Abstract is missing.
- Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the CloudChristian Wagner, Aleksandar Hudic, Silia Maksuti, Markus Tauber, Frank Pallas. 1-8 [doi]
- Cross-Domain Internet of Things Application Development: M3 Framework and EvaluationAmelie Gyrard, Soumya Kanti Datta, Christian Bonnet, Karima Boudaoud. 9-16 [doi]
- Towards Semantic Monitoring Data Collection and Representation in Federated InfrastructuresYahya Al-Hazmi, Thomas Magedanz. 17-24 [doi]
- Designing a Smart City Internet of Things Platform with Microservice ArchitectureAlexandr Krylovskiy, Marco Jahn, Edoardo Patti. 25-30 [doi]
- Dynamic Cloud Resources Allocation on Multidomain/Multiphysics ProblemsNiki Sfika, Aigli Korfiati, Christos E. Alexakos, Spiros Likothanassis, Konstantis Daloukas, Panagiota Tsompanopoulou. 31-37 [doi]
- Gatica: Linked Sensed Data Enrichment and Analytics Middleware for IoT GatewaysSoheil Qanbari, Negar Behinaein, Rabee Rahimzadeh, Schahram Dustdar. 38-43 [doi]
- SensorScript: A Business-Oriented Domain-Specific Language for Sensor NetworksAlexandre Garnier, Jean-Marc Menaud, Rémy Pottier. 44-49 [doi]
- A Cloud-Based IoT Data Gathering and Processing PlatformVincent C. Emeakaroha, Neil Cafferkey, Philip D. Healy, John P. Morrison. 50-57 [doi]
- Toward an Anonymous Process MiningAndrea Burattin, Mauro Conti, Daniele Turato. 58-63 [doi]
- Opportunity to Leverage Information-as-an-Asset in the IoT - The Road AheadSylvain Kubler, Min-Jung Yoo, Cyril Cassagnes, Kary Främling, Dimitris Kiritsis, Mark Skilton. 64-71 [doi]
- Formalizing Over Design and Under Design of Value Engineering for Context-Aware Cloud Service DevelopmentYucong Duan, Qiang Duan, Abdelrahman Osman Elfaki, Chengxiang Ren. 72-79 [doi]
- A Game-Theoretic Analysis on Context-Aware Resource Allocation for Device-to-Device Communications in Cloud-Centric Internet of ThingsJun Huang, Ying Yin, Qiang Duan, Huifang Yan. 80-86 [doi]
- Semantic Features for Context OrganizationMario Antuns, Diogo Gomes, Rui L. Aguiar. 87-92 [doi]
- Binary Context Tree Based Middleware for Next Generation Context Aware NetworksTugce Bilen, Berk Canberk. 93-99 [doi]
- oneM2M Architecture Based User Centric IoT Application DevelopmentSoumya Kanti Datta, Amelie Gyrard, Christian Bonnet, Karima Boudaoud. 100-107 [doi]
- Predictive Congestion Avoidance in Wireless Mesh NetworkFawaz Ali Khasawneh, Abderrahmane BenMimoune, Michel Kadoch, Mohammed A. Khasawneh. 108-112 [doi]
- User Association for HetNet Small Cell NetworksAbderrahmane BenMimoune, Fawaz Ali Khasawneh, Michel Kadoch. 113-117 [doi]
- CoAP over BP for a Delay-Tolerant Internet of ThingsMael Auzias, Yves Mahéo, Frédéric Raimbault. 118-123 [doi]
- Pre-emptive Flow Installation for Internet of Things Devices within Software Defined NetworksPeter Bull, Ron Austin, Mak Sharma. 124-130 [doi]
- A Novel Multicasting Innovation with Optical Burst SwitchingPinar Kirci, A. Halim Zaim. 131-134 [doi]
- E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the CloudMuhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo. 135-144 [doi]
- A Defense-Centric Model for Multi-step Attack Damage Cost EvaluationAlireza Shameli Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet. 145-149 [doi]
- Information Security Theory for the Future InternetAnatoly Malyuk, Natalia G. Miloslavskaya. 150-157 [doi]
- Access Control Mechanism Based on Entity Authentication with IPv6 Header "Flow Label" FieldD. A. Melnikov, Y. N. Lavrukhin, A. P. Durakovsky, V. S. Gorbatov, V. R. Petrov. 158-164 [doi]
