callback( { "result":{ "query":":facetid:toc:\"db/conf/ic2e/ic2e2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"204.63" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"85", "@dc":"85", "@oc":"85", "@id":"43398992", "text":":facetid:toc:db/conf/ic2e/ic2e2015.bht" } }, "hits":{ "@total":"85", "@computed":"85", "@sent":"85", "@first":"0", "hit":[{ "@score":"1", "@id":"3569814", "info":{"authors":{"author":{"@pid":"161/7896","text":"S. Hassan Adelyar"}},"title":"Towards Secure Agile Agent-Oriented System Design.","venue":"IC2E","pages":"499-501","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Adelyar15","doi":"10.1109/IC2E.2015.95","ee":"https://doi.org/10.1109/IC2E.2015.95","url":"https://dblp.org/rec/conf/ic2e/Adelyar15"}, "url":"URL#3569814" }, { "@score":"1", "@id":"3569815", "info":{"authors":{"author":[{"@pid":"30/10201","text":"Hidayet Aksu"},{"@pid":"71/6902","text":"Mustafa Canim"},{"@pid":"14/2029","text":"Yuan-Chi Chang"},{"@pid":"97/2118","text":"Ibrahim Korpeoglu"},{"@pid":"u/OzgurUlusoy","text":"Özgür Ulusoy"}]},"title":"Graph Aware Caching Policy for Distributed Graph Stores.","venue":"IC2E","pages":"6-15","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/AksuCCKU15","doi":"10.1109/IC2E.2015.39","ee":"https://doi.org/10.1109/IC2E.2015.39","url":"https://dblp.org/rec/conf/ic2e/AksuCCKU15"}, "url":"URL#3569815" }, { "@score":"1", "@id":"3569816", "info":{"authors":{"author":[{"@pid":"145/2054","text":"Hilfi Alkaff"},{"@pid":"02/6135","text":"Indranil Gupta"},{"@pid":"137/8938","text":"Luke M. Leslie"}]},"title":"Cross-Layer Scheduling in Cloud Systems.","venue":"IC2E","pages":"236-245","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/AlkaffGL15","doi":"10.1109/IC2E.2015.36","ee":"https://doi.org/10.1109/IC2E.2015.36","url":"https://dblp.org/rec/conf/ic2e/AlkaffGL15"}, "url":"URL#3569816" }, { "@score":"1", "@id":"3569817", "info":{"authors":{"author":[{"@pid":"69/9027-1","text":"Ali Anwar 0001"},{"@pid":"19/4244","text":"Anca Sailer"},{"@pid":"54/6884","text":"Andrzej Kochut"},{"@pid":"80/2022","text":"Charles O. Schulz"},{"@pid":"79/4154","text":"Alla Segal"},{"@pid":"b/AliRazaButt","text":"Ali Raza Butt"}]},"title":"Scalable Metering for an Affordable IT Cloud Service Management.","venue":"IC2E","pages":"207-212","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/AnwarSKSSB15","doi":"10.1109/IC2E.2015.18","ee":"https://doi.org/10.1109/IC2E.2015.18","url":"https://dblp.org/rec/conf/ic2e/AnwarSKSSB15"}, "url":"URL#3569817" }, { "@score":"1", "@id":"3569818", "info":{"authors":{"author":[{"@pid":"48/831","text":"Stefan Berger"},{"@pid":"25/4489","text":"Kenneth A. Goldman"},{"@pid":"01/2416","text":"Dimitrios E. Pendarakis"},{"@pid":"42/6618","text":"David Safford"},{"@pid":"19/133","text":"Enriquillo Valdez"},{"@pid":"128/1204","text":"Mimi Zohar"}]},"title":"Scalable Attestation: A Step Toward Secure and Trusted Clouds.","venue":"IC2E","pages":"185-194","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/BergerGPSVZ15","doi":"10.1109/IC2E.2015.32","ee":"https://doi.org/10.1109/IC2E.2015.32","url":"https://dblp.org/rec/conf/ic2e/BergerGPSVZ15"}, "url":"URL#3569818" }, { "@score":"1", "@id":"3569819", "info":{"authors":{"author":{"@pid":"83/10278","text":"David Bermbach"}},"title":"An Introduction to Cloud