Abstract is missing.
- Multi-Level Elastic Deployment of Containerized Applications in Geo-Distributed EnvironmentsMatteo Nardelli 0001, Valeria Cardellini, Emiliano Casalicchio. 1-8 [doi]
- Implementation of a Fault Aware Cloud Service Provisioning FrameworkGiuseppe Di Modica, Orazio Tomarchio, Domenico Calcaterra, Vincenzo Cartelli. 9-16 [doi]
- Economic Considerations for Integrating Massively Parallel Heterogeneous Devices into the CloudJason Sawin, Joseph M. Myre, H. Drew Wilken. 17-24 [doi]
- TE-Based Machine Learning Techniques for Link Fault Localization in Complex NetworksSrinikethan Madapuzi Srinivasan, Tram Truong Huu, Mohan Gurusamy. 25-32 [doi]
- Energy-Aware Scheduling of Real-Time Workflow Applications in Clouds Utilizing DVFS and Approximate ComputationsGeorgios L. Stavrinides, Helen D. Karatza. 33-40 [doi]
- Effectiveness of Content Spatial Distribution Analysis in Securing IoT EnvironmentsFabrizio Angiulli, Luciano Argento, Angelo Furfaro. 41-46 [doi]
- Realizing Prioritized Scheduling Service in the Hadoop SystemTsozen Yeh, Hsinyi Huang. 47-54 [doi]
- An Agent Based Model for Health Surveillance Systems and Early Biological Threat DetectionMohammad Al-Zinati, Qutaibah Althebyan, Yaser Jararweh. 55-62 [doi]
- ReMot Reputation and Resource-Based Model to Estimate the Reliability of the Host Machines in Volunteer Cloud EnvironmentYousef Alsenani, Garth V. Crosby, Tomas Velasco, Abdulrahman Alahmadi. 63-70 [doi]
- A New SLA-Aware Load Balancing Method in the Cloud Using an Improved Parallel Task Scheduling AlgorithmMehran Ashouraei, Seyed Nima Khezr, Rachid Benlamri, Nima Jafari Navimipour. 71-76 [doi]
- Multi-Objective Self-Adaptive Composite SaaS Using Feature ModelAfaf Mousa, Jamal Bentahar, Omar Alam. 77-84 [doi]
- Efficient Cloud Auto-Scaling with SLA Objective Using Q-LearningShay Horovitz, Yair Arian. 85-92 [doi]
- A Policy Based Application Deployment Method in Hybrid Cloud EnvironmentHao Wei, Joaquin Salvachua Rodriguez. 93-99 [doi]
- Ensuring Compliance of IoT Devices with Their Privacy Policy AgreementAlanoud Subahi, George Theodorakopoulos. 100-107 [doi]
- A Sequence-Based Access Control Framework for Reliable Security Management in CloudsFaraz Fatemi Moghaddam, Tayyebe Emadinia, Philipp Wieder, Ramin Yahyapour. 108-113 [doi]
- Secure Routing for MANET Connected Internet of Things SystemsJonny Karlsson, Laurence S. Dooley, Göran Pulkkis. 114-119 [doi]
- Ensuring IoT Security with an Architecture Based on a Separation KernelMahieddine Yaker, Chrystel Gaber, Gilles Grimaud, Jean-Philippe Wary, Julien Cartigny, Xiao Han, Vicente Sanchez-Leighton. 120-127 [doi]
- Integrating Behavioural Security Factors for Enhanced Protection of Organisational Information Technology AssetsAristotle Onumo, Andrea J. Cullen, Irfan Awan. 128-135 [doi]
- An Explication of Acceptability of Wearable Devices in Context of Bangladesh: A User StudyArnab Debnath, Khadija Tul Kobra, Proteeti Prova Rawshan, Manisha Paramita, Muhammad Nazrul Islam. 136-140 [doi]
- Design and Realization of Alzheimer's Artificial Intelligence Technologies (AAIT) SystemAnna Zhang, Ker-Jiun Wang, Zhi-Hong Mao. 141-148 [doi]
