Abstract is missing.
- A Study of a Framework for Experimental Games with Sensors in IoTHye-Young Kim. 1-4 [doi]
- Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet AuthenticationCasimer DeCusatis, Piradon Liengtiraphan, Anthony Sager, Mark Pinelli. 5-10 [doi]
- Unified, Multi-level Intrusion Detection in Private Cloud InfrastructuresMarty Humphrey, Robert Emerson, Norm Beekwilder. 11-15 [doi]
- Accuracy Comparison Between GPS and BeiDou2/Compass of Dynamic Differential Positioning in the Experiment of Air-Gun in ReservoirMing-Quan Hong, Jun Li, Guang Chen, Wen-Bo Zhao, Chaoxian Chen. 16-19 [doi]
- Challenges and Opportunities in Edge ComputingBlesson Varghese, Nan Wang, Sakil Barbhuiya, Peter Kilpatrick, Dimitrios S. Nikolopoulos. 20-26 [doi]
- The Disintegration Protocol: An Ultimate Technique for Cloud Data SecurityBharat S. Rawal, Harsha K. Kalutarage, S. Sree Vivek, Kamlendu Pandey. 27-34 [doi]
- A Framework to Secure the Virtual Machine Image in Cloud ComputingRaid Khalid Hussein, Ahmed Alenezi, Gary B. Wills, Robert J. Walters. 35-40 [doi]
- Smart Detection and Transmission of Abnormalities in ECG via BluetoothPavani Lakshmi Penmatsa, D. V. Rama Kkoti Reddy. 41-44 [doi]
- NUBOMEDIA: An Elastic PaaS Enabling the Convergence of Real-Time and Big Data MultimediaBoni García, Micael Gallego, Luis Lopez Fernandez, Giuseppe A. Carella, Alice Cheambe. 45-56 [doi]
- CACROS: A Context-Aware Cloud Content Roaming ServiceMd. Mahmud Hossain, Shahid Al Noor, Dibya Mukhopadhyay, Ragib Hasan, Lei Li. 57-68 [doi]
- Image Enhancement via Cloud Cascade Control Based Sub-Image-Clipped Histogram EqualizationPaul Rad, Sos S. Agaian, Mehdi Roopaei, Saeed Sedighi. 69-72 [doi]
- A Novel Technique to Enhance Low Resolution CT and Magnetic Resonance Images in CloudSos S. Agaian, Paul Rad, Rahul Rajendran, Karen Panetta. 73-78 [doi]
- Two Stage Fault Analysis against a Falsification Detection Cipher MinalpherMasaya Yoshikawa, Yusuke Nozaki. 79-84 [doi]
- Linger Thermo Theory: Simplifying the Finding of the Entropy of Mediums with Applications that Span from Astrophysics to Human LifespanErlan H. Feria. 85-102 [doi]
- Securing Cloud Containers Using Quantum Networking ChannelsBrian Todd Kelley, John J. Prevost, Paul Rad, Aqsa Fatima. 103-111 [doi]
- Access Control Model for Ambient Intelligent Services in Cloud ComputingIchiro Satoh. 112-117 [doi]
- Middleware Support for Seamless Integration of Domain Specific Cores in Cloud DatacentersMazen Ezzeddine, Raghid Morcel, Haitham Akkary. 118-125 [doi]
- FPGA-Based Accelerator for Deep Convolutional Neural Networks for the SPARK EnvironmentRaghid Morcel, Mazen Ezzeddine, Haitham Akkary. 126-133 [doi]
- Intelligent Data Placement Mechanism for Replicas Distribution in Cloud Storage SystemsIbrahim Adel Ibrahim, Wei Dai, Mostafa A. Bassiouni. 134-139 [doi]
- Improving Load Balance for Data-Intensive Computing on Cloud PlatformsWei Dai, Ibrahim Adel Ibrahim, Mostafa A. Bassiouni. 140-145 [doi]
- A Scalable Feature Selection and Model Updating Approach for Big Data Machine LearningBaijian Yang, Tonglin Zhang. 146-151 [doi]
- Big Data Dimension Reduction Using PCATonglin Zhang, Baijian Yang. 152-157 [doi]
- Workload Management in Distributed Data Centers: Thermal and Spatial AwarenessAhsan Ali, Öznur Özkasap. 158-163 [doi]
- A Novel Approach for Simulation and Analysis of Cloud Data Center ApplicationsKuldip Singh Atwal, Mostafa A. Bassiouni. 164-169 [doi]
- A Survey of Homogeneous and Heterogeneous System Architectures in High Performance ComputingYu-Xiang Gao, Peng Zhang. 170-175 [doi]
