Abstract is missing.
- Cost-Effective Utilization of Complementary Cloud Resources for the Scheduling of Real-Time Workflow Applications in a Fog EnvironmentGeorgios L. Stavrinides, Helen D. Karatza. 1-8 [doi]
- A Real-Time Task Offloading Strategy Based on Double Auction for Optimal Resource Allocation in Edge ComputingZhipeng Gao, Congcong Yao, Kaile Xiao, Zijia Mo, Qian Wang 0015, Yang Yang 0006. 9-16 [doi]
- From the Edge to the Cloud: Enabling Reliable IoT ApplicationsCristian Martín 0002, Daniel Garrido, Manuel Díaz, Bartolomé Rubio. 17-22 [doi]
- Multi-tier Edge-to-Cloud Architecture for Adaptive Video DeliveryRoger Immich, Leandro Villas, Luiz F. Bittencourt, Edmundo R. M. Madeira. 23-30 [doi]
- Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC)Mohammed Alshahrani, Issa Traoré, Isaac Woungang. 31-41 [doi]
- Secure and Efficient Cluster Head Election in a UAV-Aided Wireless Sensor NetworkSoojeon Lee, Byoung-Sun Lee, Jae Young Ahn. 42-49 [doi]
- An Updateable Token-Based Schema for Authentication and Access Management in CloudsTayyebe Emadinia, Faraz Fatemi Moghaddam, Philipp Wieder, Shirin Dabbaghi Varnosfaderani, Ramin Yahyapour. 50-56 [doi]
- Ransomware Prediction Using Supervised Learning AlgorithmsUmaru Adamu, Irfan Awan. 57-63 [doi]
- Towards a Formal Approach Based on Bigraphs for Fog Security: Case of Oil and Gas Refinery PlantAyoub Bouheroum, Zakaria Benzadri, Faiza Belala. 64-71 [doi]
- Enabling Multi-Tenants Isolation for Software-Defined Cloud Networks via XMPP and BGP: Implementation and EvaluationYue Li, Tomasz Osinski, Abdulhalim Dandoush. 72-79 [doi]
- A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined NetworkAbimbola Sangodoyin, Bashir Mohammed, Sibusiso Moyo, Irfan Awan, Jules Pagna Disso. 80-87 [doi]
- Self-Healing Anonymous Routing in Unstable Sensor NetworksNikita Baranov, Mikhail Bashkin, Vladimir Bashkin. 88-95 [doi]
- Vehicular Sinks Over Wide Area Wireless Sensor Networks for Telemetry Applications in LogisticsNicola Zingirian, Mattia Dalla Via. 96-101 [doi]
- Defining the Communication Architecture for Data Aggregation in Wireless Sensor Networks: Application to Communicating Concrete DesignHang Wan, Michael David, William Derigent. 102-108 [doi]
- Multi-layer Approach to Internet of Things (IoT) SecurityYusuf Muhammad Tukur, Dhavalkumar Thakker, Irfan-Ullah Awan. 109-116 [doi]
- Privacy-Aware Cloud Ecosystems and GDPR ComplianceMasoud Barati, Omer Rana, George Theodorakopoulos, Peter Burnap. 117-124 [doi]
- Securing Marine Data Networks in an IoT EnvironmentMohammed Al-Khalidi, Rabab Al-Zaidi, John Woods, Martin J. Reed, Ella Pereira. 125-132 [doi]
- Infrastructureless IoT-as-a-Service for Public Safety and Disaster ResponseAlina Buzachis, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari. 133-140 [doi]
- Cooperative-Intelligent Transport Systems for Vulnerable Road Users SafetyJordi Casademont, Anna Calveras, David Quiñones, Mònica Navarro, Javier Arribas, Miguel Catalan-Cid. 141-146 [doi]
- Bazaar-Contract: A Smart Contract for Binding Multi-Round Bilateral Negotiations on Cloud MarketsBenedikt Pittl, Stefan Starflinger, Werner Mach, Erich Schikuta. 147-154 [doi]
- Equity Crowdfunding in Real EstateAndreas Mladenow, Regina Cernicka, Christine Strauss, Valerie Busse, Michal Gregus. 155-161 [doi]
- Adaptive Trading of Cloud of Things ResourcesAhmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi. 162-168 [doi]
- A Model for Successful Adoption of Cloud-Based Services in Indian SMEsNitirajsingh Sandu, Ergun Gide. 169-174 [doi]
- On the Cost of the Management of user Applications in a Multicloud EnvironmentGiuseppe Di Modica, Antonella Di Stefano, Giovanni Morana, Orazio Tomarchio. 175-181 [doi]
- Distributed Network Behaviour Prediction Using Machine Learning and Agent-Based Micro SimulationOmololu Makinde, Abimbola Sangodoyin, Bashir Mohammed, Daniel Neagu, Umaru Adamu. 182-188 [doi]
- Deep Smart Scheduling: A Deep Learning Approach for Automated Big Data Scheduling Over the CloudGaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Ahmed Saleh Bataineh. 189-196 [doi]
- SD: A Divergence-Based Estimation Method for Service Demands in Cloud SystemsSalvatore Dipietro, Giuliano Casale. 197-204 [doi]
