Abstract is missing.
- Multilayer Virtualized Systems Analysis with Kernel TracingCedric Biancheri, Naser Ezzati Jivan, Michel R. Dagenais. 1-6 [doi]
- A Coordination-Based Brokerage Architecture for Multi-cloud Resource MarketsSarah Aldawood, Frank Fowley, Claus Pahl, Davide Taibi, Xiaodong Liu. 7-14 [doi]
- Legal and Regulative Aspects of IoT Cloud SystemsEszter E. Kalmar, Attila Kertész, Szilvia Varadi, Radhika Garg, Burkhard Stiller. 15-20 [doi]
- MobIoTSim: Towards a Mobile IoT Device SimulatorTamas Pflanzner, Attila Kertész, Bart Spinnewyn, Steven Latré. 21-27 [doi]
- Using Block Cipher for Confidentiality of Images in Cloud-Based SystemsRana Adnan Rihan, Khaled M. Khan. 28-33 [doi]
- Power Optimization of Large Scale Mobile Cloud System Using Cooperative CloudletsMuneera Al-Quraan, Mahmoud Al-Ayyoub, Yaser Jararweh, Lo'ai Tawalbeh, Elhadj Benkhelifa. 34-38 [doi]
- Mobile Health (m-Health) System in the Context of IoTSultan AlMotiri, Murtaza A. Khan, Mohammed A. Alghamdi. 39-42 [doi]
- Inter-domain Mobility Management Using SDN for Residential/Enterprise Real Time ServicesWalaa F. Elsadek, Mikhail N. Mikhail. 43-50 [doi]
- Evaluating NoSQL Document Oriented Data ModelHadi Hashem, Daniel Ranc. 51-56 [doi]
- Knowledge Management as a Service (KMaaS)Peter Balco, Martina Drahoová. 57-62 [doi]
- Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research ChallengesFisnik Dalipi, Sule Yildirim Yayilgan. 63-68 [doi]
- Cyber-Attack Modeling Analysis Techniques: An OverviewHamad Al-Mohannadi, Qublai Khan Ali Mirza, Anitta Patience Namanya, Irfan Awan, Andrea J. Cullen, Jules Pagna Disso. 69-76 [doi]
- A Survey on Network Security Monitoring SystemsIbrahim Ghafir, Vaclav Prenosil, Jakub Svoboda, Mohammad Hammoudeh. 77-82 [doi]
- State-Level Views on Professional Competencies in the Field of IoT and Cloud Information SecurityNatalia G. Miloslavskaya, Alexander I. Tolstoy. 83-90 [doi]
- Provable Secure Pairing-Free Certificate-Less Authenticated Key Agreement ProtocolAmr Farouk, Mohamed M. Fouad. 91-97 [doi]
- Dual-Backhaul Links in LTE - A Mobile Relay System for High-Speed RailwaysKhaled M. Addali, Abderrahmane BenMimoune, Fawaz Ali Khasawneh, Amamer M. Saied, Michel Kadoch. 98-102 [doi]
- Distributed Interference Alignment in Partially Connected Networks without Preliminary Topological KnowledgePeter Farkas, Matej Staron, Frank Schindler. 103-108 [doi]
- Virtual Machines' Load-Balancing in Inter-cloudsMohamed Riduan Abid, Karima Kaddouri, Kevin Smith, Moulay Idriss El Ouadghiri, Michael Gerndt. 109-116 [doi]
- A Container-Based Edge Cloud PaaS Architecture Based on Raspberry Pi ClustersClaus Pahl, Sven Helmer, Lorenzo Miori, Julian Sanin, Brian Lee. 117-124 [doi]
- An Autonomous Aquaponics System Using 6LoWPAN Based WSNN. Hari Kumar, Sandhya Baskaran, Sanjana Hariraj, Vaishali Krishnan. 125-132 [doi]
- Survey of Big Data Information SecurityNatalia G. Miloslavskaya, Aida Makhmudova. 133-138 [doi]
- Investigating Metrics to Build a Benchmark Tool for Complex Event Processing SystemsAndré Gradvohl. 143-147 [doi]
- Application of Big Data, Fast Data, and Data Lake Concepts to Information Security IssuesNatalia G. Miloslavskaya, Alexander I. Tolstoy. 148-153 [doi]
- Taxonomy for Unsecure Big Data Processing in Security Operations CentersNatalia G. Miloslavskaya, Alexander I. Tolstoy, Sergey Zapechnikov. 154-159 [doi]
- Forecasting the Natural Gas Price Trend - Evaluation of a Sentiment AnalysisTina Grundmann, Carsten Felden, Marco Pospiech. 160-164 [doi]
- Rule- and Cost-Based Optimization of OLAP Workloads on Distributed RDBMS with Column-Oriented Storage FunctionTakamitsu Shioi, Kenji Hatano. 165-170 [doi]
- Infrastructure-Aware Functional Testing of MapReduce ProgramsJesús Morán, Bibiano Rivas, Claudio de la Riva, Javier Tuya, Ismael Caballero, Manuel A. Serrano. 171-176 [doi]
- An Incremental Approach for Real-Time Big Data Visual AnalyticsIgnacio Garcia, Ruben Casado, Abdelhamid Bouchachia. 177-182 [doi]
- Generational Garbage Collection Algorithm Based on Lifespan PredictionRen Xin, Zhangxu Ying. 183-187 [doi]
- Spar(k)ql: SPARQL Evaluation Method on Spark GraphXGergo Gombos, Gábor Rácz, Attila Kiss 0001. 188-193 [doi]
- Data Modeling and Case-Based Reasoning for Social MonitoringHadi Hashem, Daniel Ranc. 194-199 [doi]
- Human Acceptance of Autonomous Social Media AgentB. H. Fatima, S. W. Jaffry, M. M. Mubasher, M. K. A. Sherwani, A. Haseeb. 200-205 [doi]
