Academic literature on the topic 'Bluetooth'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bluetooth.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Bluetooth"
Haartsen, Jaap, Mahmoud Naghshineh, Jon Inouye, Olaf J. Joeressen, and Warren Allen. "Bluetooth." ACM SIGMOBILE Mobile Computing and Communications Review 2, no. 4 (October 1998): 38–45. http://dx.doi.org/10.1145/1321400.1321402.
Full textYamazaki, Junichiro, and Kazumi Yoshida. "Bluetooth." Journal of the Institute of Image Information and Television Engineers 56, no. 5 (2002): 787–89. http://dx.doi.org/10.3169/itej.56.787.
Full textDavis, Dai. "Bluetooth." Network Security 2002, no. 4 (April 2002): 11–12. http://dx.doi.org/10.1016/s1353-4858(02)00413-0.
Full textDideles, Myra. "Bluetooth." XRDS: Crossroads, The ACM Magazine for Students 9, no. 4 (June 2003): 11–18. http://dx.doi.org/10.1145/904080.904083.
Full textAtchaya, S., S. Deepika, and S. Selvanayaki. "Bluetooth Broadcasting." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (October 31, 2018): 623–25. http://dx.doi.org/10.31142/ijtsrd18464.
Full textKaisar, Marilia. "Bluetooth Orgasms." MedieKultur: Journal of media and communication research 37, no. 71 (January 3, 2022): 143–60. http://dx.doi.org/10.7146/mediekultur.v37i71.125253.
Full textMcFedries, P. "Bluetooth cavities." IEEE Spectrum 42, no. 6 (June 2005): 88. http://dx.doi.org/10.1109/mspec.2005.1437055.
Full textReynolds, Franklin. "Whither Bluetooth?" IEEE Pervasive Computing 7, no. 3 (July 2008): 6–8. http://dx.doi.org/10.1109/mprv.2008.63.
Full textYuen, Shun Ming. "Bluetooth earphone." Journal of the Acoustical Society of America 126, no. 6 (2009): 3380. http://dx.doi.org/10.1121/1.3274273.
Full textPotter, Bruce. "Bluetooth “vulnerabilities”." Network Security 2004, no. 3 (March 2004): 4–5. http://dx.doi.org/10.1016/s1353-4858(04)00048-0.
Full textDissertations / Theses on the topic "Bluetooth"
Ho, Johan. "Bluetooth broadcasting." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10063.
Full textBackground: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did work with a few devices at the same time, since Bluetooth allows up to seven connections to one Bluetooth radio at the same time. By making a passive system where the user is the one which requests information, it also will not affect users' privacy. However, my research also found a few issues with the Bluetooth which might affect a broadcast, the most noticeable of them being the somewhat low transfer rate, an issue with device discovery not always working when a lot of users are doing device discovery at the same time. The fact that it only supports seven connections is also a limitation. Basically, while it is possible to use Bluetooth for broadcasting, it might be problematic to use it for targeting a large audience. Conclusions: Even with the problems mentioned, Bluetooth broadcasting provides quite a unique way of broadcasting, and with the newer versions of Bluetooth the issues mentioned might be less of a problem. Bluetooth broadcasting definitely has some potential.
San, Jose Ralf 1970. "Bluetooth technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9207.
Full textAlso available online at the DSpace at MIT website.
Includes bibliographical references.
Bluetooth is the codename adopted by a consortium of wireless equipment manufacturers that is working toward a low-cost, global standard for wireless communication of data and voice. It will operate in the unlicensed ISM band (industrial, scientific, and medical) with gross transfer rate up to lMbps and it will connect devices within a range of 10 or up to lOOm. The benefits of Bluetooth technology are twofold. First, it enables a user to replace the various cables between devices with a universal short-range radio link. For example, a cellular telephone and a portable computer equipped with the Bluetooth technology can interface without the need for cables. Further, they could interoperate with similarly equipped devices such as printers, fax machines, desktop computers and peripherals, and a host of other digital devices. The second major benefit of the Bluetooth technology is its ability to provide a connection between the ad hoc network and existing data networks. Bluetooth technology is designed for wireless personal area networks (WPANs), which are networks of personal electronic devices in close proximity to each other. Expectations for Bluetooth technology are that it will become a major player in the wireless data communications market, due primarily to its simplicity and its support from large companies, many of whom are integrating the technology into their products. Further, Bluetooth members are encouraging vendors to incorporate the technology into their products by waiving intellectual property royalty fees. That being said, this paper will explore the technical aspects of Bluetooth as well as the strategic rationale behind the founding companies. Since e-commerce might be heavily affected by this technology, especially business-to-consumer and consumer-to-consumer, this paper also explores the impact and possible changes in consumer and merchant behaviors.
by Ralf San Jose.