- DLA: Detecting and Localizing Anomalies in Containerized Microservice Architectures Using Markov ModelsAreeg Samir, Claus Pahl. 205-213 [doi]
- MAS5G: Move Around Smartly in 5GSatish Kumar, Rahul Banerji, Naman Gupta, Suman Kumar, Sukhdeep Singh, Avinash Bhat, Seungil Yoon, Shatarupa Dash. 214-221 [doi]
- A Change Detection Approach for Processing Outdoor Scenes on Hadoop ClustersEihab SaatiAlsoruji. 222-229 [doi]
- Towards a Smart Home for Elder HealthcareNoureddine Staifi, Said Brahimi, Ramdane Maamri, Meriem Belguidoum. 230-237 [doi]
- IoT and Microservice Architecture for Multimobility in a Smart CityCristian Lai, Francesco Boi, Alberto buschettu, Renato Caboni. 238-242 [doi]
- Reference Architectures and Standards for the Internet of Things and Big Data in Smart ManufacturingPerin Ünal. 243-250 [doi]
- Directional Graph-Based Energy Model for IoT Wireless Relay SystemsGabriel Astudillo, Michel Kadoch, Bessam Abdulrazak. 251-258 [doi]
- LEPaNTU: Long Polling Based Energy Efficient Passive NAT Traversal through UDPSunanda Bose, Akash Chowdhury, Nandini Mukherjee. 259-264 [doi]
- Energy Consumption Monitoring and Alert System via IoTZainal Hisham Che Soh, Irni Hamiza Hamzah, Syahrul Afzal Che Abdullah, Mohd Affandi Shafie, Siti Noraini Sulaiman, Kamarulazhar Daud. 265-269 [doi]
- Systems that Sustain Themselves: Energy Harvesting Sensor Nodes for Monitoring the EnvironmentKaumudi Singh, Nithesh Nayak K, Anup A. Kedilaya, Tamma V. Prabhakar, Joy Kuri. 270-277 [doi]
- Utilizing 5G in Industrial Robotic ApplicationsMarkus Aleksy, Fan Dai, Nima Enayati, Peter Rost, Guillermo Pocovi. 278-284 [doi]
- Building Advanced Metering Infrastructure using Elasticsearch Database and IEC 62056-21 ProtocolMarcin Bajer. 285-290 [doi]
- IoTSP: Thread Mesh vs Other Widely used Wireless Protocols - Comparison and use Cases StudyWojciech Rzepecki, Piotr Ryba. 291-295 [doi]
- Inteligent IoTSP - Implementation of Embedded ML AI Tensorflow Algorithms on the NVIDIA Jetson Tx ChipPiotr Lipnicki, Daniel Lewandowski, Michal Syfert, Anna Sztyber, Pawel Wnuk. 296-302 [doi]
- Intelligent Device Disambiguation for Smart Home ControlSiddharth Chaudhary, Shalabh Singh, Vijaya Kumar Tukka, Vinisha Parwal, Siddhartha Sinha. 303-307 [doi]
- High Quality Video Traffic Ateb-Forecasting and Fuzzy Logic ManagementIvanna Dronyuk, Olga Fedevych, Natalia Kryvinska. 308-311 [doi]
- In-Video Game Player's Behavior Measurement using Big Five Personal TraitsMuhannad Quwaider, Abdullah Alabed, Rehab Duwairi. 312-317 [doi]
- SCoTv2: Large Scale Data Acquisition, Processing, and Visualization PlatformAna Rita Santiago, Mário Antunes 0001, João Paulo Barraca, Diogo Gomes 0001, Rui L. Aguiar. 318-323 [doi]
- The Audio-Visual Arabic Dataset for Natural EmotionsFtoon Abu Shaqra, Rehab Duwairi, Mahmoud Al-Ayyoub. 324-329 [doi]
- Indoor Mapping and Positioning using Augmented RealityIbrahim Alper Koc, Tacha Serif, Sezer Gören, George Ghinea. 335-342 [doi]
- Ontology-Based Knowledge Modeling for Rice Crop ProductionHifza Afzal, Mumraiz Khan Kasi. 343-350 [doi]
- A Survey of Mobile Health Applications in Context of Internet of ThingsMuneer Bani Yassein, Lujain Al-smadi, Lina Mrayan. 351-357 [doi]
- Wake-Up Radio Systems for Cooperative-Intelligent Transport Systems ArchitectureJordi Casademont, Elena López-Aguilera, Josep Paradells. 358-363 [doi]
- RoboMapper: An Automated Signal Mapping Robot for RSSI FingerprintingTacha Serif, Osman Kerem Perente, Yusuf Dalan. 364-370 [doi]
- AL and S Methods: Two Extensions for L-MethodMário Antunes 0001, Henrique Aguiar, Diogo Gomes 0001. 371-376 [doi]
- Detection of Network Congestion and Denial of Service (DoS) Attacks in Cognitive Radio NetworksEjike Chuku, Demetres Kouvatsos. 377-384 [doi]
- Fuzzy Based Packet Scheduling Scheme using Non-Real Time Traffic in IP/MPLS NetworksOba Zubair Mustapha, Mohammed Ali, Yim-Fun Hu, Raed A. Abd-Alhameed. 385-392 [doi]
- Packet Routing Based on Integral Normalized CriterionMichal Gregus, Oleh Liskevych, Kvitoslava Obelovska, Roman Panchyshyn. 393-396 [doi]
- Intelligent Solutions for Secure Communication and Collaboration Based on Cloud TechnologiesPeter Balco, Martina Drahosová, Juraj Zelenay, Michal Gregus. 397-403 [doi]