Abstract is missing.
- Cielo: An Evolutionary Game Theoretic Framework for Virtual Machine Placement in CloudsYi Cheng Ren, Junichi Suzuki, Athanasios V. Vasilakos, Shingo Omura, Katsuya Oba. 1-8 [doi]
- Online Traffic Prediction in the Cloud: A Dynamic Window ApproachBruno Lopes Dalmazo, João P. Vilela, Marília Curado. 9-14 [doi]
- Dynamic Media Stream Mobility with TURNÁlvaro Alonso, Pedro Rodríguez, Joaquín Salvachúa, Javier Cerviño. 15-22 [doi]
- On the Integration of Cloud Computing and Internet of ThingsAlessio Botta, Walter de Donato, Valerio Persico, Antonio Pescapè. 23-30 [doi]
- Call Admission Control in Cloud Radio Access NetworksTshiamo Sigwele, Prashant Pillai, Yim-Fun Hu. 31-36 [doi]
- RPR over EthernetAmmar Hamad, Michel Kadoch. 37-42 [doi]
- Distortion in Social Networks: Comparison of Various Types of NetworksOfir Ben-Assuli, Arie Jacobi. 43-47 [doi]
- Video Streaming Considerations for Internet of ThingsRubem Pereira, Ella Grishikashvili Pereira. 48-52 [doi]
- An On-Demand WebRTC and IoT Device Tunneling Service for HospitalsThomas Sandholm, Boris Magnusson, Björn A. Johnsson. 53-60 [doi]
- dOTM: A Mechanism for Distributing Centralized Multi-party Video Conferencing in the CloudPedro Rodríguez, Álvaro Alonso, Joaquín Salvachúa, Javier Cerviño. 61-67 [doi]
- Media Abstraction Framework for the Pervasive Middleware PalComAmr Ergawy, Boris Magnusson. 68-75 [doi]
- DoLen: User-Side Multi-cloud Application MonitoringDo Le Quoc, Lenar Yazdanov, Christof Fetzer. 76-81 [doi]
- Mobile Cloud Contextual Awareness with the Cloud Personal AssistantMichael J. O'Sullivan, Dan Grigoras. 82-89 [doi]
- TCP Hole Punching Approach to Address Devices in Mobile NetworksSatish Narayana Srirama, Mohan Liyanage. 90-97 [doi]
- Wireless Sensor Networks and Efficient LocalisationPinar Kirci, Hakima Chaouchi, Anis Laouiti. 98-100 [doi]
- Joint Caching and Routing for Greening Computer Networks with Renewable Energy SourcesAbdallah Khreishah, Issa Khalil, Ammar Gharaibeh, Haythem Bany Salameh, Rafe Alasem. 101-106 [doi]
- A Mobile Crowdsensing Ecosystem Enabled by a Cloud-Based Publish/Subscribe MiddlewareAleksandar Antonic, Kristijan Roankovic, Martina Marjanovic, Kreimir Pripuic, Ivana Podnar Zarko. 107-114 [doi]
- Comparative Analysis of Adaptive File Replication Algorithms for Cloud Data StorageJulia Myint, Axel Hunger. 115-123 [doi]
- Standardized Framework for Integrating Domain-Specific Applications into the IoTNeela Shrestha, Sylvain Kubler, Kary Främling. 124-131 [doi]
- Cost Based Approach to Block Placement for Distributed File SystemsLakshminarayan Srinivasan, Vasudeva Varma. 132-138 [doi]
- Empowering End-Users to Develop Context-Aware Mobile Applications Using a Web PlatformDavid Martin, Carlos Lamsfus, Aurkene Alzua-Sorzabal, Emilio Torres-Manzanera. 139-145 [doi]
- Ontology Model to Support Multi-tenancy in Software as a Service EnvironmentTaewoo Nam, Keunhyuk Yeom. 146-151 [doi]
- Scalable Semantic Aware Context StorageMário Luis Pinto Antunes, Diogo Nuno Pereira Gomes, Rui Luis Andrade Aguiar. 152-158 [doi]
