot M, Kwiatkowska M, Norman G, Parker D (2006) A formal analysis of Bluetooth device discovery. Int J Softw Tools Technol Transfer 8(6):621\u2013632","journal-title":"Int J Softw Tools Technol Transfer"},{"issue":"3","key":"2095_CR8","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11042-007-0189-5","volume":"38","author":"E Farella","year":"2008","unstructured":"Farella E, Pieracci A, Benini L, Rocchi L, Acquaviva A (2008) Interfacing human and computer with wireless body area sensor networks: the WiMoCA solution. Multimedia Tools Appl 38(3):337\u2013363","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"2095_CR9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2498\/cit.1001864","volume":"19","author":"H Fei","year":"2011","unstructured":"Fei H, Qiu M, Li J, Grant T, Taylor D, McCaleb S, Butler L, Hamner R (2011) A Review on cloud computing: design challenges in architecture and security. Comput Inf Technol 19(1):25\u201355","journal-title":"Comput Inf Technol"},{"key":"2095_CR10","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.future.2013.12.015","volume":"35","author":"G Fortino","year":"2014","unstructured":"Fortino G, Parisi D, Pirrone V (2014) BodyCloud: a SaaS approach for community Body Sensor Networks. Futur Gener Comput Syst 35:62\u201379","journal-title":"Futur Gener Comput Syst"},{"key":"2095_CR11","doi-asserted-by":"crossref","unstructured":"Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D, Ganesan D (2001) Building efficient wireless sensor networks with low-level naming. In: Proc. the 18th ACM Symposium on Operating Systems Principles, pp 146\u2013159","DOI":"10.1145\/502034.502049"},{"key":"2095_CR12","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/978-3-642-03845-7_15","volume":"5688","author":"SK Jha","year":"2009","unstructured":"Jha SK, Clarke EM, Langmead CJ, Legay A, Platzer A, Zuliani P (2009) A Bayesian approach to model checking biological systems. Comput Methods Syst Biol 5688:218\u2013234","journal-title":"Comput Methods Syst Biol"},{"issue":"1","key":"2095_CR13","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1007\/978-94-007-5857-5_52","volume":"214","author":"MW Jung","year":"2013","unstructured":"Jung MW, Cho J (2013) Analysis of transmission rate using Zigbee routing protocol for u-health. Ubiquit Inf Technol Appl 214(1):479\u2013487","journal-title":"Ubiquit Inf Technol Appl"},{"key":"2095_CR14","doi-asserted-by":"crossref","unstructured":"Jung M, Cho J (2013) Performance Evaluation for Cloud Computing in u-Health Environment. In: Proc. IT Convergence and Security (ICITCS), pp 1\u20134","DOI":"10.1109\/ICITCS.2013.6717867"},{"key":"2095_CR15","unstructured":"Jung M, Han K, Cho J (2013) Cloud Computing for u-Health and Automotive Environment. In: Proc. International Conference on Ubiquitous and Future Networks, pp 495\u2013500"},{"issue":"1","key":"2095_CR16","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cmpb.2013.09.013","volume":"113","author":"PD Kaur","year":"2014","unstructured":"Kaur PD, Chana I (2014) Cloud based intelligent system for delivering health care as a service. Comput Methods Prog Biomed 113(1):346\u2013359","journal-title":"Comput Methods Prog Biomed"},{"key":"2095_CR17","author":"KC Kim","year":"2013","unstructured":"Kim KC (2013) An efficient processing of join queries for sensor networks using column-oriented databases. Int J Distrib Sensor Networks. doi: 10.1155\/2013\/345672","journal-title":"Int J Distrib Sensor Networks"},{"key":"2095_CR18","author":"J Kim","year":"2011","unstructured":"Kim J, Chung K-Y (2011) Ontology-based healthcare context information model to implement ubiquitous environment. Multimedia Tools Appl. doi: 10.1007\/s11042-011-0919-6","journal-title":"Multimedia Tools Appl"},{"key":"2095_CR19","unstructured":"Kotz D, Newport C, Gray RS, Liu J, Yuan Y, Elliott C (2004) Experimental evaluation of wireless. In: Proc. the 7th ACM International Symposium on Modeling, Analysis and Simulation for Wireless and Mobile Systems, pp 78\u201382"},{"key":"2095_CR20","author":"D Kovachev","year":"2012","unstructured":"Kovachev D, Cao Y, Klamma R (2012) Building mobile multimedia services: a hybrid cloud computing approach. Multimedia Tools Appl. doi: 10.1007\/s11042-012-1100-6","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"2095_CR21","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1530873.1530882","volume":"36","author":"M Kwiatkowska","year":"2009","unstructured":"Kwiatkowska M, Norman G, Parker D (2009) PRISM: probabilistic model checking for performance and reliability analysis. ACM SIGMETRICS Perform Eval Rev 36(4):40\u201345","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"2095_CR22","doi-asserted-by":"crossref","unstructured":"Kwiatkowska M, Norman G, Sproston J (2002) Probabilistic model checking of the IEEE 802.11 wireless local area network protocol. In: Proc. the 2nd joint International Workshop on Process Algebra and