Abstract is missing.
- Analogue to information converter design using analogue chua circuit for IoT devicesHesham H. Aly, Abdel-Hamid Soliman, Mansour Mouniri. [doi]
- Dynamic IoT management system using K-means machine learning for precision agriculture applicationsJacqueline Stewart, Robert Stewart 0001, Sean Kennedy. [doi]
- Harnessing the power of blockchain technology to solve IoT security & privacy issuesAafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman. [doi]
- Path finder for medical information couriers in the IoT eraFadi Al-Turjman. [doi]
- Integrating SCM with internet of things: implication on HR managementPreeti Khanna, Ashu Sharma. [doi]
- Gastrointestinal tract bleeding detection from wireless capsule endoscopy videosSaid Charfi, Mohamed El Ansari. [doi]
- Modeling virtual channel to enforce runtime properties for IoT servicesYang Zhang, Jun-liang Chen. [doi]
- Measuring sensor to cloud energy consumptionA. H. Azni, Abdul Fuad Abdul Rahman, Najwa Hayaati Mohd Alwi, Kamaruzzaman Seman. [doi]
- "Need to know" to defend one's home, or should one buy a wifi enabled thermostat?Yvo Desmedt. [doi]
- A structure of intelligent grain network information platform based on cloud computingJianwei He, Dexian Zhang. [doi]
- Overview of HTTP/2Anne-Sophie Brylinski, Aniruddha Bhattacharjya. [doi]
- NFC-based waste management tracking and monitoring systemBeh Choon Yeong, Nurul Hashimah Ahamed, Hassain Malim, Manmeet Mahinderjit Singh. [doi]
- A new secure model for the use of cloud computing in big data analyticsHabiba Chaoui, Ibtissam Makdoun. [doi]
- Mobile blue gateway an application for multicasting data to populations of bluetooth low energy sensors for smart community sensingRahim Rahmani, Yuhong Li, Karl Eberg, Marcus Stvelind3rd. [doi]
- IoT architectural concerns: a systematic reviewAsif Qumer Gill, Vahid Behbood, Rania Ramadan-Jradi, Ghassan Beydoun. [doi]
- Image splicing detection using singular value decompositionZahra Moghaddasi, Hamid A. Jalab, Rafidah Md Noor. [doi]
- Impact of video streaming quality on bandwidth in humanoid robot NAO connected to the cloudHamza Aagela, Violeta Holmes, M. Dhimish, D. Wilson. [doi]
- E-governance (G2C) in the public sector: citizens acceptance to E-government systems - Dubai's caseSamira Al Marzooqi, Eiman Al Nuaimi, Nabil Al Qirim. [doi]
- A cloud-based live streaming service for SDN-NFV enabled carriersA. Casella, Alfio Lombardo, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Giovanni Schembra, Alessandro Vassallo. [doi]
- IoT deployment for smarter cities with special reference to mobilityNachiket Tapas, O. P. Vyas. [doi]
- Selectivity estimation in web query optimizationShashidhar H. R, G. T. Raju, Vinayaka Murthy. [doi]
- A study of revenue cost dynamics in large data centers: a factorial design approachGambhire Swati Sampatrao, Sudeepa Roy Dey, Bidisha Goswami, Sai Prasanna M. S, Snehanshu Saha. [doi]
- On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machinesNikolaos Tantouris, Despoina Polemi, Kleanthis Dellios. [doi]
- Cloud services implementing security: a case studyAlberto Polzonetti, Alessandro Bettacchi. [doi]
- Internet of things security: challenges and perspectivesAmina Harit, Abdellah Ezzati, Rachid Elharti. [doi]
- A study on IoT solutions for preventing cattle rustling in african contextOusmane Dieng, Babacar Diop, Ousmane Thiare, CongDuc Pham. [doi]
- A new approach to mitigate security threats in cloud environmentChaimae Saadi, Habiba Chaoui. [doi]
- Subspace selection in high-dimensional big data using genetic algorithm in apache sparkFatemeh Cheraghchi, Arash Iranzad, Bijan Raahemi. [doi]
- Combined WSD algorithms with LSA to identify semantic similarity in unstructured textual dataMohammed Ahmed Taiye, Siti Sakira Kamaruddin, Farzana Kabir Ahmad. [doi]