- Social Network-Based Framework for Web Services DiscoveryHiba Fallatah, Jamal Bentahar, Ehsan Khosrowshahi Asl. 159-166 [doi]
- Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data SourcesMai Ali, Sherif Khattab, Reem Bahgat. 167-174 [doi]
- Towards Continuous Cloud Service Assurance for Critical Infrastructure ITAleksandar Hudic, Thomas Hecht, Markus Tauber, Andreas Mauthe, Santiago Cáceres Elvira. 175-182 [doi]
- On the Risk Exposure of Smart Home Automation SystemsAndreas Jacobsson, Martin Boldt, Bengt Carlsson. 183-190 [doi]
- User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of ThingsMartin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle. 191-196 [doi]
- E-Commerce Security IssuesMohamad Ibrahim Ladan. 197-201 [doi]
- Low Cost Quality Aware Multi-tier Application Hosting on the Amazon CloudWaheed Iqbal, Matthew N. Dailey, David N. Carrera. 202-209 [doi]
- On the Impact of Layer-Splitting for Cloud-Based SVC StreamingSeonghoon Moon, Chanhyuk Jung, Jong-Seok Lee, Songkuk Kim. 210-215 [doi]
- Live Migration Impact on Virtual Datacenter Performance: Vmware vMotion Based StudyMohamed Esam Elsaid, Christoph Meinel. 216-221 [doi]
- Cloud Technology and Performance Improvement with Intserv over Diffserv for Cloud ComputingAbdullah Sinan Yildirim, Tolga Girici. 222-229 [doi]
- Data Dissemination Algorithms for Communicating Materials Using Wireless Sensor NetworksKais Mekki, William Derigent, Ahmed Zouinkhi, Eric Rondeau, Mohamed Naceur Abdelkrim. 230-237 [doi]
- Cascading Permissions Policy Model for Token-Based Access Control in the Web of ThingsMohammed Amir, Prashant Pillai, Yim-Fun Hu. 238-245 [doi]
- Courteous Priority Access to the Shared Commercial Radio for Public Safety in LTE Heterogeneous NetworksChafika Tata, Michel Kadoch. 246-252 [doi]
- Large Scale Environmental Monitoring and Maintaining Sensing Coverage in Sensor NetworksFuad Bajaber. 253-257 [doi]
- Interconnecting Standard M2M Platforms to Delay Tolerant NetworksAsma Elmangoush, Andreea Corici, Marisa Catalan, Ronald Steinke, Thomas Magedanz, Joaquim Oller. 258-263 [doi]
- The Moving IoTJulio Aráuz. 264-271 [doi]
- Enhanced Routing over Sleeping Nodes in 6LoWPAN NetworkN. Hari Kumar, P. Karthikeyan, Deeksha B., Tarun Mohandas. 272-279 [doi]
- Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc NetworksAntesar M. Shabut, Keshav Dahal, Irfan Awan. 280-287 [doi]
- Provisioning Software-Defined IoT Cloud SystemsStefan Nastic, Sanjin Sehic, Duc-Hung Le, Hong Linh Truong, Schahram Dustdar. 288-295 [doi]
- Software Defined Networking: Redefining the Future of Internet in IoT and Cloud EraVishwapathi Rao Tadinada. 296-301 [doi]
- Cloud Computing: Adoption Considerations for Business and EducationAdam Smith, Jagdev Bhogal, Mak Sharma. 302-307 [doi]
- An Expert Consultant for Cloudifying E-Learning EnvironmentsShehab Gamalel-Din, Reda Salama, Mashael Al-Sowaiel. 308-315 [doi]
- The Impact of Cyber Security Issues on Businesses and Governments: A Framework for Implementing a Cyber Security PlanHajar Iguer, Hicham Medromi, Adil Sayouti, Soukaina Elhasnaoui, Sophia Faris. 316-321 [doi]
