


default search action
ICC 2017: Cambridge, UK
- Hani Hamdan, Djallel Eddine Boubiche, Homero Toral-Cruz, Sedat Akleylek, Hamid Mcheick:
Proceedings of the Second International Conference on Internet of things and Cloud Computing, ICC 2017, Cambridge, United Kingdom, March 22-23, 2017. ACM 2017 - Abir Hussain:
Machine learning approaches for extracting genetic medical data information. 1:1 - Hojjat Adeli:
Data mining for automated diagnosis of neurological and psychiatric disorders. 2:1 - Ahcène Bounceur:
From smart-city and IoT simulation to big data generation. 3:1 - Kai-Chi Chang, Raylin Tso, Min-Chun Tsai:
IoT sandbox: to analysis IoT malware Zollard. 4:1-4:8 - Gabriella Colajanni, Patrizia Daniele:
A cloud computing network and an optimization algorithm for IaaS providers. 5:1-5:8 - Carlos Henrique Gomes Ferreira, Júlio Cezar Estrella, Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura
, Rafael Mira De Oliveira Libardi, Bruno G. Batista, Maycon L. M. Peixoto
, Dionisio Machado Leite Filho, Stephan Reiff-Marganiec
:
A low cost workload generation approach through the cloud for capacity planning in service-oriented systems. 6:1-6:8 - Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:
Harnessing the power of blockchain technology to solve IoT security & privacy issues. 7:1-7:10 - El Miloud Ar-reyouchi
, Maria Hammouti, Imane Maslouhi, Kamal Ghoumid:
The internet of things: network delay improvement using network coding. 8:1-8:7 - Lok Li Ching, Nurul Hashimah Ahamed Hassain Malim
, Mohd Heikal Husin
, Manmeet Mahinderjit Singh
:
Smart university: reservation system with contactless technology. 9:1-9:6 - Roberto Bruschi
, Franco Davoli
, Laura Galluccio, Paolo Lago, Alfio Lombardo
, Chiara Lombardo, Corrado Rametta, Giovanni Schembra:
Virtualization of set-top-box devices in next generation SDN-NFV networks: the input project perspective. 10:1-10:8 - Mohammed Basingab, Luis Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez
, Won II Jung:
Business modeling based on internet of things: a case study of predictive maintenance software using ABS model. 11:1-11:5 - Marius Kahlert, Efthymios Constantinides
, S. A. de Vries:
The relevance of technological autonomy in the customer acceptance of IoT services in retail. 12:1-12:7 - K. Brindha, N. Jeyanthi:
A novel approach to secure cloud data storage and dynamic data auditing in a cloud. 13:1-13:5 - Sreeja M, Sreeram M:
Bluetooth 5 beacons: a novel design for indoor positioning. 14:1-14:6 - Martin Randles
, Princy Johnson, Abir Hussain:
Internet of things eco-systems: assured interactivity of devices and data through cloud based team work. 15:1-15:9 - Kapil Kanwal, Ghazanfar Ali Safdar:
Growing green with improved profit through reduced power consumption in LTE networks. 16:1-16:6 - Chaimae Saadi
, Habiba Chaoui
:
A new approach to mitigate security threats in cloud environment. 17:1-17:7 - Habiba Chaoui
, Ibtissam Makdoun:
A new secure model for the use of cloud computing in big data analytics. 18:1-18:11 - Steffen Thielemans
, Maite Bezunartea, Abdellah Touhafi
, Kris Steenhaut
:
An open-source PLC stack for simplified and cost-effective deployment of smart systems. 19:1-19:6 - B. Prabadevi
, N. Jeyanthi:
A mitigation system for ARP cache poisoning attacks. 20:1-20:7 - Reham Alabduljabbar, Hmood Al-Dossari:
Towards a classification model for tasks in crowdsourcing. 23:1-23:7 - Gregory Tsipenyuk, Jon Crowcroft:
My home is my post-office: evaluation of a decentralized email architecture on internet-of-things low-end device. 25:1-25:8 - Delong Cui, Zhiping Peng, Wende Ke, Qirui Li, Jinglong Zuo, Jihai Zhong:
Workflow resources provisioning algorithm research. 26:1-26:5 - Dana I. Al-Maani, Hani Bani-Salameh:
A generic model for evaluating the usability of learning management systems. 27:1-27:5 - Wonjun Choi, Ramneek Seckhon, Woojin Seok:
Statistical transmission control based on confidence interval in high bandwidth network. 28:1-28:4 - Lamia Karim, Azedine Boulmakoul, Ahmed Lbath:
Real time analytics of urban congestion trajectories on hadoop-mongoDB cloud ecosystem. 29:1-29:11 - Fadi Al-Turjman:
Path finder for medical information couriers in the IoT era. 30:1-30:5 - Craig Henderson, Ebroul Izquierdo:
Scalable pattern retrieval from videos using a random forest index. 31:1-31:7 - Fadi Al-Turjman, Sinem Alturjman, Enver Ever:
Identification framework for smart environments in the era of cloud-IoT. 32:1-32:6 - Francesco Colace, Matteo Ferro
, Francesco Abate, Antonio Pietrosanto:
A multiservice network for gas and water meters management. 33:1-33:5 - Bin Sun, Dengyin Zhang:
A method for video shot boundary detection based on HSV color histogram and DPHA feature. 34:1-34:4 - Jesús A. Muñoz, Rodrigo Pérez:
Design of smart ships for the IoT. 35:1-35:7 - Ting Jin, Jian Wan, Huayou Si, Yajie Qi, Yongjian Ren:
Empirical research on distribution characteristics of online news comment. 36:1-36:5 - Badraddin Alturki
, Stephan Reiff-Marganiec
:
Towards an off-the-cloud IoT data processing architecture via a smart car parking example. 37:1-37:5 - Glenn Barrie, Andrew Whyte
, Joyce Bell:
IoT security: challenges and solutions for mining. 38:1-38:9 - George Kokkonis
, Sotirios Kontogiannis
, Dimitrios Tomtsis:
FITRA: a neuro-fuzzy computational algorithm approach based on an embedded water planting system. 39:1-39:8 - Maite Bezunartea, Mai Banh, Miguel Gamallo, Jacques Tiberghien, Kris Steenhaut
:
Impact of cross-layer interactions between radio duty cycling and routing on the efficiency of a wireless sensor network: a testbed study involving contikiMAC and RPL. 40:1-40:7 - Hassane Essafi, Patrick Hède:
FRAMSTIM: framework for large scale multimedia content feature extraction based on MPI one-sided communication. 41:1-41:6 - Tao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang:
Improved group management protocol of RFID password method. 42:1-42:4 - Stefano Tedeschi, Jörn Mehnen
, Rajkumar Roy
:
IoT security hardware framework for remote maintenance of legacy machine tools. 43:1-43:4 - Adnane Ghannem, Mohamed Salah Hamdi, Hany H. Ammar, Makram Soui
:
A systematic classification of requirements engineering approaches for adaptive systems. 44:1-44:9 - A. Casella, Alfio Lombardo
, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Giovanni Schembra, Alessandro Vassallo:
A cloud-based live streaming service for SDN-NFV enabled carriers. 45:1-45:7 - Julian Popp, Claudia Lex, Joerg Robert
, Albert Heuberger:
Simulating MTC data transmission in LTE. 46:1-46:8 - Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo:
Graphic model analysis of frauds in online consumer reviews. 47:1-47:7 - Sabah Al-Fedaghi:
Sets with members as machines with things that flow. 48:1-48:10 - Soha Rawas, Wassim Itani, Ahmed Sherif Zekri, Ali El Zaart
:
ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers. 49:1-49:7 - Mariya Ouaissa
, Abdallah Rhattoy, Mohammed Lahmer:
Group access authentication of machine to machine communications in LTE networks. 50:1-50:5 - Der-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu:
Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks. 51:1-51:8 - Ulysse Rugwiro
, Chunhua Gu:
Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers. 52:1-52:8 - Miran Boric, Ana Fernández Vilas
, Rebeca P. Díaz Redondo
:
BLE broadcasting impact in a real network environment. 53:1-53:6 - Fatemeh Cheraghchi, Arash Iranzad, Bijan Raahemi:
Subspace selection in high-dimensional big data using genetic algorithm in apache spark. 54:1-54:7 - Ezgi Ucar:
Eclipse: a wearable instrument for performance based storytelling. 55:1-55:4 - Hasni Hassan, Mohd Isa Awang, Mokhairi Makhtar, Aznida Hayati Zakaria, Rohana Ismail, Fadhilah Ahmad:
Algorithms for extracting adjacency matrix based on formal concept analysis (FCA). 56:1-56:6 - Arseni Anisimovich, Michele Sama, Theodosia Togia:
The pitfall of using question detection as a proxy for action inference in natural text conversations: a position paper. 57:1-57:4 - Nandita Sengupta:
Designing encryption and IDS for cloud security. 58:1-58:5 - Eric Mayeul O. Fafolahan, Samuel Pierre:
Local anchor based architecture for mobility support in identificator locator split networks. 59:1-59:7 - Kenneth Hoelscher, Lucas Allgood, Changyong (Andrew) Jung, Suk-Jin Lee
:
Direct autolink. 60:1-60:4 - Raj Kumari, Sakshi Kaushal:
Energy efficient approach for application execution in mobile cloud IoT environment. 61:1-61:8 - Dongming Chen, Wei Zhao, Xinyu Huang, Dongqi Wang, Yanbin Yan:
Centrality-based bipartite local community detection algorithm. 62:1-62:8 - Lucile Sassatelli, Muriel Médard:
Thwarting pollution attacks in network coding for delay tolerant mobile social networks. 63:1-63:7 - Martin Lehmann, Frode Eika Sandnes:
A framework for evaluating continuous microservice delivery strategies. 64:1-64:9 - Breno Fabrício Lira Melo Sousa
, Zair Abdelouahab, Denivaldo Cicero Pavão Lopes, Natalia Costa Soeiro, Willian França Ribeiro:
An intrusion detection system for denial of service attack detection in internet of things. 65:1-65:8 - Nikhil Kurian Jacob:
IoT powered portable aquaponics system. 66:1-66:5 - Aamna Iqtidar, Abdul Wahab Muzaffar
, Usman Qamar
, Saad Rehman:
A biomedical ontology on genetic disease. 67:1-67:6 - Rosida Ab Razak, Mohamad Shanudin Zakaria
:
The information and communication technology governance maturity level for malaysian public sector. 68:1-68:8 - Aytug Onan
:
A machine learning based approach to identify geo-location of Twitter users. 69:1-69:6 - Essam H. Houssein
, Aboul Ella Hassanien, Alaa A. K. Ismaeel
:
EEG signals classification for epileptic detection: a review. 70:1-70:9 - Wong Siaw Ling, Boon Yaik Ooi
, Soung-Yue Liew:
A novel data reduction technique with fault-tolerance for internet-of-things. 71:1-71:7 - Rahim Rahmani
, Yuhong Li, Karl Eberg, Marcus Stvelind 3rd:
Mobile blue gateway an application for multicasting data to populations of bluetooth low energy sensors for smart community sensing. 72:1-72:4 - Siti Salmah Md. Kassim, Mazleena Salleh, Anazida Zainal, Abd Razak Che Husin:
Risk tolerance and trust issues in cloud-based E-learning. 73:1-73:11 - M. A. López Vega, S. Couturier:
Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imagery. 74:1-74:4 - Ashraf S. Hussein, Hamayun A. Khan:
Students' performance tracking in distributed open education using big data analytics. 75:1-75:8 - Manzoor Elahi
, Shahid Khan, Hazrat Ali
, Sikandar Khan, Irfanullah:
Design of multi-band antenna for LTE and WiMAX applications using step-shaped drivers with the truncated ground plane. 76:1-76:4 - Eiman Al Nuaimi, Noura Al Darmaki:
Managing QoS in IoTs: a survey. 77:1-77:7 - Jianwei He, Dexian Zhang:
A structure of intelligent grain network information platform based on cloud computing. 78:1-78:5 - Shaik Asif Hussain