- A stack cross-layer analytical model for CSMA/CA IEEE 802.15.4 networksZongyi Liu, Daniela Dragomirescu, Georges Da Costa, Thierry Monteil 0001. [doi]
- Decision support system for predicting stock prices based on sentiments in social mediaGalyna Chornous, Iuliia Iarmolenko. [doi]
- A framework for smart estimation of demand-supply for crowdsource management using WSNNaeem A. Nawaz, Ahmad Waqas, Zulkefli Muhammed Yusof, Asadullah Shah. [doi]
- Simulating MTC data transmission in LTEJulian Popp, Claudia Lex, Joerg Robert, Albert Heuberger. [doi]
- The relevance of technological autonomy in the customer acceptance of IoT services in retailMarius Kahlert, E. Constantinides, S. A. de Vries. [doi]
- Thwarting pollution attacks in network coding for delay tolerant mobile social networksLucile Sassatelli, Muriel Médard. [doi]
- EEG signals classification for epileptic detection: a reviewEssam H. Houssein, Aboul Ella Hassanien, Alaa A. K. Ismaeel. [doi]
- A copula based approach for measurement validity verification in wireless sensor networksSanaa Kawther Ghalem, Kechar Bouabdellah, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Farid Lalem. [doi]
- Bio-inspired energy harvesting in WSN: a surveyAqeel-ur-Rehman, Iqbal Uddin Khan, S. M. Kashif Alam, Ahmar Murtaza. [doi]
- Real time analytics of urban congestion trajectories on hadoop-mongoDB cloud ecosystemLamia Karim, Azedine Boulmakoul, Ahmed Lbath. [doi]
- A hybrid approach to enhance data security in cloud storageR. Udendhran. [doi]
- Network entropy based overlapping community detection in social networksS. Rao Chintalapudi, M. H. M. Krishna Prasad. [doi]
- IoT sandbox: to analysis IoT malware ZollardKai-Chi Chang, Raylin Tso, Min-Chun Tsai. [doi]
- Glowworm swarm optimisation based task scheduling for cloud computingDabiah Ahmed Alboaneen, Huaglory Tianfield, Yan Zhang. [doi]
- A robust and efficient approach for image denoising and brain region extraction to aid neurology system of patientVandna Shah. [doi]
- Data confidentiality in cloud-based pervasive systemKhaled M. Khan, Mahboob Shaheen, Yongge Wang. [doi]
- A method for video shot boundary detection based on HSV color histogram and DPHA featureBin Sun, Dengyin Zhang. [doi]
- QoS analysis of hierarchical routing protocols for wireless sensor networksMariam Benmoussa, Mariyam Ouaissa, Mohammed Lahmer, Idriss Chana, Abdallah Rhattoy. [doi]
- Cloud data governance maturity modelMajid Al-Ruithe, Elhadj Benkhelifa. [doi]
- Identification framework for smart environments in the era of cloud-IoTFadi Al-Turjman, Sinem Alturjman, Enver Ever. [doi]
- A survey on smart city technologies, initiatives and global technology providersMahmoud El Hendy, Sami Miniaoui, Shadi Atalla, Kamarul Faizal Bin Hashim. [doi]
- Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centersUlysse Rugwiro, Chunhua Gu. [doi]
- Flow machine diagrams for VHDL codeSabah Al-Fedaghi, Sari Sultan. [doi]
- Using UTAUT2 for cloud computing technology acceptance modelingFotios Nikolopoulos, Spiridon D. Likothanassis. [doi]
- Managing QoS in IoTs: a surveyEiman Al Nuaimi, Noura Al Darmaki. [doi]
- Towards a classification model for tasks in crowdsourcingReham Alabduljabbar, Hmood Al-Dossari. [doi]
- Vehicle trajectory data warehouse: point of interest and time interval of interestNouha Arfaoui, Jalel Akaichi. [doi]
- Improved group management protocol of RFID password methodTao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang. [doi]
- Underwater color image enhancement using improved multi-scale retinex and histogram linear quantificationQingwu Li, Wenqing Zhu, Mei Cao. [doi]
- Overview and reflexion on OWL 2 DL ontology consistency rulesLeila Bayoudhi, Najla Sassi, Wassim Jaziri. [doi]
- Where big data meets 5G?Kashif Sultan, Hazrat Ali. [doi]
- Workflow resources provisioning algorithm researchDelong Cui, Zhiping Peng, Wende Ke, Qirui Li, Jinglong Zuo, Jihai Zhong. [doi]