- Policy Based Security Middleware as a ServiceMhammed Chraibi, Mehdia Ajana El-Khaddar, Hamid Harroud, Abdelilah Maach, Mohammed Elkoutbi. 322-327 [doi]
- Service Composition Framework for Big Data ServiceTaewoo Nam, Kyungsuk Choi, Cheolmin Ok, Keunhyuk Yeom. 328-333 [doi]
- A Virtual Channel-Based Framework for the Integration of Wireless Sensor Networks in the CloudJavier Barbarán, Manuel Díaz, Bartolomé Rubio. 334-339 [doi]
- Virtual Private Network over Wireless Mesh NetworksDjedjiga Benzid, Michel Kadoch. 340-345 [doi]
- Device Description Language: Factorizing the Control of Arbitrary Networked DevicesPhilip Nye. 346-350 [doi]
- Stationary Transformation of Video Traffic in LTE NetworksSuliman Albasheir, Michel Kadoch. 351-355 [doi]
- Stratified Multi-ring Distributed Search Model for Big DataWei-qing Cheng, Geng Yang, Shanshan Zhang, Shaobai Zhang. 356-360 [doi]
- Information Security Maintenance Issues for Big Security-Related DataNatalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov. 361-366 [doi]
- Simulation and Big Data: A Way to Discover Unusual Knowledge in Emergency Departments: Work-in-Progress PaperEva Bruballa, Manel Taboada, Eduardo Cabrera, Dolores Rexachs, Emilio Luque. 367-372 [doi]
- From Big Data to Big Projects: A Step-by-Step RoadmapHajar Mousannif, Hasna Sabah, Yasmina Douiji, Younes Oulad Sayad. 373-378 [doi]
- MRTree: Functional Testing Based on MapReduce's Execution BehaviourJesus Moran, Claudio de la Riva, Javier Tuya. 379-384 [doi]
- A Big Data Financial Information Management Architecture for Global BankingAntoni Munar, Esteban Chiner, Ignacio Sales. 385-388 [doi]
- Big Data issues in Computational ChemistryVioleta Yeguas, Rubén Casado. 389-392 [doi]
- Smart Tablet Monitoring by a Real-Time Head Movement and Eye Gestures Recognition SystemHanene Elleuch, Ali Wali, Adel M. Alimi. 393-398 [doi]
- Improving I/O Performance in Smart TVsCheol-Hee Lee, Taeho Hwang, Youjip Won. 399-404 [doi]
- SlowDroid: Turning a Smartphone into a Mobile Attack VectorEnrico Cambiaso, Gianluca Papaleo, Maurizio Aiello. 405-410 [doi]
- Android Executable Modeling: Beyond Android ProgrammingOlivier Le Goaer, Franck Barbier, Eric Cariou, Samson Pierre. 411-414 [doi]
- Smart WalkerGaby Abou Haidar, Roger Achkar, Richard Maalouf, Batoul Mchiek, Houssein Allam, Abdul Rahim Moussa. 415-419 [doi]
- A Framework for Cross-Platform Mobile Web Applications Using HTML5Christos Bouras, Andreas Papazois, Nikolaos Stasinos. 420-424 [doi]
- RemindMe: An Enhanced Mobile Location-Based Reminder ApplicationAli Mert Ertugrul, Itir Önal. 425-430 [doi]
- Comparative Analysis of Freemium Policies and Procedure between Major Mobile PlatformsMuhamad Idaham Umar Ong, Imran Edzereiq Kamarudin, Mohamed Ariff Ameedeen. 431-436 [doi]
- Human-Computer Interaction Patterns within the Mobile Nutrition Landscape: A Review of LiteratureStefan Scerri, Lalit Garg, Christian Scerri, Ramandeep Garg. 437-441 [doi]