- Measuring the Ranking Capability of SWA SystemOrabi Shurrab, Irfan Awan. 165-172 [doi]
- Automatic Transformation of Cloud Computing Service Composition to Verifiable ModelsAna Vazquez, Mohamed El-Menshawy, Jamal Bentahar. 173-180 [doi]
- Misbehavior Detection Framework for Community-Based Cloud ComputingOmar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad. 181-188 [doi]
- SDDC: A Software Defined Datacenter Experimental FrameworkAla Darabseh, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelifa, Mladen A. Vouk, Andy Rindos. 189-194 [doi]
- Analysis of Cloud Test Beds Using OpenSource SolutionsBashir Mohammed, Mariam Kiran. 195-203 [doi]
- Stack4Things: An OpenStack-Based Framework for IoTFrancesco Longo, Dario Bruneo, Salvatore Distefano, Giovanni Merlino, Antonio Puliafito. 204-211 [doi]
- Secure Multipath Routing Algorithm for Device-to-Device Communications for Public Safety over LTE Heterogeneous NetworksChafika Tata, Michel Kadoch. 212-217 [doi]
- Impact of Directional Antennas on Link Probability and Connectivity in Wireless Ad-Hoc NetworksGabriel Astudillo, Michel Kadoch. 218-224 [doi]
- Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud NetworksJacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atéchian. 225-230 [doi]
- A Cost-Effective and QoS-Aware Approach to Scheduling Real-Time Workflow Applications in PaaS and SaaS CloudsGeorgios L. Stavrinides, Helen D. Karatza. 231-239 [doi]
- Performance Evaluation for Process Refinement Stage of SWA SystemOrabi Shurrab, Irfan Awan. 240-247 [doi]
- cCluster: A Core Clustering Mechanism for Workload-Aware Virtual Machine SchedulingMostafa Dehsangi, Esmail Asyabi, Mohsen Sharifi, Seyed Vahid Azhari. 248-255 [doi]
- Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise NetworkRashid Munir, Muhammad Rafiq Mufti, Irfan Awan, Yim-Fun Hu, Jules Pagna Disso. 256-263 [doi]
- Aggregated Sensor Payload Submission Model for Token-Based Access Control in the Web of ThingsMohammed Amir, Prashant Pillai, Yim-Fun Hu. 264-271 [doi]
- Using Agent-Based VM Placement PolicyAshraf Al-Ou'n, Mariam Kiran, Demetres D. Kouvatsos. 272-281 [doi]
- iTREE: Intelligent Traffic and Resource Elastic Energy Scheme for Cloud-RANTshiamo Sigwele, Prashant Pillai, Yim-Fun Hu. 282-288 [doi]
- Mathematical Modeling of Association Attempt with the Base Station for Maximum Number of Customer Premise Equipments in the IEEE 802.22 NetworkHumaira Afzal, Irfan Awan, Muhammad Rafiq Mufti. 289-292 [doi]
- IoT Meets Exhibition Areas: A Modular Architecture to Improve Proximity InteractionsFulvio Corno, Luigi De Russis, Teodoro Montanaro, Pino Castrogiovanni. 293-300 [doi]
- Autonomous and Self Controlling Smart Objects for the Future InternetMarco E. Perez Hernandez, Stephan Reiff-Marganiec. 301-308 [doi]
- ALMANAC: Internet of Things for Smart CitiesDario Bonino, Maria Teresa Delgado Alizo, Alexandre Alapetite, Thomas Gilbert, Mathias Axling, Helene Udsen, Jose Angel Carvajal Soto, Maurizio Spirito. 309-316 [doi]
- Electricity-Metering in a Connected World: Virtual Sensors for Estimating the Electricity Consumption of IoT AppliancesFrank Englert, Patrick Lieser, Alaa Alhamoud, Doreen Böhnstedt, Ralf Steinmetz. 317-324 [doi]
- The Advantages of IoT and Cloud Applied to Smart CitiesCiro Formisano, Daniele Pavia, Levent Gürgen, Takuro Yonezawa, José Antonio Galache, Keiko Doguchi, Isabel Matranga. 325-332 [doi]
- Energy Consumption and Latency in BLE Devices under Mutual Interference: An Experimental StudyJan Jaap Treurniet, Chayan Sarkar, R. Venkatesha Prasad, Willem de Boer. 333-340 [doi]
