default search action
ICC 2016: Cambridge, UK
- Proceedings of the International Conference on Internet of Things and Cloud Computing, Cambridge, UK, March 22-23, 2016. ACM 2016, ISBN 978-1-4503-4063-2
- Ahcène Bounceur:
CupCarbon: A New Platform for Designing and Simulating Smart-City and IoT Wireless Sensor Networks (SCI-WSN). 1:1 - Homero Toral-Cruz:
Self-Similarity in Voice over Internet Traffic. 2:1 - Djallel Eddine Boubiche:
Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor Networks. 3:1 - Mohammad Hammoudeh:
Putting the lab on the map: A wireless sensor network system for border security and surveillance. 4:1 - Bill Karakostas, Nik Bessis:
Intelligent Brokers in an Internet of Things for Logistics. 5:1-5:7 - Ankita Sharma, Hema Banati:
A Framework for Implementing Trust in Cloud Computing. 6:1-6:7 - Meriem Azaiez, Walid Chainbi:
A Multi-agent System Architecture for Self-Healing Cloud Infrastructure. 7:1-7:6 - Taha Alwajeeh, Pierre Combeau, Ahcène Bounceur, Rodolphe Vauzelle:
Efficient Method for Associating Radio Propagation Models with Spatial Partitioning for Smart City Applications. 8:1-8:7 - Talal Albalawi, Austin Melton, Michael Rothstein:
A New Approach to Data Dynamic Integrity Control. 9:1-9:8 - Alshaimaa Abo-Alian, Nagwa L. Badr, Mohamed F. Tolba:
Authentication as a Service for Cloud Computing. 10:1-10:7 - Tarek Elghazaly, Amal Mahmoud, Hesham A. Hefny:
Political Sentiment Analysis Using Twitter Data. 11:1-11:5 - Suchi Kumari, Anurag Singh, Priya Ranjan:
Towards A Framework for Rate Control on Dynamic Communication Networks. 12:1-12:7 - A. B. N. Alvi, Usman Qamar, Abdul Wahab Muzaffar, Wasi Haider Butt:
A Novel Hybrid Classifiers based Model for mining in Neuro-imaging. 13:1-13:6 - Alfredo Cuzzocrea:
Warehousing and Protecting Big Data: State-Of-The-Art-Analysis, Methodologies, Future Challenges. 14:1-14:7 - Bhaskar Bhuyan, Nityananda Sarma:
A QoS aware Routing Protocol in Wireless Sensor Networks with Mobile Base Stations. 15:1-15:6 - Majed Almubaddel, Ahmed M. Elmogy:
Cloud Computing Antecedents, Challenges, and Directions. 16:1-16:5 - Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier, Changyu Dong, David M. Eyers, Jean Bacon:
Information Flow Control with Minimal Tag Disclosure. 17:1-17:4 - Abdel-Rahman Al-Ghuwairi, Hazem Eid, Mohammad Aloran, Zaher Salah, Aladdin Hussein Baarah, Ahmad A. Al-Oqaily:
A mutation-based model to rank testing as a service (TaaS) Providers in cloud computing. 18:1-18:5 - Enrique Festijo, Younchan Jung:
An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems. 19:1-19:12 - Amita Ajith Kamath, Chirag Jamadagni, K. Chandrasekaran:
VirtTorrent: BitTorrent for Inter-VM File Distribution. 20:1-20:7 - Geun-Jun Kim, Bongsoon Kang:
Automation System Architecture For Barcode Region Detection Algorithm. 21:1-21:4 - Moudhi M. Aljamea, Ljiljana Brankovic, Jia Gao, Costas S. Iliopoulos, M. Samiruzzaman:
Smart Meter Data Analysis. 22:1-22:6 - Moudhi M. Aljamea, Costas S. Iliopoulos, M. Samiruzzaman:
Detection Of URL In Image Steganography. 23:1-23:6 - Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook Al-Rakhami, Majed A. AlRubaian, Atif Alamri:
A Framework for Optimum Selection of Online Social Network Management Systems. 24:1-24:6 - Mabrook Al-Rakhami, Ahmad Alhamed:
Cloud-based Graphical Simulation Tool of ECG for Educational Purpose. 25:1-25:6 - Hassan Saad Alqahtani, Paul Sant:
Multiple-Clouds Computing Security Approaches: A Comparative Study. 26:1-26:6 - Amir Mohamed Talib, Fahad Omar Alomary:
Cloud Computing Based E-Commerce as a Service Model: Impacts and Recommendations. 27:1-27:7 - Nyan Lin, Brian M. Kurkoski, Yuto Lim, Yasuo Tan:
Balanced Cooperative Linear Data Exchange with Physical Layer Network Coding. 28:1-28:6 - Wan Aida Nadia Wan Abdullah, Naimah Yaakob, Mohamed Elshaikh Elobaid, Mohd Nazri Mohd Warip, Siti Asilah Yah:
Energy-Efficient Remote Healthcare Monitoring Using IoT: A Review of Trends and Challenges. 29:1-29:8 - Mohammad N. Khalaf, Abdel-Rahman Al-Ghuwairi, Laith Al-Yasen:
A Trust Framework for Ranking User as a Cloud Provider in Peer-to-Peer cloud system. 30:1-30:5 - Marnel Peradilla, Younchan Jung:
Combined Operations of Mobility and NAT Management on the Horizontal Model of Software-Defined Networking. 31:1-31:10 - Akanksha Das, Ravi Kant Kumar, Dakshina Ranjan Kisku:
Heterogeneous Face Detection. 32:1-32:6 - Sriram Birudavolu, Biswajit Nag, Omprakash Wali:
Open Innovation in ICT Services for Quadruple Helix Model: The Cloud Proposition. 33:1-33:13 - Seyoung Park, Jae-Gil Lee, So-Jeong Kim, Dong-Hee Shin:
The Effect of Visual Cueing in 3D Animations for Learning Procedural-manipulative Tasks: From the Perspective of Cognitive Load Theory. 34:1-34:4 - Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst:
A System for Intrusion Prediction in Cloud Computing. 35:1-35:9 - Mohd Hafriz Bin Nural Azhan, Md. Yazid Bin Mohd. Saman, Mustafa Bin Man:
A Framework for Collaborative Multi-Institution MOOC Environment. 36:1-36:6 - Manar Abourezq, Abdellah Idrissi, Fadoua Yakine:
Routing in wireless Ad Hoc networks using the Skyline operator and an outranking method. 37:1-37:10 - Priya Dudhale Pise, Nilesh J. Uke:
Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud Platforms. 38:1-38:5 - Fayçal M'hamed Bouyakoub, Abdelkader Belkhir:
Communities detection based services, time and location. 39:1-39:8 - Mohamed Boubenia, Abdelkader Belkhir, Fayçal M'hamed Bouyakoub:
A multi-level approach for mobile recommendation of services. 40:1-40:6 - Anas M. Mzahm, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Azhana Ahmad:
Towards a Design Model for Things in Agents of Things. 41:1-41:5 - Kurra Mallaiah, Rishi Kumar Gandhi, Ramachandram Sirandas:
Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases. 42:1-42:12 - Yu-Chi Liu, Wei-Chun Chung, Meng-Huang Lee, Kuan-Jen Wang, Shin-Hung Chang, Chi-Jen Wu, Ray-I Chang, Jan-Ming Ho:
Scheduling of Optimal DASH Streaming. 43:1-43:9 - Hanen Bouali, Jalel Akaichi:
Out-Of-Order Events Processing: Healthcare Use Case. 44:1-44:4 - Baha'a Al-Sharafat, Bara'a Qadoumi:
Generic Usability Monitoring Model for Cloud Computing Environment (GUM). 45:1-45:6 - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang:
Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. 46:1-46:5 - Muhammad Summair Raza, Usman Qamar:
A hybrid feature selection approach based on heuristic and exhaustive algorithms using Rough set theory. 47:1-47:7 - Supun Kamburugamuve, Hengjing He, Geoffrey C. Fox, David J. Crandall:
Cloud-based Parallel Implementation of SLAM for Mobile Robots. 48:1-48:7 - Saad Bin Ahmed, Muhammad Imran Razzak, Bandar Alhaqbani:
The Minutiae Based Latent Fingerprint Recognition System. 49:1-49:9 - Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
A Comprehensive Study for Software Testing and Test Cases Generation Paradigms. 50:1-50:7 - Jamaiah Haji Yahaya, Aziz Deraman, Zuriani Hayati Abdullah:
Evergreen Software Preservation: The Anti-Ageing Model. 51:1-51:6 - Shih-Hsiung Lee, Chih-Nan Hu, Chu-Sing Yang:
Token-oriented based for Internet of Things and Clouding computing services. 52:1-52:4 - Muawya Habib Sarnoub Eldaw, Mark Levene, George Roussos:
Presence Analytics: Discovering Meaningful Patterns about Human Presence Using WLAN Digital Imprints. 53:1-53:7 - Muhammad Waqar Aziz, Adil Amjad Sheikh, Emad A. Felemban:
Requirement Engineering Technique for Smart Spaces. 54:1-54:7 - Ahmed Hefnawy, Abdelaziz Bouras, Chantal Cherifi:
IoT for Smart City Services: Lifecycle Approach. 55:1-55:9 - Bernardo Nicoletti:
Cloud Computing and Procurement. 56:1-56:7 - Abdel-Rahman Al-Ghuwairi, Mohammad N. Khalaf, Laith Al-Yasen, Zaher Salah, Ayoub Alsarhan, Aladdin Hussein Baarah:
A Dynamic Model for automatic Updating cloud computing SLA (DSLA). 57:1-57:7 - Adel Alkhalil, Reza Sahandi, David John:
A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud Computing. 58:1-58:8 - Oumarou Mamadou Bello, Dina Taiwé Kolyang:
Mesh Node placement in Wireless mesh network based on multiobjective evolutionary metaheuristic. 59:1-59:6 - Hiba Jadallah, Zaher Al Aghbari:
Aman: Spatial Cloaking for Privacy-Aware Location-Based Queries in the Cloud. 60:1-60:6 - Wassila Guebli, Abdelkader Belkhir:
Providing Services in an Intelligent Environment: Smart Home Simulator based WoT. 61:1-61:5 - Ibrahim Ejdayid A. Mansour, Reza Sahandi, Kendra M. L. Cooper, Adrian Warman:
Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric Approaches. 62:1-62:7 - Zeineb Dhouioui, Jalel Akaichi:
Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection. 63:1-63:6 - Zeineb Dhouioui, Jalel Akaichi:
Wherever You Are, I'll Catch You Modeling the Identification of Location-Based Communities in Mobile Social Networks. 64:1-64:5 - Ahmad Alkhatib:
Sub-Network Coverage Method as an Efficient Method of Wireless Sensor Networks for Forest Fire Detection. 65:1-65:7 - Ahmed Jemal, Hend Ktait, Riadh Ben Halima, Mohamed Jmaiel:
OoDAAS: Ontology-Driven Analysis for Self-Adaptive Ambient Systems. 66:1-66:6 - Christofer N. Yalung, Salah S. Al-Majeed, Jalal Karam:
Analysis and Interpretation of Brain Wave Signals. 67:1-67:8 - Qiuling Chen, Ayong Ye, Li Xu:
A privacy-preserving Proximity Detection Method in social network. 68:1-68:6 - Umber Noreen, Ahcène Bounceur, Laurent Clavier:
Integration of OFDM Based Communication System with Alpha-Stable Interference using CupCarbon Simulator. 69:1-69:8 - Abdelkader Laouid, Mohamed-Lamine Messai, Ahcène Bounceur, Reinhardt Euler, Abdelnasser Dahmani, Abdelkamel Tari:
A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks. 70:1-70:6 - Massinissa Saoudi, Ahcène Bounceur, Reinhardt Euler, M. Tahar Kechadi:
Data Mining Techniques Applied to Wireless Sensor Networks for Early Forest Fire Detection. 71:1-71:7 - Md. Habibur Rahman, Sadia Sharmin, Sheikh Muhammad Sarwar, Mohammad Shoyaib:
Software Defect Prediction Using Feature Space Transformation. 72:1-72:6 - Djallel Eddine Boubiche, Sabrina Boubiche, Azeddine Bilami, Homero Toral-Cruz:
Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks. 73:1-73:6 - Alfredo Cuzzocrea, Mohamed Medhat Gaber, Staci Lattimer, Giorgio Mario Grasso:
Clustering-Based Spatio-Temporal Analysis of Big Atmospheric Data. 74:1-74:8 - Mirko Mariotti, Osvaldo Gervasi, Flavio Vella, Alessandro Costantini, Alfredo Cuzzocrea:
A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, Functionalities. 75:1-75:8 - Afreen Fatimah, Rahul Johari:
Part: Performance Analysis of Routing Techniques in Delay Tolerant Network. 76:1-76:5 - Rahul Johari, Dhari Ali Mahmood:
MeNDARIN: Mobile Education Network Using DTN Approach in North IRAQ. 77:1-77:6 - Mohammed Fihri, Youssef El Fatimi, Abdelhalim Hnini, Abdellah Ezzati:
Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN. 78:1-78:4 - Abdul Fuad Abdul Rahman, Maslina Daud, Madihah Zulfa Mohamad:
Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework. 79:1-79:5 - Youssef El Fatimi, Mohammed Fihri, Abedellah Ezzati:
Improvement of Leach Routing Algorithm Based on the Use of Game Theory. 80:1-80:5 - Sedrati Maamar, Hafnaoui Taleb:
Impact of routing protocols on the quality of transmission for video streaming. 81:1-81:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.