- A Distance and Density-Based Clustering Algorithm Using Automatic Peak DetectionRong Zhou, Shuang Zhang, Chun Chen, Li Ning, Yong Zhang, Shengzhong Feng, Yi Liu, Nurbol Luktarhan. 176-183 [doi]
- Optimal Big Data Sharing Approach for Tele-Health in Cloud ComputingLongfei Qiu, Keke Gai, Meikang Qiu. 184-189 [doi]
- Privacy-Preserving Adaptive Multi-channel Communications Under Timing ConstraintsKeke Gai, Meikang Qiu, Hui Zhao, Wenyun Dai. 190-195 [doi]
- Ubiquitous Cloud-Based Monitoring via a Mobile App in Smartphones: An OverviewFadi Al-Turjman, Aysu Betin-Can, Enver Ever, Sinem Alturjman. 196-201 [doi]
- Design of an Architecture for Telemedicine Applications in IoTAlejandro Paolo Daza, Octavio J. Salcedo Parra, Brayan S. Reyes Daza. 202-207 [doi]
- A Versatile Event-Driven Data Model in HBase Database for Multi-source Data of Power GridBin Liu, Yongxin Zhu, Chang Wang, Yufeng Chen, Tian Huang, Weiwei Shi, Mengjun Li, Yishu Mao. 208-213 [doi]
- Automatic Detecting Cornea Fungi Based on Texture AnalysisQingchen Qiu, Zhi Liu, Yuefeng Zhao, Dongmei Wei, Xuelian Wu. 214-217 [doi]
- MicroCloud: A Container-Based Solution for Efficient Resource Management in the CloudLuciano Baresi, Sam Guinea, Giovanni Quattrocchi, Damian A. Tamburri. 218-223 [doi]
- Mental Disease Feature Extraction with MRI by 3D Convolutional Neural Network with Multi-channel InputLijun Cao, Zhi Liu, XiaoFu He, Yankun Cao, Ke-ning Li. 224-227 [doi]
- Secure and Anonymous Data Transmission System for Cluster Organised Space Information NetworkDawei Li, Jianwei Liu, Weiran Liu. 228-233 [doi]
- Static Mining and Dynamic Taint for Mobile Security Threats AnalysisTianda Yang, Kai Qian, Lei Li, Dan Chia-Tien Lo, Lixin Tao. 234-240 [doi]
- EEG Detection Based on Wavelet Transform and SVM MethodChun Chen, Zhichao Liu, Hongna Li, Rong Zhou, Yong Zhang, Renkai Liu. 241-247 [doi]
- Virtual Machine Optimizations Using Markov Chain Data Analytics in Heterogeneous Cloud ComputingXiaotong Sun. 248-253 [doi]
- A Secure Interactive Architecture for Vehicular Cloud EnvironmentHesham El Zouka. 254-261 [doi]
- Intrusion Tolerant Multi-cloud StorageBharat B. Madan, Manoj Banik, Bo Chen Wu, Doina Bein. 262-268 [doi]
- Homomorphic Signature for Generation-based Network CodingTao Shang, Tianli Peng, Qi Lei, Jianwei Liu. 269-273 [doi]
- Application of Hyperspectral Imaging in Measurement Real-Time of SeedsYuefeng Zhao, Yunuan Wang, Dongmei Wei, Huaiguang Mu, Tingyin Ning. 274-277 [doi]
- A Quick Algorithm for Rule Acquisition Based on Distributed ComputingXiaofan Wang, Lei Wang, Yujun Li, Bin Wang, Xinhong Hei 0001, Zijian Cao. 278-281 [doi]
- Fuzzy Clustering Algorithms - Review of the ApplicationsJiamin Li, Harold W. Lewis. 282-288 [doi]
- Awake: Decentralized and Availability Aware Replication for P2P Cloud StorageYahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap. 289-294 [doi]
- Connectivity, Traffic Flow and Applied Statistics in Cyber SecurityKutub Thakur, Md Liakat Ali, Sandra Kopecky, Abu Kamruzzaman, Lixin Tao. 295-300 [doi]
- Cooperative Content Downloading in Hybrid VANETs: 3G/4G or RSUs DownloadingDongdong Yue, Peng Li, Tao Zhang, Junshan Cui, Yu Jin, Yu Liu, Qin Liu. 301-306 [doi]
- Facilitating Secure Query Processing on Encrypted Databases on the CloudOsama M. Ben Omran, Brajendra Panda. 307-312 [doi]
- Policy Language for Access Control in Social Network CloudKatanosh Morovat, Brajendra Panda. 313-318 [doi]
- An Improved Digital Signature Algorithm and Authentication Protocols in Cloud PlatformLongge Wang, Tao Song. 319-324 [doi]
- Applying Big Data Analytics Into Network Security: Challenges, Techniques and OutlooksCaiyou Zhang, Xiaojun Shen, Xubin Pei, Yiyang Yao. 325-329 [doi]