- A Virtual Cluster Head Election Scheme for Energy-Efficient Routing in Wireless Sensor NetworksMing-Yu Tsai, Yaw-Chung Chen. 341-348 [doi]
- Energy-Aware Offloading Technique for Mobile Cloud ComputingMaram Akram, Amal Elhahas. 349-356 [doi]
- Video Encoding and Streaming Mechanisms in IoT Low Power NetworksE. G. Pereira, R. Pereira. 357-362 [doi]
- Leveraging Low-Power Devices for Cloud Services in Community NetworksNuno Apolónia, Roshan Sedar, Felix Freitag, Leandro Navarro. 363-370 [doi]
- Extensible Disease Diagnosis Cloud Platform with Medical Sensors and IoT DevicesHyun Jung La, Han Ter Jung, Soo Dong Kim. 371-378 [doi]
- Containers and Clusters for Edge Cloud Architectures - A Technology ReviewClaus Pahl, Brian Lee. 379-386 [doi]
- Success Factors for the Implementation of a Private Government Cloud in Saudi ArabiaAmal Alkhlewi, Robert John Walters, Gary B. Wills. 387-390 [doi]
- The Future of Cloud Computing: A SWOT Analysis and Predictions of DevelopmentDaniel Penzel, Natalia Kryvinska, Christine Strauss, Michal Gregus. 391-397 [doi]
- Open Government Data as a Service (GoDaaS): Big Data Platform for Mobile App DevelopersSoheil Qanbari, Navid Rekabsaz, Schahram Dustdar. 398-403 [doi]
- Quality Assessment and Evolution of Open Data PortalsJürgen Umbrich, Sebastian Neumaier, Axel Polleres. 404-411 [doi]
- An Open and Big Data Platform for Cumulative Environmental Analysis and ManagementPaulo S. C. Alencar, Donald D. Cowan, Fred McGarry, R. Mark Palmer. 412-417 [doi]
- Challenges and Solutions in Big Data Management - An OverviewSravanthi Kanchi, Shubhrika Sandilya, Shashank Ramkrishna, Siddhesh Manjrekar, Akshata Vhadgar. 418-426 [doi]
- Lossy Compression of Dynamic, Weighted GraphsWilko Henecka, Matthew Roughan. 427-434 [doi]
- The Hitchhikers Guide to Sharing Graph DataMatthew Roughan, Simon Jonathan Tuke. 435-442 [doi]
- Structural Analyses of Malaysian Web and Host GraphsJason Yong-Jin Tee, Lay-Ki Soon, Choo-Yee Ting. 443-450 [doi]
- Scalable Property Aggregation for Linked Data Recommender SystemsLisa Wenige, Johannes Ruhland. 451-456 [doi]
- Unification of Graph Data Models for Heterogeneous Security Information Resources' IntegrationSergey A. Stupnikov, Natalia G. Miloslavskaya, Vladimir Budzko. 457-464 [doi]
- Location Inference of Social Media Posts at Hyper-Local ScaleBrian McClanahan, Swapna S. Gokhale. 465-472 [doi]
- Analysis of Structural Social Capital in Online Social NetworksHuda Alhazmi, Swapna S. Gokhale. 473-480 [doi]
- GeoBI and Big VGI for Crime Analysis and ReportFederico Herrera, Raquel Sosa, Tatiana Delgado. 481-488 [doi]
- Statistical Modeling and Visualizing Open Big Data Using a Terrorism Case StudyNarasimha Rao Vajjhala, Kenneth David Strang, Zhaohao Sun. 489-496 [doi]
- Redundancy in Linked Data Partitioning for Efficient Query EvaluationEleftherios Kalogeros, Manolis Gergatsoulis, Matthew Damigos. 497-504 [doi]
- Using Echo Sounder Technology for Detecting and Predicting Local Sea StateMehrdad Oveisi, Fred Popowich, Saida Harle, Maia Hoeberechts. 505-511 [doi]
- Improved Burst Based Real-Time Event Detection Using Adaptive Reference CorporaJürgen Nützel, Frank Zimmermann. 512-518 [doi]
- A Traffic Padding to Limit Packet Size Covert ChannelsAnna Epishkina, Konstantin Kogos. 519-525 [doi]
- A Lightweight Platform Implementation for Internet of ThingsYoung Ju Heo, Sung-Min Oh, Won Sang Chin, Ju-wook Jang. 526-531 [doi]