- Context-awareness security model based on multi-agents system operating in complex environmentHaoua Cheribi, Noureddine Amraoui, Abdelkrim Bouramoul, Mohamed-Khireddine Kholladi. [doi]
- A cloud computing network and an optimization algorithm for IaaS providersGabriella Colajanni, Patrizia Daniele. [doi]
- Data-mining medications for pain: analyzing adoption behavior of physicians and switching behavior of patientsAbhinav Choudhury, Shruti Kaushik, Varun Dutt. [doi]
- Virtualization of set-top-box devices in next generation SDN-NFV networks: the input project perspectiveRoberto Bruschi, Franco Davoli, Laura Galluccio, Paolo Lago, Alfio Lombardo, Chiara Lombardo, Corrado Rametta, Giovanni Schembra. [doi]
- The information and communication technology governance maturity level for malaysian public sectorRosida Ab Razak, Mohamad Shanudin Zakaria. [doi]
- Protecting an automobile network using distributed firewall systemSyed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder, Seth Marasco. [doi]
- Feature selection difference matching method for indoor positioningT. T. Lu, Y. J. Liu, J. J. Ciou, C.-H. Lu. [doi]
- Trading of cloud of things resourcesAhmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi. [doi]
- Data mining for automated diagnosis of neurological and psychiatric disordersHojjat Adeli. [doi]
- Cloud security certifications: a comparison to improve cloud service provider securityCarlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir. [doi]
- An automatic early risk classification of hard coronary heart diseases using framingham scoring modelHoda Ahmed Galal Elsayed, Liyakathunisa Syed. [doi]
- An emulation framework for SDN-NFV based servicesGabriele Baldoni, Alfio Lombardo, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Alessandro Vassallo. [doi]
- Using aspect oriented programming to enforce privacy preserving communication in distributed systemsA. A. Thulnoon, Brett Lempereur, Qi Shi, D. Al-Jumeily. [doi]
- MRI brain scan classification using novel 3-D statistical featuresAli M. Hasan, Farid Meziane, Rob Aspin, Hamid A. Jalab. [doi]
- Replication algorithm based on confidence measure for cloud storage systemsMohammed Sharfuddin, T. Ragunathan. [doi]
- An efficient load balancing strategy based on mapreduce for public cloudAwatif Ragmani, Amina El Omri, Noreddine Abghour, Khalid Moussaid, Mohamed Rida. [doi]
- Next generation traffic event detection: a framework based on internet of vehicles (IoV)S. Abraham, N. Weller. [doi]
- A framework for agent-based intrusion detection in wireless sensor networksHigo Pires, Zair Abdelouahab, Denivaldo Lopes, Mário Santos. [doi]
- The internet of things: network delay improvement using network codingEl Miloud Ar-reyouchi, Maria Hammouti, Imane Maslouhi, Kamal Ghoumid. [doi]
- A deep relation learning method for IoT interoperability enhancement within semantic formalization frameworkBin Xiao, Rahim Rahmani. [doi]
- Energy efficient approach for application execution in mobile cloud IoT environmentRaj Kumari, Sakshi Kaushal. [doi]
- Eclipse: a wearable instrument for performance based storytellingEzgi Ucar. [doi]
- Sets with members as machines with things that flowSabah Al-Fedaghi. [doi]
- FITRA: a neuro-fuzzy computational algorithm approach based on an embedded water planting systemGeorge Kokkonis, Sotirios Kontogiannis, Dimitrios Tomtsis. [doi]
- Clustering lightened deep representation for large scale face identificationShilun Lin, Zhicheng Zhao, Fei Su. [doi]
- A mitigation system for ARP cache poisoning attacksB. Prabadevi, N. Jeyanthi. [doi]
- Designing encryption and IDS for cloud securityNandita Sengupta. [doi]
- Design of smart ships for the IoTJesús A. Muñoz, Rodrigo Pérez. [doi]
- IoT powered portable aquaponics systemNikhil Kurian Jacob. [doi]