, Haitham Mohammed, Shaik Javeed Hussain
:
Detection of brain activity with an automated system hardware for accurate diagnostic of mental disorders. 79:1-79:6 - Francesco Colace
, Massimo De Santo, Saverio Lemma, Marco Lombardi
:
An adaptive app for tourist contents contextualization. 80:1-80:10 - A. Bagley, Gerhard Fehringer, Nanlin Jin
, Steve Cammish:
Live video transmission over data distribution service with existing low-power platforms. 81:1-81:5 - Farzad Firozbakht, Waeal J. Obidallah
, Bijan Raahemi:
Cloud computing service discovery framework for IaaS and PaaS models. 82:1-82:6 - Younis A. Younis, Kashif Kifayat
, Abir Hussain:
Preventing and detecting cache side-channel attacks in cloud computing. 83:1-83:8 - Mahmoud El Hendy
, Sami Miniaoui
, Shadi Atalla
, Kamarul Faizal Bin Hashim
:
A survey on smart city technologies, initiatives and global technology providers. 84:1-84:7 - Awais Usman, Peilin Zhang, Oliver E. Theel:
An efficient and updatable item-to-item frequency matrix for frequent itemset generation. 85:1-85:6 - Beh Choon Yeong, Nurul Hashimah Ahamed Hassain Malim, Hassain Malim, Manmeet Mahinderjit Singh
:
NFC-based waste management tracking and monitoring system. 86:1-86:5 - Debanshee Saha, Manasi Shinde, Shail Thadeshwar:
IoT based air quality monitoring system using wireless sensors deployed in public bus services. 87:1-87:6 - Tiago M. Ribeiro, V. Leonardo Paucar
:
Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm. 88:1-88:5 - Mariam Benmoussa, Mariyam Ouaissa
, Mohammed Lahmer, Idriss Chana
, Abdallah Rhattoy:
QoS analysis of hierarchical routing protocols for wireless sensor networks. 89:1-89:6 - R. Udendhran:
A hybrid approach to enhance data security in cloud storage. 90:1-90:6 - Dileep Reddy Bolla, M. N. Thippeswamy
, Fambirai Takawira:
A survey on various routing protocols in cognitive radio networks. 91:1-91:7 - Naeem A. Nawaz
, Ahmad Waqas
, Zulkefli Muhammed Yusof, Asadullah Shah
:
A framework for smart estimation of demand-supply for crowdsource management using WSN. 92:1-92:5 - Satyasrikanth Palle, M. N. Thippeswamy
, Fambirai Takawira:
Survey on call admission control protocols in cellular networks. 93:1-93:7 - Ejaz Farooq, Shoab Ahmad Khan, Wasi Haider Butt
:
Covert network analysis to detect key players using correlation and social network analysis. 94:1-94:6 - P. L. Valliammai, Kirupa Ganapathy:
Missing plane identification using doppler effect and distance method in satellite communication. 95:1-95:6 - Peng Li, Huayi Fang, Xiang Liu, Baijian Yang
:
A countermeasure against relay attack in NFC payment. 96:1-96:5 - Siddharth Gupta, Sahithya Kodam, Baijian Yang
:
Multichannel key exchange. 97:1-97:5 - Débora Stefanello, Denivaldo Lopes
:
A framework for supporting the context-aware mobile application development process. 98:1-98:8 - Mohammad Soruri, Javad Sadri, Seyed Hamid Zahiri:
Hidden markov model optimized by PSO algorithm for gene sequence clustering. 99:1-99:6 - Venkatesh
, Poornima M. R., K. R. Venugopal, S. S. Iyengar
, L. M. Patnaik:
LR3: link reliable reactive routing protocol for wireless sensor networks. 100:1-100:8 - Shilun Lin, Zhicheng Zhao, Fei Su:
Clustering lightened deep representation for large scale face identification. 101:1-101:5 - Yang Zhang, Junliang Chen:
Modeling virtual channel to enforce runtime properties for IoT services. 102:1-102:17 - Kashif Sultan, Hazrat Ali
:
Where big data meets 5G? 103:1-103:4 - Keltoum Bendiab, Samia Boucherkha:
A dynamic federated identity management approach for cloud-based environments. 104:1-104:5 - Fotios Nikolopoulos