- A Two-Stage Resolution Search-Based Heuristic for the Team Orienteering ProblemMhand Hifi, Moussa Ibrahim, Toufik Saadi. 442-447 [doi]
- Towards an Energy-Efficient Tool for Processing the Big DataÉric Renault, Selma Boumerdassi. 448-452 [doi]
- Sustainable Quality of Service for Real-Time Jobs in Autonomous Computing DevicesRola El Osta, Maryline Chetto. 453-457 [doi]
- A Real-Time Feedback Scheduler for Environmental Energy with Discrete Voltage/Frequency ModesAkli Abbas, Emmanuel Grolleau, Driss Mehdi, Malik Loudini, Walid-Khaled Hidouci. 458-463 [doi]
- Fog Computing and Smart Gateway Based Communication for Cloud of ThingsMohammad Aazam, Eui-nam Huh. 464-470 [doi]
- In-Transit Data Analysis and Distribution in a Multi-cloud Environment Using CometCloudIoan Petri, Javier Diaz Montes, Mengsong Zou, Omer F. Rana, Tom Beach, Haijiang Li, Yacine Rezgui. 471-476 [doi]
- To Build or Not to Build? Addressing the Expansion Strategies of Cloud ProvidersMohammad Wardat, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah Khreishah. 477-482 [doi]
- Dynamic Arrival Process for TCP Using a Novel Time-Dependant Statistical Calculation ApproachZhenyu Chen, Lin Guan, Peter Bull. 483-490 [doi]
- Stochastic Modeling and Performance Evaluation of an Event Based SystemNitin Shukla, Mayank Pandey. 491-496 [doi]
- Scalar: Systematic Scalability Analysis with the Universal Scalability LawThomas Heyman, Davy Preuveneers, Wouter Joosen. 497-504 [doi]
- Scalability Analysis of the OpenAM Access Control System with the Universal Scalability LawThomas Heyman, Davy Preuveneers, Wouter Joosen. 505-512 [doi]
- Accompanying Component Based Systems Dynamic Reconfiguration with Formal Modelling and AnalysisHamza Zerguine, Nabila Salmi, Malika Boukala. 513-520 [doi]
- Maximum Entropy Formalism of Multi-traffic Censored Priority QueueTaimur Karamat, Tehmina Karamat. 521-527 [doi]
- Prospects for Detecting Deception on TwitterUlrik Franke, Magnus Rosell. 528-533 [doi]
- Social Recommender System for Predicting the Needs of Students/Instructors: Review and Proposed FrameworkHadeel Alharbi, Ashoka Jayawardena, Paul Kwan. 534-540 [doi]
- A Cloud-Based Tool for Brand Monitoring in Social NetworksAntonio Tedeschi, Francesco Benedetto. 541-546 [doi]
- Automatic Lexicon Construction for Arabic Sentiment AnalysisNawaf A. Abdulla, Roa'a Majdalawi, Salwa Mohammed, Mahmoud Al-Ayyoub, Mohammed Al-Kabi. 547-552 [doi]
- Impact of Change in Weekend Days on Social Networking Culture in Saudi ArabiaBasit Shahzad, Esam Alwagait, Sophia Alim. 553-558 [doi]
- Rough Set Theory for Arabic Sentiment ClassificationQasem A. Al-Radaideh, Laila M. Twaiq. 559-564 [doi]
- Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based FrameworkElhadj Benkhelifa, Elliott Rowe, Robert Kinmond, Oluwasegun A. Adedugbe, Thomas Welsh. 565-572 [doi]
- Cross-Lingual Short-Text Document Classification for Facebook CommentsMosab Faqeeh, Nawaf A. Abdulla, Mahmoud Al-Ayyoub, Yaser Jararweh, Muhannad Quwaider. 573-578 [doi]
- Arabic Sentiment Analysis Using Supervised ClassificationRehab M. Duwairi, Islam Qarqaz. 579-583 [doi]