{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T08:04:21Z","timestamp":1715069061122},"reference-count":40,"publisher":"Elsevier","isbn-type":[{"value":"9780128051955","type":"print"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1016\/b978-0-12-805195-5.00016-8","type":"book-chapter","created":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T14:47:13Z","timestamp":1483973233000},"page":"427-440","source":"Crossref","is-referenced-by-count":1,"title":["End-Users Testing of Enhanced Living Environment Platform and Services"],"prefix":"10.1016","author":[{"given":"Rossitza I.","family":"Goleva","sequence":"first","affiliation":[]},{"given":"Nuno M.","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"given":"Ciprian","family":"Dobre","sequence":"additional","affiliation":[]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Rumen","family":"Stainov","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0020","year":"2015"},{"issue":"4","key":"10.1016\/B978-0-12-805195-5.00016-8_br0025","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of things: a survey on enabling technologies, protocols, and applications","volume":"17","author":"Al-Fuqaha","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0030","series-title":"LOPSTR 2015","first-page":"313","article-title":"SHIP \u2014 A logic-based language and tool to program smart environments","author":"Autexier","year":"2015"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0035","first-page":"3","article-title":"An implementation, execution and simulation platform for processes in heterogeneous smart environments","volume":"2013","author":"Autexier","year":"2013","journal-title":"AmI"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0040","series-title":"Proceedings of the 2010 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID '10)","first-page":"631","article-title":"D-cloud: design of a software testing environment for reliable distributed systems using cloud computing technology","author":"Banzai","year":"2010"},{"issue":"2","key":"10.1016\/B978-0-12-805195-5.00016-8_br0045","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.suscom.2014.04.001","article-title":"An IEEE 802.11 energy efficient mechanism for continuous media applications","volume":"4","author":"Bernardo","year":"2014","journal-title":"Sustain. Comput. Inf. Syst.","ISSN":"http:\/\/id.crossref.org\/issn\/2210-5379","issn-type":"print"},{"issue":"1","key":"10.1016\/B978-0-12-805195-5.00016-8_br0050","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1002\/spe.995","article-title":"CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms","volume":"41","author":"Calheiros","year":"2011","journal-title":"Softw. Pract. Exp.","ISSN":"http:\/\/id.crossref.org\/issn\/1097-024X","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0055","series-title":"AIME 2015","article-title":"Using a virtual environment to test a mobile App for the ambient assisted living","author":"Calvaresi","year":"2015"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0060","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.future.2015.09.031","article-title":"Cloud computing adoption framework: a security framework for business clouds","volume":"57","author":"Chang","year":"2016","journal-title":"Future Gener. Comput. Syst.","ISSN":"http:\/\/id.crossref.org\/issn\/0167-739X","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0065","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.proeng.2014.11.622","article-title":"Development and evaluation of a WSN for real-time structural health monitoring and testing","volume":"87","author":"Depari","year":"2014","journal-title":"Proc. Eng."},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0070","series-title":"Wireless Communications and Mobile Computing","first-page":"1587","article-title":"A survey of mobile cloud computing: architecture, applications, and approaches","author":"Dinh","year":"2013"},{"issue":"4","key":"10.1016\/B978-0-12-805195-5.00016-8_br0075","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","article-title":"A framework for ranking of cloud computing services","volume":"29","author":"Garg","year":"2013","journal-title":"Future Gener. Comput. Syst.","ISSN":"http:\/\/id.crossref.org\/issn\/0167-739X","issn-type":"print"},{"issue":"9","key":"10.1016\/B978-0-12-805195-5.00016-8_br0080","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/2330667.2330685","article-title":"Success factors for deploying cloud computing","volume":"55","author":"Garrison","year":"2012","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0085","series-title":"Resource Management of Mobile Cloud Computing Networks and Environments","first-page":"122","article-title":"Traffic analyses and measurements: technological dependability","author":"Goleva","year":"2015"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0090","series-title":"First COST Action IC1303 AAPELE Workshop Element 2014, in Conjunction with MONAMI 2014 Conference","first-page":"315","article-title":"Reliable platform for enhanced living environment","author":"Goleva","year":"2015"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0095","series-title":"ICT Innovations 2015","first-page":"255","article-title":"Automated ambient open platform for enhanced living environment","author":"Goleva","year":"2016"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0100","series-title":"Internet of Things (IoT) in 5G Mobile Technologies, 2016","isbn-type":"print","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/978-3-319-30913-2_20","article-title":"Data and traffic models in 5G network","author":"Goleva","year":"2016","ISBN":"http:\/\/id.crossref.org\/isbn\/9783319309132"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0105","series-title":"2013 12th International Conference on Telecommunications (ConTEL)","first-page":"215","article-title":"Introducing gesture interaction in the ambient assisted living platform universal","author":"Grguri\u0107","year":"2013"},{"issue":"5","key":"10.1016\/B978-0-12-805195-5.00016-8_br0110","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","article-title":"The usage and adoption of cloud computing by small and medium businesses","volume":"33","author":"Gupta","year":"2013","journal-title":"Int. J. Inf. Manag.","ISSN":"http:\/\/id.crossref.org\/issn\/0268-4012","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0115","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","article-title":"The