- IoT for Smart Buildings - Long Awaited Revolution or Lean EvolutionMarcin Bajer. 149-154 [doi]
- Internet of Things (IoT) Applied to an Urban GardenGabriela Carrion, Monica Huerta, Boris Barzallo. 155-161 [doi]
- Performance Evaluation of IEEE 802.15.6 Channel Access Procedure in WBANNeji Kouka, Tarek Guesmi, Ouajdi Korbaa. 162-168 [doi]
- A Self-Organized Framework for Insurance Based on Internet of Things and BlockchainMonireh Vahdati, Kamran Gholizadeh HamlAbadi, Ali Mohammad Saghiri, Hassan Rashidi. 169-175 [doi]
- IoT Device Lifecycle - A Generic Model and a Use Case for Cellular Mobile NetworksGabor Soos, Dániel Kozma, Ferenc Nandor Janky, Pál Varga. 176-183 [doi]
- Complex Event Recognition Notification Methodology for Uncertain IoT Systems Based on Micro-Service ArchitectureMira Vrbaski, Miodrag Bolic, Shikharesh Majumdar. 184-191 [doi]
- A Smart Winter Service Platform and Route Planning AlgorithmPerin Ünal, Yunuscan Kocak, Yunus Donmez. 192-196 [doi]
- Retransmission Policies for Efficient Communication in IoT ApplicationsImtiaz Ali Halepoto, Umair Ali Khan, Adnan Ahmed Arain. 197-202 [doi]
- Future of IoTSP - IT and OT IntegrationDaniel Lewandowski, Diego Pareschi, Waldemar Pakos, Enrico Ragaini. 203-207 [doi]
- An Evaluation of Optimisation Approaches in Cloud of Things Resource TradingAhmed Salim Al Rawahi, Kevin Lee, Jon Robinson, Ahmad Lotfi. 208-215 [doi]
- PrIoT: Prototyping the Internet of ThingsNahit Pawar, Thomas Bourgeau, Hakima Chaouchi. 216-223 [doi]
- Analyzing Customer Journey with Process Mining: From Discovery to RecommendationsAlessandro Terragni, Marwan Hassani. 224-229 [doi]
- Efficient Point-Based Pattern Search in 3D Motion Capture DatabasesChristian Beecks, Alexander Grass. 230-235 [doi]
- Efficient Data Prediction, Reconstruction and Estimation in Indoor IoT NetworksJyotirmoy Karjee, Hemant Kumar Rath, Arpan Pal. 236-243 [doi]
- Smartphones as Alternative Cloud Computing Engines: Benefits and Trade-offsBrennan Schaffner, Jason Sawin, Joseph M. Myre. 244-250 [doi]
- Analysis and Comparison of Live Virtual Machine Migration MethodsMohammad A. Altahat, Anjali Agarwal, Nishith Goel, Marzia Zaman. 251-258 [doi]
- Linear and Logistic Regression Based Monitoring for Resource Management in Cloud NetworksMustafa Daraghmeh, Suhib Bani Melhem, Anjali Agarwal, Nishith Goel, Marzia Zaman. 259-266 [doi]
- UAV-Assisted Cluster Head Election for a UAV-Based Wireless Sensor NetworkGicheol Wang, Byoung-Sun Lee, Jae Young Ahn. 267-274 [doi]
- An Enhanced Control Overhead Messages Reduction Algorithm in VANETAhmad Abuashour, Michel Kadoch. 275-281 [doi]
- Evaluation of New Dynamic Time Division Multiplexing Protocol for Real-Time Traffic over Converged NetworksDalia El-Banna, Peter Bull, Yonghao Wang. 282-287 [doi]
- A Framework for User Routine Discovery in Smart HomesPrakhar Shukla, Parnab Kumar Chanda, Ramnath Jayachandran, Ashok Subash. 288-295 [doi]
- HMM-Based Indoor Localization Using Smart Watches' BLE SignalsDonghee Han, Hyungtay Rho, Sejoon Lim. 296-302 [doi]