- Towards Automatic Persona Generation Using Social MediaJisun An, Hoyoun Cho, Haewoon Kwak, Mohammed Ziyaad Hassen, Bernard J. Jansen. 206-211 [doi]
- AffinityFinder: A System for Deriving Hidden Affinity Relationships on Twitter Utilizing Sentiment AnalysisAbdelmounaam Rezgui, Daniel Fahey, Ian Smith. 212-215 [doi]
- Correlation of Weather and Moods of the Italy Residents through an Analysis of Their TweetsGianfranco Modoni, Davide Tosi. 216-219 [doi]
- A Social Network Analysis of Tweets during the Gaza War, Summer 2014Wael Al Sarraj, Khalid M. Kahloot, Ashraf Y. Maghari, Mahmoud M. Abu-Ghosh. 220-227 [doi]
- Using a Rich Context Model for Real-Time Big Data Analytics in TwitterAlisa Sotsenko, Marc Jansen, Marcelo Milrad, Juwel Rana. 228-233 [doi]
- Social Networks Benchmark Dataset for Diseases ClassificationMuhannad Quwaider, Mosab Alfaqeeh. 234-239 [doi]
- Using Dynamic Parallelism to Speed Up Clustering-Based Community Detection in Social NetworksMohammed N. Alandoli, Mahmoud Al-Ayyoub, Mohammad Al-Smadi, Yaser Jararweh, Elhadj Benkhelifa. 240-245 [doi]
- Exploring Research Networks with Data Science: A Data-Driven Microservice Architecture for Synergy DetectionThomas Thiele, Thorsten Sommer, Sebastian Stiehm, Sabina Jeschke, Anja Richert. 246-251 [doi]
- Microblogging Hash Tag Recommendation System Based on Semantic TF-IDF: Twitter Use CaseMir Saman Tajbakhsh, Jamshid Bagherzadeh. 252-257 [doi]
- An Intelligent Model for Vulnerability Analysis of Social Media UserFirya Rashid Abubaker, Pinar Sarisaray Boluk. 258-263 [doi]
- The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS GraphsJukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen. 264-269 [doi]
- Malware Development on Mobile EnvironmentsGianluca Papaleo, Enrico Cambiaso, Luca Patti, Maurizio Aiello. 270-275 [doi]
- Application for the Detection of Dangerous Driving and an Associated Gamification FrameworkKeshav Bahadoor, Patrick Hosein. 276-281 [doi]
- Smart Mobile-Based Emergency Management and Notification SystemMohammed Ghazal, Samr Ali, Marah Al Halabi, Nada Ali, Yasmina Al Khalil. 282-287 [doi]
- Towards Secure Mobile Process Tracking Using Wearable Computing in mGovernment ApplicationsMohammed Ghazal, Yasmina Al Khalil, Fasila Haneefa, Assem Mhanna, Dana Awachi, Samr Ali. 288-294 [doi]
- A Mobile Cloud System for Different Useful ApplicationsLo'ai Ali Tawalbeh, Waseem Bakhader. 295-298 [doi]
- GPRS-Based Robotic Tracking System with Real Time Video StreamingTasneem M. Yousif, Aysha K. Alharam, Wael El-Medany, Abeer A. AlKhalaf, Zainab Fardan. 299-303 [doi]
- Joint Resource Allocation Optimization in OFDM Relay Networks with SWIETGaofei Huang. 304-309 [doi]
- A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data CentersMakhlouf Hadji, Nabila Djenane, Rachida Aoudjit, Samia Bouzefrane. 310-314 [doi]
- A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area SensorsMuhammad A. Iqbal, Magdy Bayoumi. 315-320 [doi]
- Particle Swarm Optimization Scheduling for Energy Saving in Cluster Computing Heterogeneous EnvironmentsEloi Gabaldon, Fernando Guirado, Josep Lluís Lérida, Jordi Planes. 321-325 [doi]
- Energy Efficiency in Mobile Cloud Computing ArchitecturesLe Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, Samia Bouzefrane. 326-331 [doi]
- An Investigation on the M2M/IoT Trajectory and Its Relationship with Formal StandardsDong-hyu Kim, Heejin Lee. 332-335 [doi]
- IoT Standardization - The Approach in the Field of Data Protection as a Model for Ensuring Compliance of IoT Applications?Kees Stuurman, Irene Kamara. 336-341 [doi]
- Standardisation of E-Merging IoT Applications: Past, Present, and a Glimpse into the FutureKai Jakobs. 342-347 [doi]
- Humans Are Back in the Loop! Would Production Process Related Ethics Support the Design, Operating, and Standardization of Safe, Secure, and Efficient Human-Machine Collaboration?Hartwig U. Steusloff. 348-350 [doi]
- On the Performance of Tabu Search Algorithm for the Vehicle Routing Problem with Time WindowsPinar Kirci. 351-354 [doi]
- Authentication and Key Management in an LTE-Based Unmanned Aerial System Control and Non-payload Communication NetworkGicheol Wang, Byoung-Sun Lee, Jae Young Ahn. 355-360 [doi]
- Optimised QoS-Aware DBA Mechanisms in XG-PON for Upstream Traffic in LTE BackhaulJerome A. Arokkiam, Kenneth N. Brown, Cormac J. Sreenan. 361-368 [doi]
- Sizing Network Buffers: An HTTP Adaptive Streaming PerspectiveDarijo Raca, Ahmed H. Zahran, Cormac J. Sreenan. 369-376 [doi]