- A maximum agreement approach to information fusionM. Y. Cai, Y. Lin, C. L. Liu 0002, C. L. Ji, W. J. Zhang. [doi]
- Multichannel key exchangeSiddharth Gupta, Sahithya Kodam, Baijian Yang. [doi]
- Group access authentication of machine to machine communications in LTE networksMariyam Ouaissa, Abdallah Rhattoy, Mohammed Lahmer. [doi]
- Bacterial foraging optimization algorithm with temporal features to solve data sparsity in recommendation systemIsmail Ahmed Al-Qasem Al-Hadi, Nurfadhlina Mohd Sharef, Md Nasir Sulaiman, Norwati Mustapha. [doi]
- Scalable pattern retrieval from videos using a random forest indexCraig Henderson, Ebroul Izquierdo. [doi]
- IoT based air quality monitoring system using wireless sensors deployed in public bus servicesDebanshee Saha, Manasi Shinde, Shail Thadeshwar. [doi]
- Semantically equivalent model for quality evaluationMadjid Kara, Olfa Lamouchi, Amar Ramdane-Cherif. [doi]
- A classification of skin lesion using fractional poisson for texture feature extractionAlaa Ahmed Abbas Al-abayechi, Hamid A. Jalab, Rabha W. Ibrahim. [doi]
- On parallelizing graph theoretical approaches for identifying causal genes and pathways from very large biological networksJeethu V. Devasia, Priya Chandran, Garge Shreya, Aparna R., Abijith R.. [doi]
- Design of multi-band antenna for LTE and WiMAX applications using step-shaped drivers with the truncated ground planeManzoor Elahi, Shahid Khan, Hazrat Ali, Sikandar Khan, Irfanullah. [doi]
- Security auditing in the fogSimon Parkinson, Yongrui Qin, Saad Khan, Mauro Vallati. [doi]
- Comparative analysis of different classification algorithms for prediction of diabetes diseaseLujain AlThunayan, Nahed AlSahdi, Liyakathunisa Syed. [doi]
- A secure cloud framework for ICMetric based IoT health devicesRuhma Tahir, Hasan Tahir, Ali Sajjad, Klaus D. McDonald-Maier. [doi]
- PWCT: visual language for IoT and cloud computing applications and systemsMahmoud S. Fayed, Muhammad Al-Qurishi, Atif Alamri, Ahmad A. Al-Daraiseh. [doi]
- An intrusion detection system for denial of service attack detection in internet of thingsBreno Fabrício Lira Melo Sousa, Zair Abdelouahab, Denivaldo Cicero Pavão Lopes, Natalia Costa Soeiro, Willian França Ribeiro. [doi]
- Security evaluation of cloud service providers using third party auditorsSyed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer III. [doi]
- Securing the mobile environment: firewall anti-leak of sensitive data on smartphoneNajim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman. [doi]
- Using opinion mining techniques on Twitter streaming data regards drug safety issuesAbeer Nafel Alharbi, Hessah Alnamlah, Liyakathunsia Syed. [doi]
- Enhancing the intelligence of web tutoring systems using a multi-entry based open learner modelAli A. Al-Jadaa, Abdallatif S. Abu-Issa, Wasel T. Ghanem, Mohammed S. Hussein. [doi]
- A heuristic based algorithm for distance-aware virtual machine allocation in cloudT. P. Shabeera, S. D. Madhu Kumar. [doi]
- A framework for supporting the context-aware mobile application development processDébora Stefanello, Denivaldo Lopes. [doi]
- Detection of brain activity with an automated system hardware for accurate diagnostic of mental disordersShaik Asif Hussain, Haitham Mohammed, Shaik Javeed Hussain. [doi]
- A framework for evaluating continuous microservice delivery strategiesMartin Lehmann, Frode Eika Sandnes. [doi]
- Survey on call admission control protocols in cellular networksSatyasrikanth Palle, Thippeswamy M. N, Fambirai Takawira. [doi]
- An open-source PLC stack for simplified and cost-effective deployment of smart systemsSteffen Thielemans, Maite Bezunartea, Abdellah Touhafi, Kris Steenhaut. [doi]
- Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networksMirMuhammad Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, Tariq Jameel Khanzada, Steve Greedy. [doi]