rise of \u201cbig data\u201d on cloud computing: review and open research issues","volume":"47","author":"Hashem","year":"2015","journal-title":"Inf. Syst.","ISSN":"http:\/\/id.crossref.org\/issn\/0306-4379","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0120","series-title":"2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET)","first-page":"877","article-title":"Cloud computing \u2014 concepts, architecture and challenges","author":"Jadeja","year":"2012"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0125","series-title":"2012 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Securing cloud computing environment against DDoS attacks","author":"Joshi","year":"2012"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0130","series-title":"Software, Services and Systems","first-page":"355","article-title":"Formal modelling for cooking assistance","author":"Krieg-Br\u00fcckner","year":"2015"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0135","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","article-title":"External integrity verification for outsourced big data in cloud and IoT: a big picture","volume":"49","author":"Liu","year":"2015","journal-title":"Future Gener. Comput. Syst.","ISSN":"http:\/\/id.crossref.org\/issn\/0167-739X","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0140","series-title":"ICT Innovations 2015","year":"2016"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0145","series-title":"ICOST 2016","first-page":"14","article-title":"People tracking in ambient assisted living environments using low-cost thermal image cameras","author":"Mandel","year":"2016"},{"issue":"1","key":"10.1016\/B978-0-12-805195-5.00016-8_br0150","first-page":"15","article-title":"Towards learning of generic skills for robotic manipulation","volume":"28","author":"Metzen","year":"2014","journal-title":"KI"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0155","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.compind.2014.12.007","article-title":"Behavioral modeling and automated verification of a Cloud-based framework to share the knowledge and skills of human resources","volume":"68","author":"Navimipour","year":"2015","journal-title":"Comput. Ind.","ISSN":"http:\/\/id.crossref.org\/issn\/0166-3615","issn-type":"print"},{"issue":"5","key":"10.1016\/B978-0-12-805195-5.00016-8_br0160","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","article-title":"Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors","volume":"51","author":"Oliveira","year":"2014","journal-title":"Inf. Manag.","ISSN":"http:\/\/id.crossref.org\/issn\/0378-7206","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0165","doi-asserted-by":"crossref","DOI":"10.1504\/IJMRI.2016.074748","article-title":"Numerical model upgrading of a historical masonry palace monitored with a wireless sensor network","author":"Pierdicca","year":"2016","journal-title":"Int. J. Mason. Res. Innov"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0170","series-title":"Cloud Computing: Implementation, Management, and Security","author":"Rittinghouse","year":"2016"},{"issue":"2","key":"10.1016\/B978-0-12-805195-5.00016-8_br0175","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MS.2011.132","article-title":"Testing in the Cloud: exploring the practice","volume":"29","author":"Riungu-Kalliosaari","year":"2012","journal-title":"IEEE Softw."},{"issue":"1","key":"10.1016\/B978-0-12-805195-5.00016-8_br0180","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/SURV.2013.050113.00090","article-title":"Heterogeneity in mobile cloud computing: taxonomy and open challenges","volume":"16","author":"Sanaei","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0185","series-title":"10th Annual International Conference on Computer Science and Education in Computer Science 2014 (CSECS 2014)","first-page":"153","article-title":"Reliable transmission over disruptive cloud using peer port","author":"Stainov","year":"2014"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0190","series-title":"BlackSeaCom 2016","article-title":"AALaaS intelligent backhauls for P2P communication in 5G mobile networks","author":"Stainov","year":"2016"},{"issue":"1","key":"10.1016\/B978-0-12-805195-5.00016-8_br0195","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"J. Netw. Comput. Appl.","ISSN":"http:\/\/id.crossref.org\/issn\/1084-8045","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0200","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.procs.2015.04.037","article-title":"Adaptive utility-based anonymization model: performance evaluation on big data sets","volume":"50","author":"Vijayakumar","year":"2015","journal-title":"Proc. Comput. Sci.","ISSN":"http:\/\/id.crossref.org\/issn\/1877-0509","issn-type":"print"},{"key":"10.1016\/B978-0-12-805195-5.00016-8_br0205","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.procs.2015.04.040","article-title":"Advertisement posting based on consumer behaviour","volume":"50","author":"Vijayakumar","year":"2015","journal-title":"Proc. Comput. Sci.","ISSN":"http:\/\/id.crossref.org\/issn\/1877-0509","issn-type":"print"},{"issue":"10","key":"10.1016\/B978-0-12-805195-5.00016-8_br0210","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","article-title":"Security and privacy for storage and computation in cloud computing","volume":"258","author":"Wei","year":"2014","journal-title":"Inf. Sci.","ISSN":"http:\/\/id.crossref.org\/issn\/0020-0255","issn-type":"print"},{"issue":"1","key":"10.1016\/B978-0-12-805195-5.00016-8_br0215","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.rcim.2011.07.002","article-title":"From cloud computing to cloud manufacturing","volume":"28","author":"Xu","year":"2012","journal-title":"Robot. Comput.-Integr. Manuf.","ISSN":"http:\/\/id.crossref.org\/issn\/0736-5845","issn-type":"print"}],"container-title":["Ambient Assisted Living and Enhanced Living Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128051955000168?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128051955000168?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T06:23:11Z","timestamp":1536128591000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128051955000168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9780128051955"],"references-count":40,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-805195-5.00016-8","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}