M.B.A.
Käppeli, Daniel. "JXTA over Bluetooth." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Information and Communication Systems Research Group, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=107.
Full textPettersson, Alexander, and Azlan Husin. "Bluetooth and security." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3534.
Full textJonsson, Björn. "Bluetooth QoS Scheduler." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93114.
Full textBluetooth är en standard för trådlös ad-hoc kommunikation. Denna standard definierar i antalet noder begränsade nätverk (piconet) som kan kopplas samman till större nätverk (scatternet). Många olika typer av applikationer kan tänkas använda dessa nätverk, vissa av dessa med speciella krav på Quality of Service (QoS). Ett exempel så en dylik applikation är ljudöverföringar som kräver att data överförs med jämna mellanrum för att kunna fungera tillfredställande. Kommunikationen över ett Bluetooth-piconet kontrolleras helt av en av de deltagande enheterna. Eftersom denna enhet kontrollerar trafiken kontrollerar den också upprätthållandet av QoS reservationerna. En central del i detta upprätthållande är schemaläggaren, som är den del i en Bluetoothenhet som prioriterar mellan olika saker som ska utföras. Ett exempel på en sådan prioritering kan vara vilken enhet i nätverket som ska få kommunicera härnäst. Bluetooth standarden beskriver inte hur denna schemaläggare ska implementeras. Grundläggande krav på en Bluetooth schemaläggare är att den ska kunna hantera och upprätthålla QoS reservationer samtidigt som den delar den befintliga kapaciteten på ett rättvist och effektivt sätt mellan de deltagande enheterna. Vidare bör den ha en låg komplexitet eftersom enkelhet är ett krav på alla delar i ett Bluetoothsystem. Detta examensarbete presenterar en ny patenterad algoritm för schemaläggning i begränsade Bluetoothnät som är kapabel att upprätthålla QoS-reservationer, samtidigt som den distribuerar den tillgängliga kapaciteten på ett rättvist sätt. Algoritmen möter också upp till kravet på låg komplexitet. Rapporten innehåller vidare simuleringar av algoritmens funktion, dessa har utförts i en ns2-baserad Bluetooth miljö och verifierar algoritmens funktionalitet.
Liu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Full textModigh, Fredrik, and Jerry Niva. "Bluetooth-USB-adapter." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-24783.
Full textThis thesis work had the intention to acoording to the processes of Motion Control develop a prototype of a wireless cable replacer for an existing product, USB I/O. USB I/O is an I/O and data collection unit with a number of in- and outputs. It has in some applications the drawback that it is connected through a USB cable. The idea for the work was to create a unit to connect to USB I/O which has the capability to connect to any existing “Bluetooth dongle” on the market.Three investigations were made. The first was a market investigation to see potential system solutions and to find out any direct competitors. It showed that the existing market did not offer any large number of active similar products. After this, two investigations were made to find suitable components for the prototype. Half way in the thesis it came obvious that whichever Bluetooth module that could be chosen, a Bluetooth profile, HID, was needed and had to be modified in order to use the conventional “Bluetooth dongles”. This would make a great cost or effort in development time than the scope of the thesis work allowed. From this, a decision was made to also include development of an additional unit to connect to the computer side, which then would replace the “dongle”.The thesis resulted in a prototype consisting of two subsystems, however in need of further development, offering partly the intended functionality. The USB I/O could be started up on a computer wirelessly using the system.
Dunning, John Paul. "Bluetooth Threat Taxonomy." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.
Full textMaster of Science
Rinaldi, Simon. "Intelligent objects (contextual Bluetooth) /." Sion, 2006. http://doc.rero.ch/search.py?recid=8310&ln=fr.
Full textHeimer, Anders, and Jonas Seffel. "Säkerhetsanalys av Bluetooth-kommunikation." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-387.