- Creating Smart Environments: Analysis of Improving Security on Smart HomesIvan Del Pozo, Denise Cangrejo. 303-310 [doi]
- IoT Software Infrastructure for Remote Monitoring of Patients with Chronic Metabolic DisordersEdoardo Patti, Maria Donatelli, Enrico Macii, Andrea Acquaviva. 311-317 [doi]
- A Distributed Sensor Network for Monitoring Noise Level and Noise Sources in Urban EnvironmentsJakob Abeßer, Marco Götze, Stephanie Kühnlenz, Robert Gräfe, Christian Kühn, Tobias Clauß, Hanna M. Lukashevich. 318-324 [doi]
- Panoptic, Privacy over Edge-CloudsTadeu Freitas, João Rodrigues 0003, Diogo Bogas, Miguel Coimbra, Rolando Martins. 325-332 [doi]
- PASHE: Privacy Aware Scheduling in a Heterogeneous Fog EnvironmentKaneez Fizza, Nitin Auluck, Omer Rana, Luiz F. Bittencourt. 333-340 [doi]
- Challenges Facing the Industrial Implementation of Fog ComputingImen Bouzarkouna, M'Hammed Sahnoun, Nouha Sghaier, David Baudry, Christian Gout. 341-348 [doi]
- On the Application of Social Internet of Things with Fog Computing: A New Paradigm for Traffic Information Sharing SystemVan Loc Tran, Anik Islam, Jeevan Kharel, Soo Young Shin. 349-354 [doi]
- Vertical Workflows: Service Orchestration across Cloud & Edge ResourcesOmer Rana, Manjerhussain Shaikh, Muhammad Ali, Ashiq Anjum, Luiz F. Bittencourt. 355-362 [doi]
- A Rank Scheduling Mechanism for Fog EnvironmentsDavid Perez Abreu, Karima Velasquez, Marcio Roberto Miranda Assis, Luiz Fernando Bittencourt, Marília Curado, Edmundo Monteiro, Edmundo Roberto Mauro Madeira. 363-369 [doi]
- An Intelligent Edge Computing Based Semantic Gateway for Healthcare Systems Interoperability and CollaborationTshiamo Sigwele, Yim-Fun Hu, Muhammad Ali, Jiacheng Hou, Misfa Susanto, Helmy Fitriawan. 370-376 [doi]
- On the Influence of Fog Colonies Partitioning in Fog Application MakespanCarlos Guerrero, Isaac Lera, Carlos Juiz. 377-384 [doi]
- Virtualizing the Edge: Needs, Opportunities and TrendsEva Marín-Tordera, Xavier Masip-Bruin, Beatriz Otero, Eva Rodriguez. 385-392 [doi]
- Modelling Cloud Federation: A Fair Profit Distribution Strategy Using the Shapley ValueKun Ma, Antoine B. Bagula, Hope Mauwa, Antonio Celesti. 393-398 [doi]
- Sensing as a Service Middleware ArchitectureMuhamed Alarbi, Hanan Lutfiyya. 399-406 [doi]
- A NoSQL Graph Approach to Manage IoTaaS in Cloud/Edge EnvironmentsAntonio Celesti, Alina Buzachis, Antonino Galletta, Maria Fazio, Massimo Villari. 407-412 [doi]
- Knee/Elbow Point Estimation through ThresholdingMário Antunes 0001, Joana Ribeiro, Diogo Gomes 0001, Rui L. Aguiar. 413-419 [doi]
- The World of Malware: An OverviewAnitta Patience Namanya, Andrea J. Cullen, Irfan-Ullah Awan, Jules Pagna Disso. 420-427 [doi]
- Resource Scalability as Preventive and Remedial Measures for Cloud Service ViolationGaik-Yee Chan, Hassan Mahmood Khan, Fang-Fang Chua. 428-435 [doi]
- An Approach to Detecting Distributed Denial of Service Attacks in Software Defined NetworksAbimbola Sangodoyin, Babagana Modu, Irfan Awan, Jules Pagna Disso. 436-443 [doi]
- Using Sparse Matrices to Prevent Information Leakage in Cloud ComputingKhaled Khan, Mahboob Shaheen, Yongge Wang. 444-447 [doi]