default search action
ICC 2017: Cambridge, UK
- Hani Hamdan, Djallel Eddine Boubiche, Homero Toral-Cruz, Sedat Akleylek, Hamid Mcheick:
Proceedings of the Second International Conference on Internet of things and Cloud Computing, ICC 2017, Cambridge, United Kingdom, March 22-23, 2017. ACM 2017 - Abir Hussain:
Machine learning approaches for extracting genetic medical data information. 1:1 - Hojjat Adeli:
Data mining for automated diagnosis of neurological and psychiatric disorders. 2:1 - Ahcène Bounceur:
From smart-city and IoT simulation to big data generation. 3:1 - Kai-Chi Chang, Raylin Tso, Min-Chun Tsai:
IoT sandbox: to analysis IoT malware Zollard. 4:1-4:8 - Gabriella Colajanni, Patrizia Daniele:
A cloud computing network and an optimization algorithm for IaaS providers. 5:1-5:8 - Carlos Henrique Gomes Ferreira, Júlio Cezar Estrella, Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura, Rafael Mira De Oliveira Libardi, Bruno G. Batista, Maycon L. M. Peixoto, Dionisio Machado Leite Filho, Stephan Reiff-Marganiec:
A low cost workload generation approach through the cloud for capacity planning in service-oriented systems. 6:1-6:8 - Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:
Harnessing the power of blockchain technology to solve IoT security & privacy issues. 7:1-7:10 - El Miloud Ar-reyouchi, Maria Hammouti, Imane Maslouhi, Kamal Ghoumid:
The internet of things: network delay improvement using network coding. 8:1-8:7 - Lok Li Ching, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin, Manmeet Mahinderjit Singh:
Smart university: reservation system with contactless technology. 9:1-9:6 - Roberto Bruschi, Franco Davoli, Laura Galluccio, Paolo Lago, Alfio Lombardo, Chiara Lombardo, Corrado Rametta, Giovanni Schembra:
Virtualization of set-top-box devices in next generation SDN-NFV networks: the input project perspective. 10:1-10:8 - Mohammed Basingab, Luis Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez, Won II Jung:
Business modeling based on internet of things: a case study of predictive maintenance software using ABS model. 11:1-11:5 - Marius Kahlert, Efthymios Constantinides, S. A. de Vries:
The relevance of technological autonomy in the customer acceptance of IoT services in retail. 12:1-12:7 - K. Brindha, N. Jeyanthi:
A novel approach to secure cloud data storage and dynamic data auditing in a cloud. 13:1-13:5 - Sreeja M, Sreeram M:
Bluetooth 5 beacons: a novel design for indoor positioning. 14:1-14:6 - Martin Randles, Princy Johnson, Abir Hussain:
Internet of things eco-systems: assured interactivity of devices and data through cloud based team work. 15:1-15:9 - Kapil Kanwal, Ghazanfar Ali Safdar:
Growing green with improved profit through reduced power consumption in LTE networks. 16:1-16:6 - Chaimae Saadi, Habiba Chaoui:
A new approach to mitigate security threats in cloud environment. 17:1-17:7 - Habiba Chaoui, Ibtissam Makdoun:
A new secure model for the use of cloud computing in big data analytics. 18:1-18:11 - Steffen Thielemans, Maite Bezunartea, Abdellah Touhafi, Kris Steenhaut:
An open-source PLC stack for simplified and cost-effective deployment of smart systems. 19:1-19:6 - B. Prabadevi, N. Jeyanthi:
A mitigation system for ARP cache poisoning attacks. 20:1-20:7 - Reham Alabduljabbar, Hmood Al-Dossari:
Towards a classification model for tasks in crowdsourcing. 23:1-23:7 - Gregory Tsipenyuk, Jon Crowcroft:
My home is my post-office: evaluation of a decentralized email architecture on internet-of-things low-end device. 25:1-25:8 - Delong Cui, Zhiping Peng, Wende Ke, Qirui Li, Jinglong Zuo, Jihai Zhong:
Workflow resources provisioning algorithm research. 26:1-26:5 - Dana I. Al-Maani, Hani Bani-Salameh:
A generic model for evaluating the usability of learning management systems. 27:1-27:5 - Wonjun Choi, Ramneek Seckhon, Woojin Seok:
Statistical transmission control based on confidence interval in high bandwidth network. 28:1-28:4 - Lamia Karim, Azedine Boulmakoul, Ahmed Lbath:
Real time analytics of urban congestion trajectories on hadoop-mongoDB cloud ecosystem. 29:1-29:11 - Fadi Al-Turjman:
Path finder for medical information couriers in the IoT era. 30:1-30:5 - Craig Henderson, Ebroul Izquierdo:
Scalable pattern retrieval from videos using a random forest index. 31:1-31:7 - Fadi Al-Turjman, Sinem Alturjman, Enver Ever:
Identification framework for smart environments in the era of cloud-IoT. 32:1-32:6 - Francesco Colace, Matteo Ferro, Francesco Abate, Antonio Pietrosanto:
A multiservice network for gas and water meters management. 33:1-33:5 - Bin Sun, Dengyin Zhang:
A method for video shot boundary detection based on HSV color histogram and DPHA feature. 34:1-34:4 - Jesús A. Muñoz, Rodrigo Pérez:
Design of smart ships for the IoT. 35:1-35:7 - Ting Jin, Jian Wan, Huayou Si, Yajie Qi, Yongjian Ren:
Empirical research on distribution characteristics of online news comment. 36:1-36:5 - Badraddin Alturki, Stephan Reiff-Marganiec:
Towards an off-the-cloud IoT data processing architecture via a smart car parking example. 37:1-37:5 - Glenn Barrie, Andrew Whyte, Joyce Bell:
IoT security: challenges and solutions for mining. 38:1-38:9 - George Kokkonis, Sotirios Kontogiannis, Dimitrios Tomtsis:
FITRA: a neuro-fuzzy computational algorithm approach based on an embedded water planting system. 39:1-39:8 - Maite Bezunartea, Mai Banh, Miguel Gamallo, Jacques Tiberghien, Kris Steenhaut:
Impact of cross-layer interactions between radio duty cycling and routing on the efficiency of a wireless sensor network: a testbed study involving contikiMAC and RPL. 40:1-40:7 - Hassane Essafi, Patrick Hède:
FRAMSTIM: framework for large scale multimedia content feature extraction based on MPI one-sided communication. 41:1-41:6 - Tao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang:
Improved group management protocol of RFID password method. 42:1-42:4 - Stefano Tedeschi, Jörn Mehnen, Rajkumar Roy:
IoT security hardware framework for remote maintenance of legacy machine tools. 43:1-43:4 - Adnane Ghannem, Mohamed Salah Hamdi, Hany H. Ammar, Makram Soui:
A systematic classification of requirements engineering approaches for adaptive systems. 44:1-44:9 - A. Casella, Alfio Lombardo, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Giovanni Schembra, Alessandro Vassallo:
A cloud-based live streaming service for SDN-NFV enabled carriers. 45:1-45:7 - Julian Popp, Claudia Lex, Joerg Robert, Albert Heuberger:
Simulating MTC data transmission in LTE. 46:1-46:8 - Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo:
Graphic model analysis of frauds in online consumer reviews. 47:1-47:7 - Sabah Al-Fedaghi:
Sets with members as machines with things that flow. 48:1-48:10 - Soha Rawas, Wassim Itani, Ahmed Sherif Zekri, Ali El Zaart:
ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers. 49:1-49:7 - Mariya Ouaissa, Abdallah Rhattoy, Mohammed Lahmer:
Group access authentication of machine to machine communications in LTE networks. 50:1-50:5 - Der-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu:
Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks. 51:1-51:8 - Ulysse Rugwiro, Chunhua Gu:
Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers. 52:1-52:8 - Miran Boric, Ana Fernández Vilas, Rebeca P. Díaz Redondo:
BLE broadcasting impact in a real network environment. 53:1-53:6 - Fatemeh Cheraghchi, Arash Iranzad, Bijan Raahemi:
Subspace selection in high-dimensional big data using genetic algorithm in apache spark. 54:1-54:7 - Ezgi Ucar:
Eclipse: a wearable instrument for performance based storytelling. 55:1-55:4 - Hasni Hassan, Mohd Isa Awang, Mokhairi Makhtar, Aznida Hayati Zakaria, Rohana Ismail, Fadhilah Ahmad:
Algorithms for extracting adjacency matrix based on formal concept analysis (FCA). 56:1-56:6 - Arseni Anisimovich, Michele Sama, Theodosia Togia:
The pitfall of using question detection as a proxy for action inference in natural text conversations: a position paper. 57:1-57:4 - Nandita Sengupta:
Designing encryption and IDS for cloud security. 58:1-58:5 - Eric Mayeul O. Fafolahan, Samuel Pierre:
Local anchor based architecture for mobility support in identificator locator split networks. 59:1-59:7 - Kenneth Hoelscher, Lucas Allgood, Changyong (Andrew) Jung, Suk-Jin Lee:
Direct autolink. 60:1-60:4 - Raj Kumari, Sakshi Kaushal:
Energy efficient approach for application execution in mobile cloud IoT environment. 61:1-61:8 - Dongming Chen, Wei Zhao, Xinyu Huang, Dongqi Wang, Yanbin Yan:
Centrality-based bipartite local community detection algorithm. 62:1-62:8 - Lucile Sassatelli, Muriel Médard:
Thwarting pollution attacks in network coding for delay tolerant mobile social networks. 63:1-63:7 - Martin Lehmann, Frode Eika Sandnes:
A framework for evaluating continuous microservice delivery strategies. 64:1-64:9 - Breno Fabrício Lira Melo Sousa, Zair Abdelouahab, Denivaldo Cicero Pavão Lopes, Natalia Costa Soeiro, Willian França Ribeiro:
An intrusion detection system for denial of service attack detection in internet of things. 65:1-65:8 - Nikhil Kurian Jacob:
IoT powered portable aquaponics system. 66:1-66:5 - Aamna Iqtidar, Abdul Wahab Muzaffar, Usman Qamar, Saad Rehman:
A biomedical ontology on genetic disease. 67:1-67:6 - Rosida Ab Razak, Mohamad Shanudin Zakaria:
The information and communication technology governance maturity level for malaysian public sector. 68:1-68:8 - Aytug Onan:
A machine learning based approach to identify geo-location of Twitter users. 69:1-69:6 - Essam H. Houssein, Aboul Ella Hassanien, Alaa A. K. Ismaeel:
EEG signals classification for epileptic detection: a review. 70:1-70:9 - Wong Siaw Ling, Boon Yaik Ooi, Soung-Yue Liew:
A novel data reduction technique with fault-tolerance for internet-of-things. 71:1-71:7 - Rahim Rahmani, Yuhong Li, Karl Eberg, Marcus Stvelind 3rd:
Mobile blue gateway an application for multicasting data to populations of bluetooth low energy sensors for smart community sensing. 72:1-72:4 - Siti Salmah Md. Kassim, Mazleena Salleh, Anazida Zainal, Abd Razak Che Husin:
Risk tolerance and trust issues in cloud-based E-learning. 73:1-73:11 - M. A. López Vega, S. Couturier:
Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imagery. 74:1-74:4 - Ashraf S. Hussein, Hamayun A. Khan:
Students' performance tracking in distributed open education using big data analytics. 75:1-75:8 - Manzoor Elahi, Shahid Khan, Hazrat Ali, Sikandar Khan, Irfanullah:
Design of multi-band antenna for LTE and WiMAX applications using step-shaped drivers with the truncated ground plane. 76:1-76:4 - Eiman Al Nuaimi, Noura Al Darmaki:
Managing QoS in IoTs: a survey. 77:1-77:7 - Jianwei He, Dexian Zhang:
A structure of intelligent grain network information platform based on cloud computing. 78:1-78:5 - Shaik Asif Hussain, Haitham Mohammed, Shaik Javeed Hussain:
Detection of brain activity with an automated system hardware for accurate diagnostic of mental disorders. 79:1-79:6 - Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi:
An adaptive app for tourist contents contextualization. 80:1-80:10 - A. Bagley, Gerhard Fehringer, Nanlin Jin, Steve Cammish:
Live video transmission over data distribution service with existing low-power platforms. 81:1-81:5 - Farzad Firozbakht, Waeal J. Obidallah, Bijan Raahemi:
Cloud computing service discovery framework for IaaS and PaaS models. 82:1-82:6 - Younis A. Younis, Kashif Kifayat, Abir Hussain:
Preventing and detecting cache side-channel attacks in cloud computing. 83:1-83:8 - Mahmoud El Hendy, Sami Miniaoui, Shadi Atalla, Kamarul Faizal Bin Hashim:
A survey on smart city technologies, initiatives and global technology providers. 84:1-84:7 - Awais Usman, Peilin Zhang, Oliver E. Theel:
An efficient and updatable item-to-item frequency matrix for frequent itemset generation. 85:1-85:6 - Beh Choon Yeong, Nurul Hashimah Ahamed Hassain Malim, Hassain Malim, Manmeet Mahinderjit Singh:
NFC-based waste management tracking and monitoring system. 86:1-86:5 - Debanshee Saha, Manasi Shinde, Shail Thadeshwar:
IoT based air quality monitoring system using wireless sensors deployed in public bus services. 87:1-87:6 - Tiago M. Ribeiro, V. Leonardo Paucar:
Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm. 88:1-88:5 - Mariam Benmoussa, Mariyam Ouaissa, Mohammed Lahmer, Idriss Chana, Abdallah Rhattoy:
QoS analysis of hierarchical routing protocols for wireless sensor networks. 89:1-89:6 - R. Udendhran:
A hybrid approach to enhance data security in cloud storage. 90:1-90:6 - Dileep Reddy Bolla, M. N. Thippeswamy, Fambirai Takawira:
A survey on various routing protocols in cognitive radio networks. 91:1-91:7 - Naeem A. Nawaz, Ahmad Waqas, Zulkefli Muhammed Yusof, Asadullah Shah:
A framework for smart estimation of demand-supply for crowdsource management using WSN. 92:1-92:5 - Satyasrikanth Palle, M. N. Thippeswamy, Fambirai Takawira:
Survey on call admission control protocols in cellular networks. 93:1-93:7 - Ejaz Farooq, Shoab Ahmad Khan, Wasi Haider Butt:
Covert network analysis to detect key players using correlation and social network analysis. 94:1-94:6 - P. L. Valliammai, Kirupa Ganapathy:
Missing plane identification using doppler effect and distance method in satellite communication. 95:1-95:6 - Peng Li, Huayi Fang, Xiang Liu, Baijian Yang:
A countermeasure against relay attack in NFC payment. 96:1-96:5 - Siddharth Gupta, Sahithya Kodam, Baijian Yang:
Multichannel key exchange. 97:1-97:5 - Débora Stefanello, Denivaldo Lopes:
A framework for supporting the context-aware mobile application development process. 98:1-98:8 - Mohammad Soruri, Javad Sadri, Seyed Hamid Zahiri:
Hidden markov model optimized by PSO algorithm for gene sequence clustering. 99:1-99:6 - Venkatesh, Poornima M. R., K. R. Venugopal, S. S. Iyengar, L. M. Patnaik:
LR3: link reliable reactive routing protocol for wireless sensor networks. 100:1-100:8 - Shilun Lin, Zhicheng Zhao, Fei Su:
Clustering lightened deep representation for large scale face identification. 101:1-101:5 - Yang Zhang, Junliang Chen:
Modeling virtual channel to enforce runtime properties for IoT services. 102:1-102:17 - Kashif Sultan, Hazrat Ali:
Where big data meets 5G? 103:1-103:4 - Keltoum Bendiab, Samia Boucherkha:
A dynamic federated identity management approach for cloud-based environments. 104:1-104:5 - Fotios Nikolopoulos, Spiridon D. Likothanassis:
Using UTAUT2 for cloud computing technology acceptance modeling. 105:1-105:6 - Syed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer III:
Security evaluation of cloud service providers using third party auditors. 106:1-106:6 - Martin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Yi Shyh Eddy Foo, Kevin Aditya, Sebastian Mosbach, Iftekhar A. Karimi, Raymond Lau, Markus Kraft:
J-park simulator: roadmap to smart eco-industrial parks. 107:1-107:10 - Fawaz D. Alharbi, Anthony S. Atkins, Clare Stanier:
Cloud computing adoption readiness assessment in saudi healthcare organisations: a strategic view. 108:1-108:8 - Alberto Polzonetti, Alessandro Bettacchi:
Cloud services implementing security: a case study. 109:1-109:6 - Galyna Chornous, Iuliia Iarmolenko:
Decision support system for predicting stock prices based on sentiments in social media. 110:1-110:4 - Said Charfi, Mohamed El Ansari:
Gastrointestinal tract bleeding detection from wireless capsule endoscopy videos. 111:1-111:5 - Samira Al Marzooqi, Eiman Al Nuaimi, Nabeel A. Y. Al-Qirim:
E-governance (G2C) in the public sector: citizens acceptance to E-government systems - Dubai's case. 112:1-112:11 - S. Rao Chintalapudi, Munaga H. M. Krishna Prasad:
Network entropy based overlapping community detection in social networks. 113:1-113:4 - Anne-Sophie Brylinski, Aniruddha Bhattacharjya:
Overview of HTTP/2. 114:1-114:6 - Abhinav Choudhury, Shruti Kaushik, Varun Dutt:
Data-mining medications for pain: analyzing adoption behavior of physicians and switching behavior of patients. 115:1-115:8 - Ta-Te Lu, Y. J. Liu, J. J. Ciou, C. H. Lu:
Feature selection difference matching method for indoor positioning. 116:1-116:5 - Asif Qumer Gill, Vahid Behbood, Rania Ramadan-Jradi, Ghassan Beydoun:
IoT architectural concerns: a systematic review. 117:1-117:9 - Mohammed Sharfuddin, T. Ragunathan:
Replication algorithm based on confidence measure for cloud storage systems. 118:1-118:6 - A. H. Cloete, Marthinus J. Booysen, R. C. Sandell, A. B. van der Merwe:
Smart electric water heaters: a system architecture proposal for scalable IoT. 119:1-119:7 - Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. 120:1-120:12 - Nurul Huda Nik Zulkipli, Gary B. Wills:
An event-based access control for IoT. 121:1-121:4 - Ehizojie Ojie, Ella Pereira:
Exploring dependability issues in IoT applications. 123:1-123:5 - Tasnia Heya Ashrafi, Sayed Erfan Arefin, Kowshik Dipta Jay Das, Md. Arshad Hossain, Amitabha Chakrabarty:
FOG based distributed IoT infrastructure. 124:1-124:13 - Mengya Cai, Y. Lin, C. L. Liu, C. L. Ji, Wen-Jun Zhang:
A maximum agreement approach to information fusion. 125:1-125:4 - Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman:
Securing the mobile environment: firewall anti-leak of sensitive data on smartphone. 126:1-126:6 - Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar:
A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs. 127:1-127:6 - Almokhtar Ait El Mrabti, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort:
Mobile app security by fragmentation "MASF". 128:1-128:6 - B. Benamrouche, Daniela Dragomirescu:
Energy efficient IR-UWB transceiver for autonomous wireless sensor network. 129:1-129:4 - Fiammetta Marulli, Luca Vallifuoco:
Internet of things for driving human-like interactions: a case study for cultural smart environment. 130:1-130:9 - Hadi Zahmatkesh, Enver Ever, Fadi Al-Turjman, Mustafa Riza:
A framework for energy-consumption in future hetnets: towards green smart-cities. 131:1-131:6 - Imran Ahsan, Wasi Haider Butt, Mudassar Adeel Ahmed, Muhammad Waseem Anwar:
A comprehensive investigation of natural language processing techniques and tools to generate automated test cases. 132:1-132:10 - Leila Bayoudhi, Najla Sassi, Wassim Jaziri:
Overview and reflexion on OWL 2 DL ontology consistency rules. 133:1-133:8 - Hamza Aagela, Violeta Holmes, Mahmoud Dhimish, David Wilson:
Impact of video streaming quality on bandwidth in humanoid robot NAO connected to the cloud. 134:1-134:8 - Gabriele Baldoni, Alfio Lombardo, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Alessandro Vassallo:
An emulation framework for SDN-NFV based services. 135:1-135:8 - Alaa Ahmed Abbas Al-abayechi, Hamid Abdullah Jalab, Rabha W. Ibrahim:
A classification of skin lesion using fractional poisson for texture feature extraction. 136:1-136:7 - Abdul Wahab Muzaffar, Shumyla Rasheed Mir, Muhammad Waseem Anwar, Adeela Ashraf:
Application of model driven engineering in cloud computing: a systematic literature review. 137:1-137:6 - Ali M. Hasan, Farid Meziane, Rob Aspin, Hamid Abdullah Jalab:
MRI brain scan classification using novel 3-D statistical features. 138:1-138:5 - Haoua Cheribi, Noureddine Amraoui, Abdelkrim Bouramoul, Mohamed-Khireddine Kholladi:
Context-awareness security model based on multi-agents system operating in complex environment. 139:1-139:8 - Zahra Moghaddasi, Hamid Abdullah Jalab, Rafidah Md Noor:
Image splicing detection using singular value decomposition. 140:1-140:5 - Hoda Ahmed Galal Elsayed, Liyakathunisa Syed:
An automatic early risk classification of hard coronary heart diseases using framingham scoring model. 141:1-141:8 - Jacqueline Stewart, Robert Stewart, Sean Kennedy:
Dynamic IoT management system using K-means machine learning for precision agriculture applications. 142:1-142:8 - Abeer Nafel Alharbi, Hessah Alnamlah, Liyakathunsia Syed:
Using opinion mining techniques on Twitter streaming data regards drug safety issues. 143:1-143:5 - Lujain AlThunayan, Nahed AlSahdi, Liyakathunisa Syed:
Comparative analysis of different classification algorithms for prediction of diabetes disease. 144:1-144:6 - Aqeel-ur Rehman, Iqbal Uddin Khan, S. M. Kashif Alam, Ahmar Murtaza:
Bio-inspired energy harvesting in WSN: a survey. 145:1-145:9 - Ali A. Al-Jadaa, Abdallatif S. Abu-Issa, Wasel T. Ghanem, Mohammed S. Hussein:
Enhancing the intelligence of web tutoring systems using a multi-entry based open learner model. 146:1-146:5 - Nachiket Tapas, O. P. Vyas:
IoT deployment for smarter cities with special reference to mobility. 147:1-147:4 - Ismail Ahmed Al-Qasem Al-Hadi, Nurfadhlina Mohd Sharef, Md Nasir Sulaiman, Norwati Mustapha:
Bacterial foraging optimization algorithm with temporal features to solve data sparsity in recommendation system. 148:1-148:6 - Bin Xiao, Rahim Rahmani:
A deep relation learning method for IoT interoperability enhancement within semantic formalization framework. 149:1-149:8 - Sarah A. S. Alkhudair, Alaa E. S. Ahmed:
Modeling the effect of data aggregation on the performance of wireless sensor network using colored petri nets. 150:1-150:6 - Majid Al-Ruithe, Elhadj Benkhelifa:
Cloud data governance maturity model. 151:1-151:10 - Dabiah Ahmed Alboaneen, Huaglory Tianfield, Yan Zhang:
Glowworm swarm optimisation based task scheduling for cloud computing. 152:1-152:7 - Ousmane Dieng, Babacar Diop, Ousmane Thiare, Congduc Pham:
A study on IoT solutions for preventing cattle rustling in african context. 153:1-153:11 - Vandna Shah:
A robust and efficient approach for image denoising and brain region extraction to aid neurology system of patient. 154:1-154:6 - Gambhire Swati Sampatrao, Sudeepa Roy Dey, Bidisha Goswami, Sai Prasanna M. S, Snehanshu Saha:
A study of revenue cost dynamics in large data centers: a factorial design approach. 155:1-155:14 - Waeal J. Obidallah, Bijan Raahemi:
A survey on web service discovery approaches. 156:1-156:8 - T. P. Shabeera, S. D. Madhu Kumar:
A heuristic based algorithm for distance-aware virtual machine allocation in cloud. 157:1-157:5 - Tahani Aladwani:
Impact of tasks classification and virtual machines categorization on tasks scheduling algorithms in cloud computing. 158:1-158:7 - Madjid Kara, Olfa Lamouchi, Amar Ramdane-Cherif:
Semantically equivalent model for quality evaluation. 159:1-159:5 - Awatif Ragmani, Amina El Omri, Noreddine Abghour, Khalid Moussaid, Mohamed Rida:
An efficient load balancing strategy based on mapreduce for public cloud. 160:1-160:10 - Abobakr Y. Shahrah, Majed A. Al-Mashari:
Emergency response systems: research directions and current challenges. 161:1-161:6 - Sabah Al-Fedaghi, Sari Sultan:
Flow machine diagrams for VHDL code. 162:1-162:6 - Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi:
Trading of cloud of things resources. 163:1-163:7 - MirMuhammad Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, Tariq Jameel Khanzada, Steve Greedy:
Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networks. 164:1-164:4 - Mahmoud S. Fayed, Muhammad Al-Qurishi, Atif Alamri, Ahmad A. Al-Daraiseh:
PWCT: visual language for IoT and cloud computing applications and systems. 165:1-165:5 - S. A. Abdul Shukor, M. Q. Aminuddin, Emma J. Rushforth:
Managing huge point cloud data through geometrical-based registration. 166:1-166:6 - Amina Harit, Abdellah Ezzati, Rachid Elharti:
Internet of things security: challenges and perspectives. 167:1-167:8 - Mohammed Ahmed Taiye, Siti Sakira Kamaruddin, Farzana Kabir Ahmad:
Combined WSD algorithms with LSA to identify semantic similarity in unstructured textual data. 168:1-168:5 - Sherimon Puliprathu Cherian, Vinu Sherimon:
A proposed onto-Apriori algorithm to mine frequent patterns of high quality seafood. 169:1-169:6 - Preeti Khanna, Ashu Sharma:
Integrating SCM with internet of things: implication on HR management. 170:1-170:13 - Ruhma Tahir, Hasan Tahir, Ali Sajjad, Klaus D. McDonald-Maier:
A secure cloud framework for ICMetric based IoT health devices. 171:1-171:10 - Bashar Ahmed Alohali, Vassilios G. Vassilakis:
Security of wireless sensor network (WSN) in smart grid. 172:1-172:6 - Nouha Arfaoui, Jalel Akaichi:
Vehicle trajectory data warehouse: point of interest and time interval of interest. 173:1-173:6 - Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder, Seth Marasco:
Protecting an automobile network using distributed firewall system. 174:1-174:6 - Al Tariq Sheik, Carsten Maple, Tim Watson, Hussam Alhagagi, Nader Sohrabi Safa, Sang Woo Lee:
A threat based approach to computational offloading for collaborative cruise control. 175:1-175:9 - Jeethu V. Devasia, Priya Chandran, Garge Shreya, Aparna R., Abijith R.:
On parallelizing graph theoretical approaches for identifying causal genes and pathways from very large biological networks. 176:1-176:6 - Jairo Alejandro Gomez, Jesus Talavera, Luis Eduardo Tobon, Maria Alejandra Culman, Luis Alfredo Quiroz, Juan Manuel Aranda, Luis Ernesto Garreta:
A case study on monitoring and geolocation of noise in urban environments using the internet of things. 177:1-177:6 - Md. Fasiul Alam, Stathes Hadjiefthymiades:
Advanced, hardware supported in-network processing for the internet of things. 178:1-178:7 - S. Abraham, N. Weller:
Next generation traffic event detection: a framework based on internet of vehicles (IoV). 179:1-179:3 - Augustus Ehiremen Ibhaze, Moses U. Akpabio, Samuel N. John:
A review on smart grid network security issues over 6LoWPAN. 180:1-180:5 - Uchechukwu Awada, Adam Barker:
Resource efficiency in container-instance clusters. 181:1-181:5 - Alfredo Cuzzocrea, Carmine De Napoli, Agostino Forestiero, Demetrio Laganà, Giovanni Lupi, Carlo Mastroianni, Leonardo Spataro:
Business scenarios for hierarchical workload management in data centers. 182:1-182:7 - Ahmad Fadzil M. Hani, Irving Vitra Paputungan, Mohd Fadzil Hassan, Vijanth S. Asirvadam:
Manifold learning in SLA violation detection and prediction for cloud-based system. 183:1-183:5 - Binesh Jose, S. D. Madhu Kumar, Alfredo Cuzzocrea:
Enhancing contact center performance using cloud computing: a case study on telecom contact centers. 184:1-184:8 - Khaled M. Khan, Mahboob Shaheen, Yongge Wang:
Data confidentiality in cloud-based pervasive system. 185:1-185:6 - A. H. Azni, Abdul Fuad Abdul Rahman, Najwa Hayaati Mohd Alwi, Kamaruzzaman Seman:
Measuring sensor to cloud energy consumption. 186:1-186:6 - Hesham H. Aly, Abdel Hamid Soliman, Mansour Mouniri:
Analogue to information converter design using analogue chua circuit for IoT devices. 187:1-187:5 - Higo Pires, Zair Abdelouahab, Denivaldo Lopes, Mário Santos:
A framework for agent-based intrusion detection in wireless sensor networks. 188:1-188:7 - Qingwu Li, Wenqing Zhu, Mei Cao:
Underwater color image enhancement using improved multi-scale retinex and histogram linear quantification. 189:1-189:11 - Naushin Nower, Sakhawat Hossan:
Efficient dynamic traffic light control for ITS. 190:1-190:7 - Simon Parkinson, Yongrui Qin, Saad Khan, Mauro Vallati:
Security auditing in the fog. 191:1-191:9 - A. A. Thulnoon, Brett Lempereur, Qi Shi, Dhiya Al-Jumeily:
Using aspect oriented programming to enforce privacy preserving communication in distributed systems. 192:1-192:8 - Phillip Kendrick, Abir Hussain, Natalia Criado, Martin Randles:
Multi-agent systems for scalable internet of things security. 193:1-193:6 - Mustapha Belouch, Salah el hadaj:
Comparison of ensemble learning methods applied to network intrusion detection. 194:1-194:4 - Nikolaos Tantouris, Despoina Polemi, Kleanthis Dellios:
On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machines. 195:1-195:7 - Lasbahani Abdellatif, Mostafa Chhiba, Oussama Mjihil:
Deals with integrating of security specifications during software design phase using MDA approach. 196:1-196:7 - Zongyi Liu, Daniela Dragomirescu, Georges Da Costa, Thierry Monteil:
A stack cross-layer analytical model for CSMA/CA IEEE 802.15.4 networks. 197:1-197:7 - Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Rahim Kacimi, Sanaa Kawther Ghalem:
Distributed faulty sensor node detection in wireless sensor networks based on copula theory. 198:1-198:8 - Sanaa Kawther Ghalem, Kechar Bouabdellah, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Farid Lalem:
A copula based approach for measurement validity verification in wireless sensor networks. 199:1-199:6 - Shashidhar H. R, G. T. Raju, Vinayaka Murthy:
Selectivity estimation in web query optimization. 200:1-200:6 - Yvo Desmedt:
"Need to know" to defend one's home, or should one buy a wifi enabled thermostat? 201:1-201:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.