Benchmarking.","venue":"IC2E","pages":"3","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Bermbach15","doi":"10.1109/IC2E.2015.65","ee":"https://doi.org/10.1109/IC2E.2015.65","url":"https://dblp.org/rec/conf/ic2e/Bermbach15"}, "url":"URL#3569819" }, { "@score":"1", "@id":"3569820", "info":{"authors":{"author":[{"@pid":"35/10586","text":"Deval Bhamare"},{"@pid":"j/RajJain","text":"Raj Jain"},{"@pid":"29/2622","text":"Mohammed Samaka"},{"@pid":"142/4862","text":"Gabor Vaszkun"},{"@pid":"41/1019","text":"Aiman Erbad"}]},"title":"Multi-cloud Distribution of Virtual Functions and Dynamic Service Deployment: Open ADN Perspective.","venue":"IC2E","pages":"299-304","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/BhamareJSVE15","doi":"10.1109/IC2E.2015.49","ee":"https://doi.org/10.1109/IC2E.2015.49","url":"https://dblp.org/rec/conf/ic2e/BhamareJSVE15"}, "url":"URL#3569820" }, { "@score":"1", "@id":"3569821", "info":{"authors":{"author":[{"@pid":"06/1313","text":"Prasad Calyam"},{"@pid":"136/9770","text":"Sripriya Seetharam"},{"@pid":"151/8174","text":"Baisravan Homchaudhuri"},{"@pid":"35/4332-6","text":"Manish Kumar 0006"}]},"title":"Resource Defragmentation Using Market-Driven Allocation in Virtual Desktop Clouds.","venue":"IC2E","pages":"246-255","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/CalyamSHK15","doi":"10.1109/IC2E.2015.37","ee":"https://doi.org/10.1109/IC2E.2015.37","url":"https://dblp.org/rec/conf/ic2e/CalyamSHK15"}, "url":"URL#3569821" }, { "@score":"1", "@id":"3569822", "info":{"authors":{"author":[{"@pid":"10/2438","text":"Emiliano Casalicchio"},{"@pid":"16/8326","text":"Stefano Iannucci"},{"@pid":"77/7704","text":"Luca Silvestri"}]},"title":"Cloud Desktop Workload: A Characterization Study.","venue":"IC2E","pages":"66-75","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/CasalicchioIS15","doi":"10.1109/IC2E.2015.25","ee":"https://doi.org/10.1109/IC2E.2015.25","url":"https://dblp.org/rec/conf/ic2e/CasalicchioIS15"}, "url":"URL#3569822" }, { "@score":"1", "@id":"3569823", "info":{"authors":{"author":[{"@pid":"132/8073","text":"Mahmud Rasih Çelenlioglu"},{"@pid":"19/8276","text":"Haci Ali Mantar"}]},"title":"An SDN Based Intra-Domain Routing and Resource Management Model.","venue":"IC2E","pages":"347-352","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/CelenliogluM15","doi":"10.1109/IC2E.2015.47","ee":"https://doi.org/10.1109/IC2E.2015.47","url":"https://dblp.org/rec/conf/ic2e/CelenliogluM15"}, "url":"URL#3569823" }, { "@score":"1", "@id":"3569824", "info":{"authors":{"author":[{"@pid":"161/8729","text":"Michela D'Errico"},{"@pid":"41/1537","text":"Siani Pearson"}]},"title":"Towards a Formalised Representation for the Technical Enforcement of Privacy Level Agreements.","venue":"IC2E","pages":"422-427","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DErricoP15","doi":"10.1109/IC2E.2015.72","ee":"https://doi.org/10.1109/IC2E.2015.72","url":"https://dblp.org/rec/conf/ic2e/DErricoP15"}, "url":"URL#3569824" }, { "@score":"1", "@id":"3569825", "info":{"authors":{"author":[{"@pid":"161/7930","text":"Ala Darabseh"},{"@pid":"10/7992","text":"Mahmoud Al-Ayyoub"},{"@pid":"53/4234","text":"Yaser Jararweh"},{"@pid":"29/5366","text":"Elhadj Benkhelifa"},{"@pid":"v/MladenAVouk","text":"Mladen A. Vouk"},{"@pid":"94/6580","text":"Andy J. Rindos"}]},"title":"SDStorage: A Software Defined Storage Experimental