Abstract is missing.
- CLOUD, Trigger of a Socio-economic RevolutionTobias Hoellwarth. 5
- Scientific Workflows in the Era of CloudsPéter Kacsuk. 7
- Will Cloud Gain an Edge?Lee Gillam. 9
- Smart Connected Digital Factories: Unleashing the Power of Industry 4.0 and the Industrial InternetMike P. Papazoglou. 11
- Micro-Segmenting 5GOlli Mämmelä, Jani Suomalainen, Kimmo Ahola, Pekka Ruuska, Mikko Majanen, Mikko Uitto. 17-28 [doi]
- Unbalanced Data Classification in Fraud Detection by Introducing a Multidimensional Space AnalysisRoberto Saia. 29-40 [doi]
- A Multi-Channel Software Decoder for the LoRa Modulation SchemePieter Robyns, Peter Quax, Wim Lamotte, William Thenaers. 41-51 [doi]
- Detecting Anomalies in Device Event Data in the IoTIrene Cramer, Prakash Govindarajan, Minu Martin, Alexandr Savinov, Arun Shekhawat, Alexander Staerk, Appasamy Thirugnana. 52-62 [doi]
- How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of ThingsSilvie Schmidt, Mathias Tausig, Manuel Koschuch, Matthias Hudler, Georg Simhandl, Patrick Puddu, Zoran Stojkovic. 63-72 [doi]
- A Performance Exploration of Architectural Options for a Middleware for Decentralised Lightweight Edge Cloud ArchitecturesDavid von Leon, Lorenzo Miori, Julian Sanin, Nabil El Ioini, Sven Helmer, Claus Pahl. 73-84 [doi]
- Hidden within a Group of People - Mental Models of Privacy ProtectionEva-Maria Schomakers, Chantal Lidynia, Martina Ziefle. 85-94 [doi]
- Fault-Tolerant Scheduling for Scientific Workflow with Task Replication Method in CloudZhongjin Li, JiaCheng Yu, HaiYang Hu, Jie Chen, Hua Hu, JiDong Ge, Victor Chang 0001. 95-104 [doi]
- A Decision Framework for Blockchain Platforms for IoT and Edge ComputingClaus Pahl, Nabil El Ioini, Sven Helmer. 105-113 [doi]
- An Evaluation Framework for Fastest Oblivious RAMSeira Hidano, Yuto Nakano, Shinsaku Kiyomoto. 114-122 [doi]
- IoT Privacy in 5G NetworksEmanuele Catania, Aurelio La Corte. 123-131 [doi]
- Trustworthy Privacy Policy Translation in Untrusted IoT EnvironmentsMamadou H. Diallo, Nisha Panwar, Roberto Yus, Sharad Mehrotra. 132-143 [doi]
- Energy-Efficient Service Function Chain Provisioning in Multi-Domain NetworksGang Sun, Yayu Li, Guangyang Zhu, Dan Liao, Victor Chang 0001. 144-152 [doi]
- Of Guardians, Cynics, and Pragmatists - A Typology of Privacy Concerns and BehaviorEva-Maria Schomakers, Chantal Lidynia, Luisa Vervier, Martina Ziefle. 153-163 [doi]
- Intrusion Detection and Prevention with Internet-integrated CoAP Sensing ApplicationsJorge Granjal, Artur Pedroso. 164-172 [doi]
- Applicability and Resilience of a Linear Encoding Scheme for Computing ConsensusMichel Toulouse, Bui Quang Minh. 173-184 [doi]
- A Reference Architecture for the IoT Services' Adaptability - Using Agents to Make IoT Services Dynamically ReconfigurableAdemir José Barba, Fernando Antonio de Castro Giorno. 187-194 [doi]
- Parallel Privacy-preserving Record Linkage using LSH-based BlockingMartin Franke, Ziad Sehili, Erhard Rahm. 195-203 [doi]
- Access Rules Enhanced by Dynamic IIoT ContextKevin Wallis, Marc Hüffmeyer, Ayhan Soner Koca, Christoph Reich. 204-211 [doi]
- Misalignment between Business and IT Strategic Objectives in Saudi Arabia Public Sector OrganisationsAbdulaziz Alghazi, Mengxiang Li, Tingru Cui, Samuel Fosso Wamba, Jun Shen 0001. 212-220 [doi]
- Data Analytics for Low Voltage Electrical GridsMaria Stefan, Jose G. Lopez, Morten H. Andreasen, Rubén Sánchez, Rasmus L. Olsen. 221-228 [doi]
- Internet of Things Middleware: How Suitable are Service-oriented Architecture and Resource-oriented ArchitectureJanick Kubela, Matthias Pohl, Sascha Bosse, Klaus Turowski. 229-236 [doi]
- System Protection Agent Against Unauthorized Activities via USB DevicesJosé Oliveira, Miguel Frade, Pedro Pinto. 237-243 [doi]
- Discovery of Newsworthy Events in TwitterFernando Fradique Duarte, Óscar Mortágua Pereira, Rui L. Aguiar. 244-252 [doi]
- XACML for Building Access Control Policies in Internet of ThingsHany F. Atlam, Madini O. Alassafi, Ahmed Alenezi, Robert John Walters, Gary B. Wills. 253-260 [doi]
- Towards Combining Reactive and Proactive Cloud Elasticity on Running HPC ApplicationsVinicius Facco Rodrigues, Rodrigo Da Rosa Righi, Cristiano André da Costa, Dhananjay Singh, Víctor Méndez Muñoz, Victor Chang 0001. 261-268 [doi]
- Exploring Big Data Clustering Algorithms for Internet of Things ApplicationsHind Bangui, Mouzhi Ge, Barbora Buhnova. 269-276 [doi]
- NoSQL Database Performance Tuning for IoT Data - Cassandra Case StudyLucas B. Dias, Maristela Holanda, Ruben Cruz Huacarpuma, Rafael T. de Sousa Jr.. 277-284 [doi]
- SPIRI: Low Power IoT Solution for Monitoring Indoor Air QualityJohn Esquiagola, Matheus Manini, Arthur Aikawa, Leopoldo Yoshioka, Marcelo Zuffo. 285-290 [doi]
- Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)Ulrich Haböck, Manuel Koschuch, Ines Kramer, Silvie Schmidt, Mathias Tausig. 291-298 [doi]
- Towards a Platform for Urban Data Management, Integration and ProcessingElarbi Badidi, Muthucumaru Maheswaran. 299-306 [doi]
- Towards a Fully Automated Bracelet for Health Emergency SolutionIgor Matias, Nuno Pombo, Nuno-Garcia. 307-314 [doi]
- Rainfall Prediction Model based on Radar Image Analysis ProcessingOudomseila Phok, Jiwan Lee, Bonghee Hong. 315-319 [doi]
- The Impact of Clustering for Learning Semantic CategoriesMário Antunes 0001, Diogo Gomes 0001, Rui L. Aguiar. 320-327 [doi]
- Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT SystemNoé Picard, Jean-Noël Colin, Denis Zampuniéris. 333-339 [doi]
- Homomorphic Encryption for Secure Computation on Big DataRoger A. Hallman, Mamadou H. Diallo, Michael Anthony August, Christopher T. Graves. 340-347 [doi]
- A Discussion Paper on the Grey Area - The Ethical Problems Related to Big Data Credit ReportingVictor Chang 0001, Jing Li. 348-354 [doi]