- Mobile app security by fragmentation "MASF"Almokhtar Ait El Mrabti, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort. [doi]
- Impact of cross-layer interactions between radio duty cycling and routing on the efficiency of a wireless sensor network: a testbed study involving contikiMAC and RPLMaite Bezunartea, Mai Banh, Miguel Gamallo, Jacques Tiberghien, Kris Steenhaut. [doi]
- A framework for energy-consumption in future hetnets: towards green smart-citiesHadi Zahmatkesh, Enver Ever, Fadi Al-Turjman, Mustafa Riza. [doi]
- Application of model driven engineering in cloud computing: a systematic literature reviewAbdul Wahab Muzaffar, Shumyla Rasheed Mir, Muhammad Waseem Anwar, Adeela Ashraf. [doi]
- An event-based access control for IoTNurul Huda Nik Zulkipli, Gary B. Wills. [doi]
- Graphic model analysis of frauds in online consumer reviewsChungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo. [doi]
- IoT security hardware framework for remote maintenance of legacy machine toolsStefano Tedeschi 0002, Jörn Mehnen, Rajkumar Roy. [doi]
- Energy efficient IR-UWB transceiver for autonomous wireless sensor networkB. Benamrouche, Daniela Dragomirescu. [doi]
- A comprehensive investigation of natural language processing techniques and tools to generate automated test casesImran Ahsan, Wasi Haider Butt, Mudassar Adeel Ahmed, Muhammad Waseem Anwar. [doi]
- Local anchor based architecture for mobility support in identificator locator split networksEric Mayeul O. Fafolahan, Samuel Pierre. [doi]
- Covert network analysis to detect key players using correlation and social network analysisEjaz Farooq, Shoab A. Khan, Wasi Haider Butt. [doi]
- A countermeasure against relay attack in NFC paymentPeng Li, Huayi Fang, Xiang Liu, Baijian Yang. [doi]
- My home is my post-office: evaluation of a decentralized email architecture on internet-of-things low-end deviceGregory Tsipenyuk, Jon Crowcroft. [doi]
- A generic model for evaluating the usability of learning management systemsDana I. Al-Maani, Hani Bani-Salameh. [doi]
- Manifold learning in SLA violation detection and prediction for cloud-based systemAhmad Fadzil M. Hani, Irving Vitra Paputungan, M. Fadzil H, Vijanth S. Asirvadam. [doi]
- Business modeling based on internet of things: a case study of predictive maintenance software using ABS modelMohammed Basingab, Luis Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez, Won II Jung. [doi]
- Advanced, hardware supported in-network processing for the internet of thingsMd. Fasiul Alam, Stathes Hadjiefthymiades. [doi]
- Emergency response systems: research directions and current challengesAbobakr Y. Shahrah, Majed A. Al-Mashari. [doi]
- Smart electric water heaters: a system architecture proposal for scalable IoTA. H. Cloete, Marthinus J. Booysen, R. C. Sandell, A. B. van der Merwe. [doi]
- Centrality-based bipartite local community detection algorithmDongming Chen, Wei Zhao, Xinyu Huang, Dongqi Wang, Yanbin Yan. [doi]
- Internet of things for driving human-like interactions: a case study for cultural smart environmentFiammetta Marulli, Luca Vallifuoco. [doi]
- A machine learning based approach to identify geo-location of Twitter usersAytug Onan. [doi]
- Machine learning approaches for extracting genetic medical data informationAbir Hussain. [doi]
- Comparison of ensemble learning methods applied to network intrusion detectionMustapha Belouch, Salah el hadaj. [doi]
- A novel data reduction technique with fault-tolerance for internet-of-thingsWong Siaw Ling, Boon-Yaik Ooi, Soung-Yue Liew. [doi]
- Impact of tasks classification and virtual machines categorization on tasks scheduling algorithms in cloud computingTahani Aladwani. [doi]
- An adaptive app for tourist contents contextualizationFrancesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi. [doi]
