Abstract is missing.
- The Need to Comprehend Clouds: Why We Still Can't Use Clouds ProperlyDaniel Rubio Bonilla, Lutz Schubert, Stefan Wesner. 1-11 [doi]
- Assessing the Readiness to Move into the CloudLeire Orue-Echevarria, Juncal Alonso, Marisa Escalante, Stefan Schuster. 12-20 [doi]
- Design and Implementation of a Multi-objective Optimization Mechanism for Virtual Machine Placement in Cloud Computing Data CenterSoichi Shigeta, Hiroyuki Yamashima, Tsunehisa Doi, Tsutomu Kawai, Keisuke Fukui. 21-31 [doi]
- Agent Based Application Tools for Cloud Provisioning and ManagementLuca Tasquier, Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino. 32-42 [doi]
- Performance Evaluation of Embedded Processor in MapReduce Cloud Computing ApplicationsChristoforos Kachris, Georgios Ch. Sirakoulis, Dimitrios Soudris. 43-51 [doi]
- Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service PlatformsJumpei Okoshi, Koji Hasebe, Kazuhiko Kato. 52-61 [doi]
- A Digital Infrastructure for Green Utility Computing: The Preliminary Holistic Research AgendaElena Irina Neaga. 62-71 [doi]
- Energy-Aware Multi-Agent Server Consolidation in Federated CloudsAlessandro Ferreira Leite, Alba Cristina Magalhaes Alves de Melo. 72-81 [doi]
- Specifying Cloud Application Requirements: An Ontological ApproachYih Leong Sun, Terence J. Harmer, Alan Stewart. 82-91 [doi]
- A Conceptual Framework for Simulating Autonomic Cloud MarketsSimon Caton, Ivan Breskovic, Ivona Brandic. 92-102 [doi]
- Opinion Model Based Security Reputation Enabling Cloud Broker ArchitecturePramod S. Pawar, Srijith K. Nair, Fadi El-Moussa, Theo Dimitrakos, Muttukrishnan Rajarajan, Andrea Zisman. 103-113 [doi]
- Cloud Security and Privacy in the Light of the 2012 EU Data Protection RegulationAndreas Kronabeter, Stefan Fenz. 114-123 [doi]
- Biometric Identity Trust: Toward Secure Biometric Enrollment in Web EnvironmentsFlorian Obergrusberger, Baris Baloglu, Johannes Sänger, Christian Senk. 124-133 [doi]
- Future of Cloud-Based Services for Multi-factor Authentication: Results of a Delphi StudyChristian Senk. 134-144 [doi]