, Spiridon D. Likothanassis:
Using UTAUT2 for cloud computing technology acceptance modeling. 105:1-105:6 - Syed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer III:
Security evaluation of cloud service providers using third party auditors. 106:1-106:6 - Martin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Yi Shyh Eddy Foo
, Kevin Aditya, Sebastian Mosbach, Iftekhar A. Karimi, Raymond Lau, Markus Kraft
:
J-park simulator: roadmap to smart eco-industrial parks. 107:1-107:10 - Fawaz D. Alharbi
, Anthony S. Atkins, Clare Stanier:
Cloud computing adoption readiness assessment in saudi healthcare organisations: a strategic view. 108:1-108:8 - Alberto Polzonetti, Alessandro Bettacchi:
Cloud services implementing security: a case study. 109:1-109:6 - Galyna Chornous
, Iuliia Iarmolenko:
Decision support system for predicting stock prices based on sentiments in social media. 110:1-110:4 - Said Charfi, Mohamed El Ansari:
Gastrointestinal tract bleeding detection from wireless capsule endoscopy videos. 111:1-111:5 - Samira Al Marzooqi, Eiman Al Nuaimi, Nabeel A. Y. Al-Qirim:
E-governance (G2C) in the public sector: citizens acceptance to E-government systems - Dubai's case. 112:1-112:11 - S. Rao Chintalapudi, Munaga H. M. Krishna Prasad:
Network entropy based overlapping community detection in social networks. 113:1-113:4 - Anne-Sophie Brylinski, Aniruddha Bhattacharjya
:
Overview of HTTP/2. 114:1-114:6 - Abhinav Choudhury, Shruti Kaushik
, Varun Dutt
:
Data-mining medications for pain: analyzing adoption behavior of physicians and switching behavior of patients. 115:1-115:8 - Ta-Te Lu, Y. J. Liu, J. J. Ciou, C. H. Lu:
Feature selection difference matching method for indoor positioning. 116:1-116:5 - Asif Qumer Gill
, Vahid Behbood, Rania Ramadan-Jradi, Ghassan Beydoun
:
IoT architectural concerns: a systematic review. 117:1-117:9 - Mohammed Sharfuddin, T. Ragunathan:
Replication algorithm based on confidence measure for cloud storage systems. 118:1-118:6 - A. H. Cloete, Marthinus J. Booysen
, R. C. Sandell, A. B. van der Merwe:
Smart electric water heaters: a system architecture proposal for scalable IoT. 119:1-119:7 - Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir
:
Cloud security certifications: a comparison to improve cloud service provider security. 120:1-120:12 - Nurul Huda Nik Zulkipli, Gary B. Wills:
An event-based access control for IoT. 121:1-121:4 - Ehizojie Ojie, Ella Pereira
:
Exploring dependability issues in IoT applications. 123:1-123:5 - Tasnia Heya Ashrafi, Sayed Erfan Arefin
, Kowshik Dipta Jay Das, Md. Arshad Hossain, Amitabha Chakrabarty
:
FOG based distributed IoT infrastructure. 124:1-124:13 - Mengya Cai, Y. Lin, C. L. Liu, C. L. Ji, Wen-Jun Zhang
:
A maximum agreement approach to information fusion. 125:1-125:4 - Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman:
Securing the mobile environment: firewall anti-leak of sensitive data on smartphone. 126:1-126:6 - Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar:
A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs. 127:1-127:6 - Almokhtar Ait El Mrabti, Najim Ammari, Anas Abou El Kalam
, Abdellah Ait Ouahman, Mina De Montfort:
Mobile app security by fragmentation "MASF". 128:1-128:6 - B. Benamrouche, Daniela Dragomirescu
:
Energy efficient IR-UWB transceiver for autonomous wireless sensor network. 129:1-129:4 - Fiammetta Marulli
, Luca Vallifuoco:
Internet of things for driving human-like interactions: a case study for cultural smart environment. 130:1-130:9 - Hadi Zahmatkesh, Enver Ever
, Fadi Al-Turjman
, Mustafa Riza