Full textDetta examensarbete beskriver resultatet av en undersökning av säkerheten hos Bluetooth
samt hur användning av Bluetooth-utrustade produkter kan påverka användarnas integritet.
Undersökningen har genomförts dels genom litteraturstudier och dels genom implementation
av en forskningsprototyp. Forskningsprototypen har använts vid ett experiment där vi
utrönt vilken information en Bluetooth-utrustad produkt avslöjar till en tredje part.
Vid experimentet har vi även försökt koppla ihop Bluetooth-utrustade produkter med
fysiska personer i syfte att visa möjligheterna att kartlägga människors rörelsemönster.
Resultatet av undersökning har visat att det finns flera säkerhetsbrister hos
Bluetooth-utrustade produkter, men att merparten av dessa inte beror på
Bluetooth-standarden utan på implementationen av den. Vidare dras slutsatsen att det
går att kartlägga människors rörelsemönster med hjälp av Bluetooth.
I uppsatsen beskrivs först Bluetooth-standarden, följt av en beskrivning av säkerheten hos Bluetooth.
Slutligen beskrivs implementationen av forskningsprototypen och resultatet av experimentet.
This report describes the result of an experiment that studies security and privacy issues in products
using Bluetooth. The study has been carried out by performing a literature study
and by implementing a research prototype. The research prototype has been used in an
experiment in which we examined the amount of information a Bluetooth equipped product reveals
when being used. We have also tried to correlate Bluetooth equipped products with their respective owners in the experiment.
This was done to investigate the possibilities of tracking peoples' movement patterns.
The result of the study shows that there exist several security flaws in Bluetooth equipped
products. However, the main part of the flaws are not a product of the Bluetooth standard. Instead, it
is the implementations of the Bluetooth standard that contains the security flaws. Further, we concluded that it
is possible to track peoples' movement patterns using Bluetooth.
The report starts with a description of the Bluetooth standard, followed by
a description of various aspects regarding Bluetooth security. Finally, the implementation of
the research prototype and the subsequent results from the experiment are described.
Books on the topic "Bluetooth"
Miller, Brent A. Bluetooth revealed. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
Find full textMiller, Brent A. Bluetooth revealed. Upper Saddle River, NJ: Prentice Hall PTR, 2001.
Find full textHopkins, Bruce, and Ranjith Antony. Bluetooth for Java. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-0763-4.
Full textHaataja, Keijo, Konstantin Hyppönen, Sanna Pasanen, and Pekka Toivanen. Bluetooth Security Attacks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40646-1.
Full textBhalla, Himanshu, and Oren Haggai. Unraveling Bluetooth LE Audio. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6658-8.
Full textBook chapters on the topic "Bluetooth"
Osterhage, Wolfgang W. "Bluetooth." In sicher & mobil, 133–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_8.
Full textSauter, Martin. "Bluetooth." In Grundkurs Mobile Kommunikationssysteme, 407–55. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21647-4_7.
Full textSauter, Martin. "Bluetooth." In Grundkurs Mobile Kommunikationssysteme, 375–424. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08342-7_6.
Full textSauter, Martin. "Bluetooth." In Grundkurs Mobile Kommunikationssysteme, 279–339. Wiesbaden: Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-92908-2_5.
Full textDawoud, Dawoud Shenouda, and Peter Dawoud. "Bluetooth." In Microcontroller and Smart Home Networks, 415–78. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338833-13.
Full textSauter, Martin. "Bluetooth." In Grundkurs Mobile Kommunikationssysteme, 355–401. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-01461-2_6.
Full textHassan, Mahbub. "Bluetooth." In Wireless and Mobile Networking, 187–217. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003042600-15.
Full textSauter, Martin. "Bluetooth." In Grundkurs Mobile Kommunikationssysteme, 339–89. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-36963-7_5.
Full textOsterhage, Wolfgang W. "Bluetooth." In Sicherheitskonzepte in der mobilen Kommunikation, 85–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57903-9_5.
Full textKumar, Anil, Jafer Hussain, and Anthony Chun. "Bluetooth." In Connecting the Internet of Things, 215–87. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-8897-9_4.
Full textConference papers on the topic "Bluetooth"
Chien, George, and Mototsugu Hamada. "WLAN/Bluetooth." In 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2007. http://dx.doi.org/10.1109/isscc.2007.373541.