Framework.","venue":"IC2E","pages":"341-346","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DarabsehAJBVR15","doi":"10.1109/IC2E.2015.60","ee":"https://doi.org/10.1109/IC2E.2015.60","url":"https://dblp.org/rec/conf/ic2e/DarabsehAJBVR15"}, "url":"URL#3569825" }, { "@score":"1", "@id":"3569826", "info":{"authors":{"author":[{"@pid":"95/2010","text":"Yuri Demchenko"},{"@pid":"118/5589","text":"Cosmin Dumitru"},{"@pid":"75/8875","text":"Ralph Koning"},{"@pid":"d/CeesTAMdeLaat","text":"Cees de Laat"},{"@pid":"142/7803","text":"Taras Matselyukh"},{"@pid":"99/5297","text":"Sonja Filiposka"},{"@pid":"124/2095","text":"Migiel de Vos"},{"@pid":"161/7933","text":"Daniel Arbel"},{"@pid":"161/8002","text":"Damir Regvart"},{"@pid":"161/7926","text":"Tasos Karaliotas"},{"@pid":"161/7993","text":"Kurt Baumann"}]},"title":"Open Cloud eXchange (OCX): A Pivot for Intercloud Services Federation in Multi-provider Cloud Market Environment.","venue":"IC2E","pages":"472-479","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DemchenkoDKLMFV15","doi":"10.1109/IC2E.2015.84","ee":"https://doi.org/10.1109/IC2E.2015.84","url":"https://dblp.org/rec/conf/ic2e/DemchenkoDKLMFV15"}, "url":"URL#3569826" }, { "@score":"1", "@id":"3569827", "info":{"authors":{"author":[{"@pid":"76/3749","text":"Peter Desnoyers"},{"@pid":"118/0881","text":"Jason Hennessey"},{"@pid":"161/7895","text":"Brent Holden"},{"@pid":"73/2727","text":"Orran Krieger"},{"@pid":"56/3748","text":"Larry Rudolph"},{"@pid":"85/10747","text":"Adam Young"}]},"title":"Using Open Stack for an Open Cloud Exchange(OCX).","venue":"IC2E","pages":"48-53","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DesnoyersHHKRY15","doi":"10.1109/IC2E.2015.40","ee":"https://doi.org/10.1109/IC2E.2015.40","url":"https://dblp.org/rec/conf/ic2e/DesnoyersHHKRY15"}, "url":"URL#3569827" }, { "@score":"1", "@id":"3569828", "info":{"authors":{"author":[{"@pid":"135/4671","text":"Akon Dey"},{"@pid":"f/AlanDavidFekete","text":"Alan D. Fekete"},{"@pid":"r/UweRohm","text":"Uwe Röhm"}]},"title":"REST+T: Scalable Transactions over HTTP.","venue":"IC2E","pages":"36-41","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DeyFR15","doi":"10.1109/IC2E.2015.11","ee":"https://doi.org/10.1109/IC2E.2015.11","url":"https://dblp.org/rec/conf/ic2e/DeyFR15"}, "url":"URL#3569828" }, { "@score":"1", "@id":"3569829", "info":{"authors":{"author":[{"@pid":"151/5022","text":"Stratos Dimopoulos"},{"@pid":"87/1311","text":"Chandra Krintz"},{"@pid":"w/RichardWolski","text":"Rich Wolski"},{"@pid":"55/5546","text":"Anand Gupta"}]},"title":"SuperContra: Cross-Language, Cross-Runtime Contracts as a Service.","venue":"IC2E","pages":"283-286","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/DimopoulosKWG15","doi":"10.1109/IC2E.2015.70","ee":"https://doi.org/10.1109/IC2E.2015.70","url":"https://dblp.org/rec/conf/ic2e/DimopoulosKWG15"}, "url":"URL#3569829" }, { "@score":"1", "@id":"3569830", "info":{"authors":{"author":[{"@pid":"156/8671","text":"Stephen P. Emmons"},{"@pid":"k/FAKamangar","text":"Farhad Ahani Kamangar"}]},"title":"Understanding the Linguistic Characteristics of Network Signaling for the 'Internet of Things' Using n-Grams.","venue":"IC2E","pages":"219-227","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/EmmonsK15","doi":"10.1109/IC2E.2015.22","ee":"https://doi.org/10.1109/IC2E.2015.22","url":"https://dblp.org/rec/conf/ic2e/EmmonsK15"}, "url":"URL#3569830" }, { "@score":"1", "@id":"3569831", "info":{"authors":{"author":{"@pid":"98/1210","text":"Robert Evans"}},"title":"Apache