:
A framework for energy-consumption in future hetnets: towards green smart-cities. 131:1-131:6 - Imran Ahsan, Wasi Haider Butt
, Mudassar Adeel Ahmed, Muhammad Waseem Anwar
:
A comprehensive investigation of natural language processing techniques and tools to generate automated test cases. 132:1-132:10 - Leila Bayoudhi
, Najla Sassi, Wassim Jaziri:
Overview and reflexion on OWL 2 DL ontology consistency rules. 133:1-133:8 - Hamza Aagela, Violeta Holmes
, Mahmoud Dhimish, David Wilson
:
Impact of video streaming quality on bandwidth in humanoid robot NAO connected to the cloud. 134:1-134:8 - Gabriele Baldoni, Alfio Lombardo
, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Alessandro Vassallo:
An emulation framework for SDN-NFV based services. 135:1-135:8 - Alaa Ahmed Abbas Al-abayechi, Hamid Abdullah Jalab, Rabha W. Ibrahim:
A classification of skin lesion using fractional poisson for texture feature extraction. 136:1-136:7 - Abdul Wahab Muzaffar
, Shumyla Rasheed Mir
, Muhammad Waseem Anwar
, Adeela Ashraf:
Application of model driven engineering in cloud computing: a systematic literature review. 137:1-137:6 - Ali M. Hasan
, Farid Meziane
, Rob Aspin
, Hamid Abdullah Jalab:
MRI brain scan classification using novel 3-D statistical features. 138:1-138:5 - Haoua Cheribi, Noureddine Amraoui, Abdelkrim Bouramoul
, Mohamed-Khireddine Kholladi
:
Context-awareness security model based on multi-agents system operating in complex environment. 139:1-139:8 - Zahra Moghaddasi, Hamid Abdullah Jalab, Rafidah Md Noor
:
Image splicing detection using singular value decomposition. 140:1-140:5 - Hoda Ahmed Galal Elsayed, Liyakathunisa Syed
:
An automatic early risk classification of hard coronary heart diseases using framingham scoring model. 141:1-141:8 - Jacqueline Stewart, Robert Stewart, Sean Kennedy:
Dynamic IoT management system using K-means machine learning for precision agriculture applications. 142:1-142:8 - Abeer Nafel Alharbi, Hessah Alnamlah, Liyakathunsia Syed
:
Using opinion mining techniques on Twitter streaming data regards drug safety issues. 143:1-143:5 - Lujain AlThunayan, Nahed AlSahdi, Liyakathunisa Syed
:
Comparative analysis of different classification algorithms for prediction of diabetes disease. 144:1-144:6 - Aqeel-ur Rehman, Iqbal Uddin Khan, S. M. Kashif Alam, Ahmar Murtaza:
Bio-inspired energy harvesting in WSN: a survey. 145:1-145:9 - Ali A. Al-Jadaa, Abdallatif S. Abu-Issa, Wasel T. Ghanem
, Mohammed S. Hussein:
Enhancing the intelligence of web tutoring systems using a multi-entry based open learner model. 146:1-146:5 - Nachiket Tapas
, O. P. Vyas:
IoT deployment for smarter cities with special reference to mobility. 147:1-147:4 - Ismail Ahmed Al-Qasem Al-Hadi, Nurfadhlina Mohd Sharef
, Md Nasir Sulaiman, Norwati Mustapha:
Bacterial foraging optimization algorithm with temporal features to solve data sparsity in recommendation system. 148:1-148:6 - Bin Xiao, Rahim Rahmani
:
A deep relation learning method for IoT interoperability enhancement within semantic formalization framework. 149:1-149:8 - Sarah A. S. Alkhudair, Alaa E. S. Ahmed:
Modeling the effect of data aggregation on the performance of wireless sensor network using colored petri nets. 150:1-150:6 - Majid Al-Ruithe, Elhadj Benkhelifa
:
Cloud data governance maturity model. 151:1-151:10 - Dabiah Ahmed Alboaneen
, Huaglory Tianfield
, Yan Zhang:
Glowworm swarm optimisation based task scheduling for cloud computing. 152:1-152:7 - Ousmane Dieng
, Babacar Diop, Ousmane Thiare
, Congduc Pham:
A study on IoT solutions for preventing cattle rustling in african context. 153:1-153:11 - Vandna Shah:
A robust and efficient approach for image denoising and brain region extraction to aid neurology system of patient. 154:1-154:6 - Gambhire Swati Sampatrao, Sudeepa Roy Dey, Bidisha Goswami, Sai Prasanna M. S, Snehanshu Saha
:
A study of revenue cost dynamics in large data centers: a factorial design approach. 155:1-155:14 - Waeal J. Obidallah
, Bijan Raahemi:
A survey on web service discovery approaches. 156:1-156:8 - T. P. Shabeera, S. D. Madhu Kumar
:
A heuristic based algorithm for distance-aware virtual machine allocation in cloud. 157:1-157:5 - Tahani Aladwani:
Impact of tasks classification and virtual machines categorization on tasks scheduling algorithms in cloud computing. 158:1-158:7 - Madjid Kara, Olfa Lamouchi, Amar Ramdane-Cherif:
Semantically equivalent model for quality evaluation. 159:1-159:5 - Awatif Ragmani
, Amina El Omri
, Noreddine Abghour
, Khalid Moussaid
, Mohamed Rida
:
An efficient load balancing strategy based on mapreduce for public cloud. 160:1-160:10 - Abobakr Y. Shahrah, Majed A. Al-Mashari:
Emergency response systems: research directions and current challenges. 161:1-161:6 - Sabah Al-Fedaghi, Sari Sultan:
Flow machine diagrams for VHDL code. 162:1-162:6 - Ahmed Salim Alrawahi
, Kevin Lee
, Ahmad Lotfi
:
Trading of cloud of things resources. 163:1-163:7 - MirMuhammad Lodro
, Muhammad Younis Lodro, Nahdia Majeed Lodro, Tariq Jameel Khanzada, Steve Greedy:
Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networks. 164:1-164:4 - Mahmoud S. Fayed, Muhammad Al-Qurishi, Atif Alamri, Ahmad A. Al-Daraiseh
:
PWCT: visual language for IoT and cloud computing applications and systems. 165:1-165:5 - S. A. Abdul Shukor, M. Q. Aminuddin, Emma J. Rushforth:
Managing huge point cloud data through geometrical-based registration. 166:1-166:6 - Amina Harit, Abdellah Ezzati
, Rachid Elharti:
Internet of things security: challenges and perspectives. 167:1-167:8 - Mohammed Ahmed Taiye, Siti Sakira Kamaruddin
, Farzana Kabir Ahmad
:
Combined WSD algorithms with LSA to identify semantic similarity in unstructured textual data. 168:1-168:5 - Sherimon Puliprathu Cherian, Vinu Sherimon
:
A proposed onto-Apriori algorithm to mine frequent patterns of high quality seafood. 169:1-169:6 - Preeti Khanna
, Ashu Sharma:
Integrating SCM with internet of things: implication on HR management. 170:1-170:13 - Ruhma Tahir, Hasan Tahir, Ali Sajjad, Klaus D. McDonald-Maier
:
A secure cloud framework for ICMetric based IoT health devices. 171:1-171:10 - Bashar Ahmed Alohali, Vassilios G. Vassilakis:
Security of wireless sensor network (WSN) in smart grid. 172:1-172:6 - Nouha Arfaoui, Jalel Akaichi
:
Vehicle trajectory data warehouse: point of interest and time interval of interest. 173:1-173:6 - Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder, Seth Marasco:
Protecting an automobile network using distributed firewall system. 174:1-174:6 - Al Tariq Sheik, Carsten Maple, Tim Watson, Hussam Alhagagi, Nader Sohrabi Safa
, Sang Woo Lee:
A threat based approach to computational offloading for collaborative cruise control. 175:1-175:9 - Jeethu V. Devasia
, Priya Chandran
, Garge Shreya, Aparna R., Abijith R.:
On parallelizing graph theoretical approaches for identifying causal genes and pathways from very large biological networks. 176:1-176:6 - Jairo Alejandro Gomez
, Jesus Talavera, Luis Eduardo Tobon, Maria Alejandra Culman, Luis Alfredo Quiroz, Juan Manuel Aranda
, Luis Ernesto Garreta:
A case study on monitoring and geolocation of noise in urban environments using the internet of things. 177:1-177:6 - Md. Fasiul Alam, Stathes Hadjiefthymiades:
Advanced, hardware supported in-network processing for the internet of things. 178:1-178:7 - S. Abraham, N. Weller:
Next generation traffic event detection: a framework based on internet of vehicles (IoV). 179:1-179:3 - Augustus Ehiremen Ibhaze
, Moses U. Akpabio, Samuel N. John
:
A review on smart grid network security issues over 6LoWPAN. 180:1-180:5 - Uchechukwu Awada
, Adam Barker:
Resource efficiency in container-instance clusters. 181:1-181:5 - Alfredo Cuzzocrea, Carmine De Napoli, Agostino Forestiero
, Demetrio Laganà, Giovanni Lupi, Carlo Mastroianni, Leonardo Spataro:
Business scenarios for hierarchical workload management in data centers. 182:1-182:7 - Ahmad Fadzil M. Hani, Irving Vitra Paputungan, Mohd Fadzil Hassan, Vijanth S. Asirvadam:
Manifold learning in SLA violation detection and prediction for cloud-based system. 183:1-183:5 - Binesh Jose
, S. D. Madhu Kumar
, Alfredo Cuzzocrea:
Enhancing contact center performance using cloud computing: a case study on telecom contact centers. 184:1-184:8 - Khaled M. Khan
, Mahboob Shaheen, Yongge Wang
:
Data confidentiality in cloud-based pervasive system. 185:1-185:6 - A. H. Azni
, Abdul Fuad Abdul Rahman, Najwa Hayaati Mohd Alwi
, Kamaruzzaman Seman:
Measuring sensor to cloud energy consumption. 186:1-186:6 - Hesham H. Aly
, Abdel Hamid Soliman
, Mansour Mouniri:
Analogue to information converter design using analogue chua circuit for IoT devices. 187:1-187:5 - Higo Pires, Zair Abdelouahab, Denivaldo Lopes
, Mário Santos:
A framework for agent-based intrusion detection in wireless sensor networks. 188:1-188:7 - Qingwu Li, Wenqing Zhu, Mei Cao:
Underwater color image enhancement using improved multi-scale retinex and histogram linear quantification. 189:1-189:11 - Naushin Nower, Sakhawat Hossan
:
Efficient dynamic traffic light control for ITS. 190:1-190:7 - Simon Parkinson
, Yongrui Qin, Saad Khan
, Mauro Vallati
:
Security auditing in the fog. 191:1-191:9 - A. A. Thulnoon, Brett Lempereur, Qi Shi, Dhiya Al-Jumeily
:
Using aspect oriented programming to enforce privacy preserving communication in distributed systems. 192:1-192:8 - Phillip Kendrick, Abir Hussain, Natalia Criado
, Martin Randles
:
Multi-agent systems for scalable internet of things security. 193:1-193:6 - Mustapha Belouch, Salah el hadaj:
Comparison of ensemble learning methods applied to network intrusion detection. 194:1-194:4 - Nikolaos Tantouris, Despoina Polemi, Kleanthis Dellios:
On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machines. 195:1-195:7 - Lasbahani Abdellatif, Mostafa Chhiba, Oussama Mjihil:
Deals with integrating of security specifications during software design phase using MDA approach. 196:1-196:7 - Zongyi Liu, Daniela Dragomirescu
, Georges Da Costa, Thierry Monteil:
A stack cross-layer analytical model for CSMA/CA IEEE 802.15.4 networks. 197:1-197:7 - Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh
, Rahim Kacimi, Sanaa Kawther Ghalem
:
Distributed faulty sensor node detection in wireless sensor networks based on copula theory. 198:1-198:8 - Sanaa Kawther Ghalem
, Kechar Bouabdellah, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh
, Farid Lalem:
A copula based approach for measurement validity verification in wireless sensor networks. 199:1-199:6 - Shashidhar H. R, G. T. Raju, Vinayaka Murthy:
Selectivity estimation in web query optimization. 200:1-200:6 - Yvo Desmedt:
"Need to know" to defend one's home, or should one buy a wifi enabled thermostat? 201:1-201:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.