Probabilistic Methods and Performance Modeling in Verification, pp 169\u2013187","DOI":"10.1007\/3-540-45605-8_11"},{"issue":"3","key":"2095_CR23","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s001650300007","volume":"14","author":"M Kwiatkowska","year":"2003","unstructured":"Kwiatkowska M, Norman G, Sproston J (2003) Probabilistic model checking of deadline properties in the IEEE 1394 FireWire root contention protocol. Form Asp Comput 14(3):295\u2013318","journal-title":"Form Asp Comput"},{"key":"2095_CR24","doi-asserted-by":"crossref","unstructured":"Kwon Y, Agha G (2006) Scalable modeling and performance evaluation of wireless sensor networks. In: Proc. the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, pp 49\u201358","DOI":"10.1109\/RTAS.2006.39"},{"key":"2095_CR25","doi-asserted-by":"crossref","unstructured":"McIver AK (2006) Quantitative refinement and model checking for the analysis of probabilistic systems. In: Proc. the 14th International Symposium on Formal Methods, pp 131\u2013146","DOI":"10.1007\/11813040_10"},{"key":"2095_CR26","doi-asserted-by":"crossref","unstructured":"McIver AK, Fehnker A (2006) Formal techniques for the analysis of wireless networks. In: Proc. the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, pp 263\u2013270","DOI":"10.1109\/ISoLA.2006.51"},{"key":"2095_CR27","doi-asserted-by":"crossref","unstructured":"Pham HN, Pediaditakis D, Boulis A (2007) From simulation to real deployments in WSN and back. In: Proc. the 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp 1\u20136","DOI":"10.1109\/WOWMOM.2007.4351800"},{"issue":"1","key":"2095_CR28","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2013","unstructured":"Rong C, Nguyen ST, Jaatun MG (2013) Beyond lighting: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47\u201354","journal-title":"Comput Electr Eng"},{"key":"2095_CR29","doi-asserted-by":"crossref","unstructured":"Schuts M, Zhu F, Heidarian F, Vaandrager F (2009) Modelling clock synchronization in the chess gMAC WSN protocol. In: Proc. the 1st Workshop on Quantitative Formal Methods: Theory and Applications, pp 41\u201354","DOI":"10.4204\/EPTCS.13.4"},{"key":"2095_CR30","doi-asserted-by":"crossref","unstructured":"Seada K, Zuniga M, Helmy A, Krishnamachari B (2004) Energy efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In Proc. the 2nd International Conference on Embedded Networked Sensor Systems, pp 108\u2013121","DOI":"10.1145\/1031495.1031509"},{"key":"2095_CR31","doi-asserted-by":"crossref","unstructured":"Sharma O, Lewis J, Miller A, Dearle A, Balasubramaniam D, Morrison R, Sventek J (2009) Towards verifying correctness for wireless sensor network applications using insense and spin, In: Proc. the 16th International SPIN Workshop on Model Checking Software, pp 223\u2013240","DOI":"10.1007\/978-3-642-02652-2_19"},{"issue":"19","key":"2095_CR32","first-page":"32","volume":"58","author":"A Verma","year":"2012","unstructured":"Verma A (2012) Formal verification of device discovery mechanism using UPPAAL. Int J Comput Appl 58(19):32\u201337","journal-title":"Int J Comput Appl"},{"key":"2095_CR33","author":"X Wu","year":"2013","unstructured":"Wu X, Wang Y, Liu G (2013) Energy-efficient routing algorithms based on OVSF code and priority in clustered wireless sensor networks. Int J Distrib Sensor Networks. doi: 10.1155\/2013\/620945","journal-title":"Int J Distrib Sensor Networks"},{"key":"2095_CR34","author":"L Yin","year":"2013","unstructured":"Yin L, Dong M, Duan Y, Deng W, Zhao K, Guo J (2013) A high-performance training-free approach for hand gesture recognition with accelerometer. Multimedia Tools Appl. doi: 10.1007\/s11042-013-1368-1","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"2095_CR35","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s10703-013-0195-3","volume":"43","author":"P Zuliani","year":"2013","unstructured":"Zuliani P, Platzer A, Clarke EM (2013) Bayesian statistical model checking with application to Simulink\/Stateflow verification. Form Methods Syst Des 43(2):338\u2013367","journal-title":"Form Methods Syst Des"},{"key":"2095_CR36","doi-asserted-by":"crossref","unstructured":"Zuniga M, Krishnamachari B (2004) Analyzing the transitional region in low power wireless links. In: Proc. the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp 517\u2013526","DOI":"10.1109\/SAHCN.2004.1381954"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2095-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2095-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2095-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T14:28:50Z","timestamp":1565447330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2095-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,17]]},"references-count":36,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["2095"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2095-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,17]]}}}