- Clouds and Interclouds in the Real Estate SectorAndreas Mladenow, Niina Maarit Novak, Christine Strauss, Michal Gregus. 532-537 [doi]
- Classification and Positioning of Cloud Definitions and Use Case Scenarios for Portability and InteroperabilityBeniamino Di Martino, Giuseppina Cretella, Antonio Esposito. 538-544 [doi]
- Evaluating the Quality of e-Learning Trend Used at AOU Based on Participants' SatisfactionBayan Abu Shawar. 545-552 [doi]
- Factors Affecting an Organisation's Decision to Adopt Cloud Services in Saudi ArabiaNouf Alkhater, Gary B. Wills, Robert John Walters. 553-557 [doi]
- BLEmesh: A Wireless Mesh Network Protocol for Bluetooth Low Energy DevicesHyun Soo Kim, Jungyub Lee, Ju-wook Jang. 558-563 [doi]
- Performance Optimization of a Data Center Using Virtualization Technology: A Case Study Utilizing DEMATEL MethodArun Nagarle Shivashankarappa, Sharath Basavanna, Dharmalingam Ramalingam. 564-572 [doi]
- The Cost-Efficient Awareness for Cloud MapReduceYuan-Chih Yu. 573-578 [doi]
- Analysis of Hypoexponential Computing Services for Big Data ProcessingSergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy. 579-584 [doi]
- A Machine Learning Approach for Big Data in Oil and Gas PipelinesAbduljalil Mohamed, Mohamed Salah Hamdi, Sofiène Tahar. 585-590 [doi]
- A Real-Time Big Data Architecture for Glasses Detection Using Computer Vision TechniquesAlberto Fernández Villán, Rubén Casado, Rubén Usamentiaga. 591-596 [doi]
- Mobile Edutainment System - National Palace Museum as an ExampleYao-Nan Lien. 597-601 [doi]
- Moisture Content Evaluation for Road Surfaces Monitoring by GPR Image and Data Processing on Mobile PlatformsFrancesco Benedetto, Antonio Tedeschi. 602-607 [doi]
- PV Panel Modeling: A Mobile Application for Modeling Photovoltaic Panels Using Datasheets InformationAntonio Tedeschi, Francesco Riganti Fulginei, Antonino Laudani. 608-613 [doi]
- Understanding DDoS Attacks from Mobile DevicesPaolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello. 614-619 [doi]
- Efficient Mobile Computation Using the CloudS. M. Azharul Karim, John J. Prevost. 620-626 [doi]
- Mobile-Based Archival and Retrieval of Missing Objects Using Image MatchingMohammed Ghazal, Fasila Haneefa, Samr Ali, Yasmina Alkhalil, Eman Rashed. 627-632 [doi]
- Mobile Porting and Multi-platform Runtime Performance Comparisons of Offline and Online BSS AlgorithmsMarvin Chibuzo Offiah, Markus Borschbach. 633-638 [doi]
- Energy Consumption of Networked Embedded SystemsNadir Cherifi, Gilles Grimaud, Thomas Vantroys, Alexandre Boe. 639-644 [doi]
- Using Green KPIs for Large IT Infrastructures' Energy and Cost OptimizationBoban Celebic, Ruth Breu. 645-650 [doi]
- Energy-Aware DPSO Algorithm for Workflow Scheduling on Computational GridsKarima Oukfif, Lyes Bouali, Samia Bouzefrane, Fatima Boumghar. 651-656 [doi]
- Characterizing Servers Workload in Cloud DatacentersFrejus Gbaguidi, Selma Boumerdassi, Éric Renault, Eugène C. Ezin. 657-661 [doi]
- Performance Analysis of OpenAirInterface System EmulationAntonio Virdis, Niccolo Iardella, Giovanni Stea, Dario Sabella. 662-669 [doi]
- Power Optimization of Large Scale Mobile Cloud Computing SystemsMahmoud Al-Ayyoub, Yaser Jararweh, Lo'ai Ali Tawalbeh, Elhadj Benkhelifa, Anas Basalamah. 670-674 [doi]
- New Centrality Measure in Social Networks Based on Independent Cascade (IC) ModelIbrahima Gaye, Gervais Mendy, Samuel Ouya, Diaraf Seck. 675-680 [doi]
- Improved Burst Based Real-Time Event Detection Using Location Dependent CorporaJürgen Nützel, Frank Zimmermann. 681-686 [doi]
