default search action
ICC 2017: Cambridge, UK
- Hani Hamdan, Djallel Eddine Boubiche, Homero Toral-Cruz, Sedat Akleylek, Hamid Mcheick:
Proceedings of the Second International Conference on Internet of things and Cloud Computing, ICC 2017, Cambridge, United Kingdom, March 22-23, 2017. ACM 2017 - Abir Hussain:
Machine learning approaches for extracting genetic medical data information. 1:1 - Hojjat Adeli:
Data mining for automated diagnosis of neurological and psychiatric disorders. 2:1 - Ahcène Bounceur:
From smart-city and IoT simulation to big data generation. 3:1 - Kai-Chi Chang, Raylin Tso, Min-Chun Tsai:
IoT sandbox: to analysis IoT malware Zollard. 4:1-4:8 - Gabriella Colajanni, Patrizia Daniele:
A cloud computing network and an optimization algorithm for IaaS providers. 5:1-5:8 - Carlos Henrique Gomes Ferreira, Júlio Cezar Estrella, Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura, Rafael Mira De Oliveira Libardi, Bruno G. Batista, Maycon L. M. Peixoto, Dionisio Machado Leite Filho, Stephan Reiff-Marganiec:
A low cost workload generation approach through the cloud for capacity planning in service-oriented systems. 6:1-6:8 - Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:
Harnessing the power of blockchain technology to solve IoT security & privacy issues. 7:1-7:10 - El Miloud Ar-reyouchi, Maria Hammouti, Imane Maslouhi, Kamal Ghoumid:
The internet of things: network delay improvement using network coding. 8:1-8:7 - Lok Li Ching, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin, Manmeet Mahinderjit Singh:
Smart university: reservation system with contactless technology. 9:1-9:6 - Roberto Bruschi, Franco Davoli, Laura Galluccio, Paolo Lago, Alfio Lombardo, Chiara Lombardo, Corrado Rametta, Giovanni Schembra:
Virtualization of set-top-box devices in next generation SDN-NFV networks: the input project perspective. 10:1-10:8 - Mohammed Basingab, Luis Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez, Won II Jung:
Business modeling based on internet of things: a case study of predictive maintenance software using ABS model. 11:1-11:5 - Marius Kahlert, Efthymios Constantinides, S. A. de Vries:
The relevance of technological autonomy in the customer acceptance of IoT services in retail. 12:1-12:7 - K. Brindha, N. Jeyanthi:
A novel approach to secure cloud data storage and dynamic data auditing in a cloud. 13:1-13:5 - Sreeja M, Sreeram M:
Bluetooth 5 beacons: a novel design for indoor positioning. 14:1-14:6 - Martin Randles, Princy Johnson, Abir Hussain:
Internet of things eco-systems: assured interactivity of devices and data through cloud based team work. 15:1-15:9 - Kapil Kanwal, Ghazanfar Ali Safdar:
Growing green with improved profit through reduced power consumption in LTE networks. 16:1-16:6 - Chaimae Saadi, Habiba Chaoui:
A new approach to mitigate security threats in cloud environment. 17:1-17:7 - Habiba Chaoui, Ibtissam Makdoun:
A new secure model for the use of cloud computing in big data analytics. 18:1-18:11 - Steffen Thielemans, Maite Bezunartea, Abdellah Touhafi, Kris Steenhaut:
An open-source PLC stack for simplified and cost-effective deployment of smart systems. 19:1-19:6 - B. Prabadevi, N. Jeyanthi:
A mitigation system for ARP cache poisoning attacks. 20:1-20:7 - Reham Alabduljabbar, Hmood Al-Dossari:
Towards a classification model for tasks in crowdsourcing. 23:1-23:7 - Gregory Tsipenyuk, Jon Crowcroft:
My home is my post-office: evaluation of a decentralized email architecture on internet-of-things low-end device. 25:1-25:8 - Delong Cui, Zhiping Peng, Wende Ke, Qirui Li, Jinglong Zuo, Jihai Zhong:
Workflow resources provisioning algorithm research. 26:1-26:5 - Dana I. Al-Maani, Hani Bani-Salameh:
A generic model for evaluating the usability of learning management systems. 27:1-27:5 - Wonjun Choi, Ramneek Seckhon, Woojin Seok:
Statistical transmission control based on confidence interval in high bandwidth network. 28:1-28:4 - Lamia Karim, Azedine Boulmakoul, Ahmed Lbath:
Real time analytics of urban congestion trajectories on hadoop-mongoDB cloud ecosystem. 29:1-29:11 - Fadi Al-Turjman:
Path finder for medical information couriers in the IoT era. 30:1-30:5 - Craig Henderson, Ebroul Izquierdo:
Scalable pattern retrieval from videos using a random forest index. 31:1-31:7 - Fadi Al-Turjman, Sinem Alturjman, Enver Ever:
Identification framework for smart environments in the era of cloud-IoT. 32:1-32:6 - Francesco Colace, Matteo Ferro, Francesco Abate, Antonio Pietrosanto:
A multiservice network for gas and water meters management. 33:1-33:5 - Bin Sun, Dengyin Zhang:
A method for video shot boundary detection based on HSV color histogram and DPHA feature. 34:1-34:4 - Jesús A. Muñoz, Rodrigo Pérez:
Design of smart ships for the IoT. 35:1-35:7 - Ting Jin, Jian Wan, Huayou Si, Yajie Qi, Yongjian Ren:
Empirical research on distribution characteristics of online news comment. 36:1-36:5 - Badraddin Alturki, Stephan Reiff-Marganiec:
Towards an off-the-cloud IoT data processing architecture via a smart car parking example. 37:1-37:5 - Glenn Barrie, Andrew Whyte, Joyce Bell:
IoT security: challenges and solutions for mining. 38:1-38:9 - George Kokkonis, Sotirios Kontogiannis, Dimitrios Tomtsis:
FITRA: a neuro-fuzzy computational algorithm approach based on an embedded water planting system. 39:1-39:8 - Maite Bezunartea, Mai Banh, Miguel Gamallo, Jacques Tiberghien, Kris Steenhaut:
Impact of cross-layer interactions between radio duty cycling and routing on the efficiency of a wireless sensor network: a testbed study involving contikiMAC and RPL. 40:1-40:7 - Hassane Essafi, Patrick Hède:
FRAMSTIM: framework for large scale multimedia content feature extraction based on MPI one-sided communication. 41:1-41:6 - Tao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang:
Improved group management protocol of RFID password method. 42:1-42:4 - Stefano Tedeschi, Jörn Mehnen, Rajkumar Roy:
IoT security hardware framework for remote maintenance of legacy machine tools. 43:1-43:4 - Adnane Ghannem, Mohamed Salah Hamdi, Hany H. Ammar, Makram Soui:
A systematic classification of requirements engineering approaches for adaptive systems. 44:1-44:9 - A. Casella, Alfio Lombardo, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Giovanni Schembra, Alessandro Vassallo:
A cloud-based live streaming service for SDN-NFV enabled carriers. 45:1-45:7 - Julian Popp, Claudia Lex, Joerg Robert, Albert Heuberger:
Simulating MTC data transmission in LTE. 46:1-46:8 - Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo:
Graphic model analysis of frauds in online consumer reviews. 47:1-47:7 - Sabah Al-Fedaghi:
Sets with members as machines with things that flow. 48:1-48:10 - Soha Rawas, Wassim Itani, Ahmed Sherif Zekri, Ali El Zaart:
ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers. 49:1-49:7 - Mariya Ouaissa, Abdallah Rhattoy, Mohammed Lahmer:
Group access authentication of machine to machine communications in LTE networks. 50:1-50:5 - Der-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu:
Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks. 51:1-51:8 - Ulysse Rugwiro, Chunhua Gu:
Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers. 52:1-52:8 - Miran Boric, Ana Fernández Vilas, Rebeca P. Díaz Redondo:
BLE broadcasting impact in a real network environment. 53:1-53:6 - Fatemeh Cheraghchi, Arash Iranzad, Bijan Raahemi:
Subspace selection in high-dimensional big data using genetic algorithm in apache spark. 54:1-54:7 - Ezgi Ucar:
Eclipse: a wearable instrument for performance based storytelling. 55:1-55:4 - Hasni Hassan, Mohd Isa Awang, Mokhairi Makhtar, Aznida Hayati Zakaria, Rohana Ismail, Fadhilah Ahmad:
Algorithms for extracting adjacency matrix based on formal concept analysis (FCA). 56:1-56:6 - Arseni Anisimovich, Michele Sama, Theodosia Togia:
The pitfall of using question detection as a proxy for action inference in natural text conversations: a position paper. 57:1-57:4 - Nandita Sengupta:
Designing encryption and IDS for cloud security. 58:1-58:5 - Eric Mayeul O. Fafolahan, Samuel Pierre:
Local anchor based architecture for mobility support in identificator locator split networks. 59:1-59:7 - Kenneth Hoelscher, Lucas Allgood, Changyong (Andrew) Jung, Suk-Jin Lee:
Direct autolink. 60:1-60:4 - Raj Kumari, Sakshi Kaushal:
Energy efficient approach for application execution in mobile cloud IoT environment. 61:1-61:8 - Dongming Chen, Wei Zhao, Xinyu Huang, Dongqi Wang, Yanbin Yan:
Centrality-based bipartite local community detection algorithm. 62:1-62:8 - Lucile Sassatelli, Muriel Médard:
Thwarting pollution attacks in network coding for delay tolerant mobile social networks. 63:1-63:7 - Martin Lehmann, Frode Eika Sandnes:
A framework for evaluating continuous microservice delivery strategies. 64:1-64:9 - Breno Fabrício Lira Melo Sousa, Zair Abdelouahab, Denivaldo Cicero Pavão Lopes, Natalia Costa Soeiro, Willian França Ribeiro:
An intrusion detection system for denial of service attack detection in internet of things. 65:1-65:8 - Nikhil Kurian Jacob:
IoT powered portable aquaponics system. 66:1-66:5 - Aamna Iqtidar, Abdul Wahab Muzaffar, Usman Qamar, Saad Rehman:
A biomedical ontology on genetic disease. 67:1-67:6 - Rosida Ab Razak, Mohamad Shanudin Zakaria:
The information and communication technology governance maturity level for malaysian public sector. 68:1-68:8 - Aytug Onan:
A machine learning based approach to identify geo-location of Twitter users. 69:1-69:6 - Essam H. Houssein, Aboul Ella Hassanien, Alaa A. K. Ismaeel:
EEG signals classification for epileptic detection: a review. 70:1-70:9 - Wong Siaw Ling, Boon Yaik Ooi, Soung-Yue Liew:
A novel data reduction technique with fault-tolerance for internet-of-things. 71:1-71:7 - Rahim Rahmani, Yuhong Li, Karl Eberg, Marcus Stvelind 3rd:
Mobile blue gateway an application for multicasting data to populations of bluetooth low energy sensors for smart community sensing. 72:1-72:4 - Siti Salmah Md. Kassim, Mazleena Salleh, Anazida Zainal, Abd Razak Che Husin:
Risk tolerance and trust issues in cloud-based E-learning. 73:1-73:11 - M. A. López Vega, S. Couturier:
Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imagery. 74:1-74:4 - Ashraf S. Hussein, Hamayun A. Khan:
Students' performance tracking in distributed open education using big data analytics. 75:1-75:8 - Manzoor Elahi, Shahid Khan, Hazrat Ali, Sikandar Khan, Irfanullah:
Design of multi-band antenna for LTE and WiMAX applications using step-shaped drivers with the truncated ground plane. 76:1-76:4 - Eiman Al Nuaimi, Noura Al Darmaki:
Managing QoS in IoTs: a survey. 77:1-77:7 - Jianwei He, Dexian Zhang:
A structure of intelligent grain network information platform based on cloud computing. 78:1-78:5 - Shaik Asif Hussain, Haitham Mohammed, Shaik Javeed Hussain:
Detection of brain activity with an automated system hardware for accurate diagnostic of mental disorders. 79:1-79:6 - Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi:
An adaptive app for tourist contents contextualization. 80:1-80:10 - A. Bagley, Gerhard Fehringer, Nanlin Jin, Steve Cammish:
Live video transmission over data distribution service with existing low-power platforms. 81:1-81:5 - Farzad Firozbakht, Waeal J. Obidallah, Bijan Raahemi:
Cloud computing service discovery framework for IaaS and PaaS models. 82:1-82:6 - Younis A. Younis, Kashif Kifayat, Abir Hussain:
Preventing and detecting cache side-channel attacks in cloud computing. 83:1-83:8 - Mahmoud El Hendy, Sami Miniaoui, Shadi Atalla, Kamarul Faizal Bin Hashim:
A survey on smart city technologies, initiatives and global technology providers. 84:1-84:7 - Awais Usman, Peilin Zhang, Oliver E. Theel:
An efficient and updatable item-to-item frequency matrix for frequent itemset generation. 85:1-85:6 - Beh Choon Yeong, Nurul Hashimah Ahamed Hassain Malim, Hassain Malim, Manmeet Mahinderjit Singh:
NFC-based waste management tracking and monitoring system. 86:1-86:5 - Debanshee Saha, Manasi Shinde, Shail Thadeshwar:
IoT based air quality monitoring system using wireless sensors deployed in public bus services. 87:1-87:6 - Tiago M. Ribeiro, V. Leonardo Paucar:
Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm. 88:1-88:5 - Mariam Benmoussa, Mariyam Ouaissa, Mohammed Lahmer, Idriss Chana, Abdallah Rhattoy:
QoS analysis of hierarchical routing protocols for wireless sensor networks. 89:1-89:6 - R. Udendhran:
A hybrid approach to enhance data security in cloud storage. 90:1-90:6 - Dileep Reddy Bolla, M. N. Thippeswamy, Fambirai Takawira:
A survey on various routing protocols in cognitive radio networks. 91:1-91:7 - Naeem A. Nawaz, Ahmad Waqas, Zulkefli Muhammed Yusof, Asadullah Shah:
A framework for smart estimation of demand-supply for crowdsource management using WSN. 92:1-92:5 - Satyasrikanth Palle, M. N. Thippeswamy, Fambirai Takawira:
Survey on call admission control protocols in cellular networks. 93:1-93:7 - Ejaz Farooq, Shoab Ahmad Khan, Wasi Haider Butt:
Covert network analysis to detect key players using correlation and social network analysis. 94:1-94:6 - P. L. Valliammai, Kirupa Ganapathy:
Missing plane identification using doppler effect and distance method in satellite communication. 95:1-95:6 - Peng Li, Huayi Fang, Xiang Liu, Baijian Yang:
A countermeasure against relay attack in NFC payment. 96:1-96:5 - Siddharth Gupta, Sahithya Kodam, Baijian Yang:
Multichannel key exchange. 97:1-97:5 - Débora Stefanello, Denivaldo Lopes:
A framework for supporting the context-aware mobile application development process. 98:1-98:8 - Mohammad Soruri, Javad Sadri, Seyed Hamid Zahiri:
Hidden markov model optimized by PSO algorithm for gene sequence clustering. 99:1-99:6 - Venkatesh, Poornima M. R., K. R. Venugopal, S. S. Iyengar, L. M. Patnaik:
LR3: link reliable reactive routing protocol for wireless sensor networks. 100:1-100:8 - Shilun Lin, Zhicheng Zhao, Fei Su:
Clustering lightened deep representation for large scale face identification. 101:1-101:5 - Yang Zhang, Junliang Chen:
Modeling virtual channel to enforce runtime properties for IoT services. 102:1-102:17 - Kashif Sultan, Hazrat Ali:
Where big data meets 5G? 103:1-103:4 - Keltoum Bendiab, Samia Boucherkha:
A dynamic federated identity management approach for cloud-based environments. 104:1-104:5 - Fotios Nikolopoulos, Spiridon D. Likothanassis:
Using UTAUT2 for cloud computing technology acceptance modeling. 105:1-105:6 - Syed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer III:
Security evaluation of cloud service providers using third party auditors. 106:1-106:6 - Martin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Yi Shyh Eddy Foo, Kevin Aditya, Sebastian Mosbach, Iftekhar A. Karimi, Raymond Lau, Markus Kraft:
J-park simulator: roadmap to smart eco-industrial parks. 107:1-107:10 - Fawaz D. Alharbi, Anthony S. Atkins, Clare Stanier:
Cloud computing adoption readiness assessment in saudi healthcare organisations: a strategic view. 108:1-108:8 - Alberto Polzonetti, Alessandro Bettacchi:
Cloud services implementing security: a case study. 109:1-109:6 - Galyna Chornous, Iuliia Iarmolenko:
Decision support system for predicting stock prices based on sentiments in social media. 110:1-110:4 - Said Charfi, Mohamed El Ansari:
Gastrointestinal tract bleeding detection from wireless capsule endoscopy videos. 111:1-111:5 - Samira Al Marzooqi, Eiman Al Nuaimi, Nabeel A. Y. Al-Qirim:
E-governance (G2C) in the public sector: citizens acceptance to E-government systems - Dubai's case. 112:1-112:11 - S. Rao Chintalapudi, Munaga H. M. Krishna Prasad:
Network entropy based overlapping community detection in social networks. 113:1-113:4 - Anne-Sophie Brylinski, Aniruddha Bhattacharjya:
Overview of HTTP/2. 114:1-114:6 - Abhinav Choudhury, Shruti Kaushik, Varun Dutt:
Data-mining medications for pain: analyzing adoption behavior of physicians and switching behavior of patients. 115:1-115:8 - Ta-Te Lu, Y. J. Liu, J. J. Ciou, C. H. Lu:
Feature selection difference matching method for indoor positioning. 116:1-116:5 - Asif Qumer Gill, Vahid Behbood, Rania Ramadan-Jradi, Ghassan Beydoun:
IoT architectural concerns: a systematic review. 117:1-117:9 - Mohammed Sharfuddin, T. Ragunathan:
Replication algorithm based on confidence measure for cloud storage systems. 118:1-118:6 - A. H. Cloete, Marthinus J. Booysen, R. C. Sandell, A. B. van der Merwe:
Smart electric water heaters: a system architecture proposal for scalable IoT. 119:1-119:7 - Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. 120:1-120:12 - Nurul Huda Nik Zulkipli, Gary B. Wills:
An event-based access control for IoT. 121:1-121:4