- The pitfall of using question detection as a proxy for action inference in natural text conversations: a position paperArseni Anisimovich, Michele Sama, Theodosia Togia. [doi]
- From smart-city and IoT simulation to big data generationAhcène Bounceur. [doi]
- Statistical transmission control based on confidence interval in high bandwidth networkWonjun Choi, Ramneek Seckhon, Woojin Seok. [doi]
- Deals with integrating of security specifications during software design phase using MDA approachLasbahani Abdellatif, Mostafa Chhiba, Oussama Mjihil. [doi]
- Managing huge point cloud data through geometrical-based registrationS. A. Abdul Shukor, M. Q. Aminuddin, E. J. Rushforth. [doi]
- A comprehensive analytical model for QoS-based routing protocols evaluation in WBANsNawel Yessad, Farah-Sarah Ouada, Mawloud Omar. [doi]
- Enhancing contact center performance using cloud computing: a case study on telecom contact centersBinesh Jose, S. D. Madhu Kumar, Alfredo Cuzzocrea. [doi]
- An efficient and updatable item-to-item frequency matrix for frequent itemset generationAwais Usman, Peilin Zhang, Oliver E. Theel. [doi]
- 3: link reliable reactive routing protocol for wireless sensor networksVenkatesh, Poornima M. R, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik. [doi]
- Resource efficiency in container-instance clustersUchechukwu Awada, Adam Barker. [doi]
- Towards an off-the-cloud IoT data processing architecture via a smart car parking exampleBadraddin Alturki, Stephan Reiff-Marganiec. [doi]
- A dynamic federated identity management approach for cloud-based environmentsBendiab Keltoum, Boucherkha Samia. [doi]
- Missing plane identification using doppler effect and distance method in satellite communicationP. L. Valliammai, Kirupa Ganapathy. [doi]
- Internet of things eco-systems: assured interactivity of devices and data through cloud based team workMartin Randles, Princy Johnson, Abir Hussain. [doi]
- Algorithms for extracting adjacency matrix based on formal concept analysis (FCA)Hasni Hassan, Mohd Isa Awang, Mokhairi Makhtar, Aznida Hayati Zakaria, Rohana Ismail, Fadhilah Ahmad. [doi]
- BLE broadcasting impact in a real network environmentMiran Boric, Ana Fernández Vilas, Rebeca P. Díaz Redondo. [doi]
- A case study on monitoring and geolocation of noise in urban environments using the internet of thingsJairo Alejandro Gomez, Jesus Talavera, Luis Eduardo Tobon, Maria Alejandra Culman, Luis Alfredo Quiroz, Juan Manuel Aranda, Luis Ernesto Garreta. [doi]
- FOG based distributed IoT infrastructureTasnia Heya Ashrafi, Sayed Erfan Arefin, Kowshik Dipta Jay Das, Md. Arshad Hossain, Amitabha Chakrabarty. [doi]
- J-park simulator: roadmap to smart eco-industrial parksMartin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Eddy Foo Yi Shyh, Kevin Aditya, Sebastian Mosbach, Iftekhar A. Karimi, Raymond Lau, Markus Kraft. [doi]
- Empirical research on distribution characteristics of online news commentTing Jin, Jian Wan, Huayou Si, Yajie Qi, Yongjian Ren. [doi]
- Multi-agent systems for scalable internet of things securityPhillip Kendrick, Abir Hussain, Natalia Criado, Martin Randles. [doi]
- A proposed onto-Apriori algorithm to mine frequent patterns of high quality seafoodSherimon Puliprathu Cherian, Vinu Sherimon. [doi]
- Risk tolerance and trust issues in cloud-based E-learningSiti Salmah Md. Kassim, Mazleena Salleh, Anazida Zainal, Abd Razak Che Husin. [doi]
- Direct autolinkKenneth Hoelscher, Lucas Allgood, Changyong (Andrew) Jung, Suk-Jin Lee. [doi]
- Growing green with improved profit through reduced power consumption in LTE networksKapil Kanwal, Ghazanfar Ali Safdar. [doi]
- Cloud computing service discovery framework for IaaS and PaaS modelsFarzad Firozbakht, Waeal J. Obidallah, Bijan Raahemi. [doi]