- Different Models to Visualise Geolocated City Data from Social NetworksTaras Agryzkov, Francisco Alvarez, Leticia Serrano-Estrada, Leandro Tortosa, José-Francisco Vicent. 687-692 [doi]
- Social Opinion Mining: An Approach for Italian LanguageVito Santarcangelo, Giuseppe Oddo, Maria Pilato, Fabrizio Valenti, Claudio Fornaro. 693-697 [doi]
- Graph Summarization for Hashtag RecommendationMohammed Al-Dhelaan, Hadel Alhawasi. 698-702 [doi]
- Using a Rich Context Model for People-to-People RecommendationAlisa Sotsenko, Marc Jansen, Marcelo Milrad. 703-708 [doi]
- RUM Extractor: A Facebook Extractor for Data AnalysisRehab M. Duwairi, Mosab Alfaqeeh. 709-713 [doi]
- Visualizing Social Network Data: A Comparative Study of Asian-American Student ConferencesRoberto Palmieri, Carlo Giglio. 714-721 [doi]
- Reliability of the Closed-Chain-Fan Social NetworkHajar Sahbani, Mohamed El Marraki. 722-725 [doi]
- Human Annotated Arabic Dataset of Book Reviews for Aspect Based Sentiment AnalysisMohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, Muhannad Quwaider. 726-730 [doi]
- Negation-Aware Framework for Sentiment Analysis in Arabic ReviewsRehab M. Duwairi, Mohammad A. Alshboul. 731-735 [doi]
- Ontology-Based Approach for Temporal Semantic Modelling of Social NetworksSouâad Boudebza, Faiçal Azouaou, Omar Nouali. 736-741 [doi]
- Simulating Cheated Results Dissemination for Volunteer ComputingNils Kopal, Olga Kieselmann, Arno Wacker. 742-747 [doi]
- Statistically-Enhanced Fine-Grained Diagnosis of Packet LossesDaniele Midi, Antonio Tedeschi, Francesco Benedetto, Elisa Bertino. 748-753 [doi]
- SoftGap: A Multi Independent Levels of Security Cross-Domain SolutionAngelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker. 754-759 [doi]
- Novel Soft Decoding Algorithm of RLL Codes for Secure Physical-Layer Visible Light CommunicationsHe Wang, Sunghwan Kim. 760-764 [doi]
- Efficient Transmission of Reversible Data Hiding in Encryption Images by Using Reed-Solomon CodesTaesoo Kim, Sunghwan Kim. 765-769 [doi]
- Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh NetworkLlorenç Cerdà-Alabern, Axel Neumann, Leonardo Maccari. 770-775 [doi]
- Federation Tools: An Island Connectivity Experiment with Community-LabGerard Marin, Leandro Navarro, Bart Braem, Chris Blondia. 776-781 [doi]
- Multicast Performance Comparison of SMF and ODMRP Using the CONFINE TestbedJonathan Kirchhoff, Julia Niewiejska, Christoph Fuchs, Christoph Barz, Henning Rogge. 782-787 [doi]
- Comparing Community Networks to the Internet: An Empirical Study of BGP BehaviourBart Braem, Johan Bergs, Chris Blondia. 788-793 [doi]
- Tracking and Predicting End-to-End Quality in Wireless Community NetworksPere Millán, Carlos Molina, Emmanouil Dimogerontakis, Leandro Navarro, Roc Meseguer, Bart Braem, Chris Blondia. 794-799 [doi]
- Stream Processing in Community Network CloudsKen Danniswara, Hooman Peiro Sajjad, Ahmad Al-Shishtawy, Vladimir Vlassov. 800-805 [doi]
- Learn by Examples How to Link the Internet of Things and the Cloud Computing Paradigms: A Fully Working Proof of ConceptAntonio Marsico, Attilio Broglio, Massimo Vecchio, Federico Michele Facca. 806-810 [doi]
- Privacy Preservation in Ubiquitous NetworkSwarnali Hazra, S. K. Setua. 811-816 [doi]
- Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud ComputingT. Daisy Premila Bai, S. Albert Rabara. 817-822 [doi]
- Distributed Cloud Bursting Model Based on Peer-to-Peer OverlayAndrii Zhygmanovskyi, Norihiko Yoshida. 823-828 [doi]