Full textJ. Grahn, Kaj, Christian Dickert, Frank Schneider, and Göran Pulkkis. "Measurement Data Logging via Bluetooth." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2921.
Full textKumar, Monu, and B. K. Gupta. "Security for Bluetooth enabled devices using BlipTrack Bluetooth detector." In 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA). IEEE, 2015. http://dx.doi.org/10.1109/icacea.2015.7164686.
Full textLukac, Nikola, Roman Pavlovic, Violeta Vukobrat, and Nikola Teslic. "Bluetooth Smart Plug." In 2015 IEEE 1st International Workshop on Consumer Electronics - Novi Sad. IEEE, 2015. http://dx.doi.org/10.1109/cews.2015.7867143.
Full textZhang, Junbiao. "Bluetooth helper environment." In Asia-Pacific Optical and Wireless Communications Conference and Exhibit, edited by Hequan Wu and Jari Vaario. SPIE, 2001. http://dx.doi.org/10.1117/12.445272.
Full textIvo, Penn. "Bluetooth and security." In SPIE Proceedings, edited by Jaromir Pistora, Kamil Postava, Miroslav Hrabovsky, and Banmali S. Rawat. SPIE, 2004. http://dx.doi.org/10.1117/12.557839.
Full textM, Sreeja, and Sreeram M. "Bluetooth 5 beacons." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3152306.
Full textMumtaz, A., and Faisal Tehseen Shah. "Games over Bluetooth." In IEEE International Conference on Computer Systems and Applications, 2006. IEEE, 2006. http://dx.doi.org/10.1109/aiccsa.2006.205238.
Full textMahith, M., Darshan S. B. Kumar, K. C. Prajwal, and M. Dakshayini. "Bluetooth Home Automation." In 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2018. http://dx.doi.org/10.1109/icgciot.2018.8753094.
Full textSamoilova, Yana-Mariia. "Bluetooth vulnerability analysis." In COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES. Kharkiv, Ukraine: Press of the Kharkiv National University of Radioelectronics, 2020. http://dx.doi.org/10.30837/ivcsitic2020201362.
Full textReports on the topic "Bluetooth"
Scarfone, K. A., and J. Padgette. Guide to bluetooth security. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-121.
Full textPadgette, J., K. A. Scarfone, and L. Chen. Guide to bluetooth security. Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-121r1.
Full textPadgette, John, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, and Karen Scarfone. Guide to bluetooth security. Gaithersburg, MD: National Institute of Standards and Technology, May 2017. http://dx.doi.org/10.6028/nist.sp.800-121r2.
Full textPadgette, John, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, and Karen Scarfone. Guide to Bluetooth Security. National Institute of Standards and Technology, January 2022. http://dx.doi.org/10.6028/nist.sp.800-121r2-upd1.
Full textNieminen, J., T. Savolainen, M. Isomaki, B. Patil, Z. Shelby, and C. Gomez. IPv6 over BLUETOOTH(R) Low Energy. RFC Editor, October 2015. http://dx.doi.org/10.17487/rfc7668.
Full textSchwingenschloegl, Christian, and Anton Heigl. Development of a Service Discovery Architecture for the Bluetooth Radio System. Fort Belvoir, VA: Defense Technical Information Center, September 2000. http://dx.doi.org/10.21236/ada386220.
Full textDay, Christopher. Roadway System Assessment Using Bluetooth-Based Automatic Vehicle Identification Travel Time Data. Purdue University, December 2012. http://dx.doi.org/10.5703/1288284314988.
Full textMoayeri, Nader. On the Feasibility of COVID-19 Proximity Detection Using Bluetooth Low Energy Signals. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8437.
Full textGomez, C., S. M. Darroudi, T. Savolainen, and M. Spoerk. IPv6 Mesh over BLUETOOTH(R) Low Energy Using the Internet Protocol Support Profile (IPSP). RFC Editor, December 2021. http://dx.doi.org/10.17487/rfc9159.
Full textSt. Germain, Shawn, Ronald Boring, Thomas Ulrich, Brandon Rice, and Ahmad Y. Al Rashdan. Automated Work Packages: Radio Frequency Identification, Bluetooth Beacons, and Video Applications in the Nuclear Power Industry. Office of Scientific and Technical Information (OSTI), September 2017. http://dx.doi.org/10.2172/1472110.
Full text