- Hidden markov model optimized by PSO algorithm for gene sequence clusteringMohammad Soruri, Javad Sadri, S. Hamid Zahiri. [doi]
- A review on smart grid network security issues over 6LoWPANAugustus E. Ibhaze, Moses U. Akpabio, Samuel N. John. [doi]
- A biomedical ontology on genetic diseaseAamna Iqtidar, Abdul Wahab Muzaffar, Usman Qamar, Saad Rehman. [doi]
- Preventing and detecting cache side-channel attacks in cloud computingYounis A. Younis, Kashif Kifayat, Abir Hussain. [doi]
- Live video transmission over data distribution service with existing low-power platformsA. Bagley, G. Fehringer, N. Jin, S. Cammish. [doi]
- Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarmTiago M. Ribeiro, V. Leonardo Paucar. [doi]
- Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networksDer-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu. [doi]
- A survey on web service discovery approachesWaeal J. Obidallah, Bijan Raahemi. [doi]
- Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imageryM. A. López Vega, S. Couturier. [doi]
- FRAMSTIM: framework for large scale multimedia content feature extraction based on MPI one-sided communicationHassane Essafi, Patrick Hède. [doi]
- A low cost workload generation approach through the cloud for capacity planning in service-oriented systemsCarlos H. G. Ferreira, Júlio Cezar Estrella, Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura, Rafael Mira De Oliveira Libardi, Bruno G. Batista, Maycon L. M. Peixoto, Dionisio Machado Leite Filho, Stephan Reiff-Marganiec. [doi]
- A survey on various routing protocols in cognitive radio networksDileep Reddy Bolla, Thippeswamy M. N, Fambirai Takawira. [doi]
- Students' performance tracking in distributed open education using big data analyticsAshraf S. Hussein, Hamayun A. Khan. [doi]
- IoT security: challenges and solutions for miningGlenn Barrie, Andrew Whyte, Joyce Bell. [doi]
- A multiservice network for gas and water meters managementFrancesco Colace, Matteo Ferro, Francesco Abate, Antonio Pietrosanto. [doi]
- Security of wireless sensor network (WSN) in smart gridBashar Ahmed Alohali, Vassilios G. Vassilakis. [doi]
- ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centersSoha Rawas, Wassim Itani, Ahmed Zekri, Ali El-Zaart. [doi]
- Bluetooth 5 beacons: a novel design for indoor positioningSreeja M, Sreeram M. [doi]
- A systematic classification of requirements engineering approaches for adaptive systemsAdnane Ghannem, Mohamed Salah Hamdi, Hany H. Ammar, Makram Soui. [doi]
- Cloud computing adoption readiness assessment in saudi healthcare organisations: a strategic viewFawaz Alharbi, Anthony S. Atkins, Clare Stanier. [doi]
- A threat based approach to computational offloading for collaborative cruise controlAl Tariq Sheik, Carsten Maple, Tim Watson, Hussam Alhagagi, Nader Sohrabi Safa, Sang-Woo Lee. [doi]
- Smart university: reservation system with contactless technologyLok Li Ching, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin, Manmeet Mahinderjit Singh. [doi]
- Distributed faulty sensor node detection in wireless sensor networks based on copula theoryFarid Lalem, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Rahim Kacimi, Sanaa Kawther Ghalem. [doi]
- Exploring dependability issues in IoT applicationsEhizojie Ojie, Ella Pereira. [doi]
- A novel approach to secure cloud data storage and dynamic data auditing in a cloudK. Brindha, N. Jeyanthi. [doi]
- Efficient dynamic traffic light control for ITSNaushin Nower, Sakhawat Hossan. [doi]
- Business scenarios for hierarchical workload management in data centersAlfredo Cuzzocrea, Carmine De Napoli, Agostino Forestiero, Demetrio Laganà, Giovanni Lupi, Carlo Mastroianni, Leonardo Spataro. [doi]
- Modeling the effect of data aggregation on the performance of wireless sensor network using colored petri netsSarah A. S. Alkhudair, Alaa E. S. Ahmed. [doi]