Storm, a Hands on Tutorial.","venue":"IC2E","pages":"2","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Evans15","doi":"10.1109/IC2E.2015.67","ee":"https://doi.org/10.1109/IC2E.2015.67","url":"https://dblp.org/rec/conf/ic2e/Evans15"}, "url":"URL#3569831" }, { "@score":"1", "@id":"3569832", "info":{"authors":{"author":[{"@pid":"09/4135","text":"Maria Fazio"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"70/450","text":"Massimo Villari"},{"@pid":"15/7009","text":"Antonio Puliafito"}]},"title":"How to Enhance Cloud Architectures to Enable Cross-Federation: Towards Interoperable Storage Providers.","venue":"IC2E","pages":"480-486","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/FazioCVP15","doi":"10.1109/IC2E.2015.80","ee":"https://doi.org/10.1109/IC2E.2015.80","url":"https://dblp.org/rec/conf/ic2e/FazioCVP15"}, "url":"URL#3569832" }, { "@score":"1", "@id":"3569833", "info":{"authors":{"author":{"@pid":"f/GeoffreyFox","text":"Geoffrey C. Fox"}},"title":"Panel on Cloud and Internet-of-Things.","venue":"IC2E","pages":"234","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Fox15","doi":"10.1109/IC2E.2015.102","ee":"https://doi.org/10.1109/IC2E.2015.102","url":"https://dblp.org/rec/conf/ic2e/Fox15"}, "url":"URL#3569833" }, { "@score":"1", "@id":"3569834", "info":{"authors":{"author":[{"@pid":"65/11200","text":"Constantin Gaul"},{"@pid":"118/1375","text":"Marc Koerner"},{"@pid":"24/2656","text":"Odej Kao"}]},"title":"Design and Implementation of a Cloud-Federation Agent for Software Defined Networking.","venue":"IC2E","pages":"323-328","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/GaulKK15","doi":"10.1109/IC2E.2015.58","ee":"https://doi.org/10.1109/IC2E.2015.58","url":"https://dblp.org/rec/conf/ic2e/GaulKK15"}, "url":"URL#3569834" }, { "@score":"1", "@id":"3569835", "info":{"authors":{"author":[{"@pid":"92/3476","text":"Wolfgang Gerlach"},{"@pid":"58/1874-1","text":"Wei Tang 0001"},{"@pid":"04/7098","text":"Andreas Wilke"},{"@pid":"63/735","text":"Dan Olson"},{"@pid":"42/6569","text":"Folker Meyer"}]},"title":"Container Orchestration for Scientific Workflows.","venue":"IC2E","pages":"377-378","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/GerlachTWOM15","doi":"10.1109/IC2E.2015.87","ee":"https://doi.org/10.1109/IC2E.2015.87","url":"https://dblp.org/rec/conf/ic2e/GerlachTWOM15"}, "url":"URL#3569835" }, { "@score":"1", "@id":"3569836", "info":{"authors":{"author":[{"@pid":"156/7390","text":"Ioannis Giannakopoulos"},{"@pid":"48/2152","text":"Dimitrios Tsoumakos"},{"@pid":"70/11205","text":"Nikolaos Papailiou"},{"@pid":"24/4627","text":"Nectarios Koziris"}]},"title":"PANIC: Modeling Application Performance over Virtualized Resources.","venue":"IC2E","pages":"213-218","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/GiannakopoulosT15","doi":"10.1109/IC2E.2015.27","ee":"https://doi.org/10.1109/IC2E.2015.27","url":"https://dblp.org/rec/conf/ic2e/GiannakopoulosT15"}, "url":"URL#3569836" }, { "@score":"1", "@id":"3569837", "info":{"authors":{"author":[{"@pid":"161/8015","text":"Lav Gupta"},{"@pid":"j/RajJain","text":"Raj Jain"},{"@pid":"29/2622","text":"Mohammed Samaka"}]},"title":"Dynamic Analysis of Application Delivery Network for Leveraging Software Defined Infrastructures.","venue":"IC2E","pages":"305-310","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/GuptaJS15","doi":"10.1109/IC2E.2015.51","ee":"https://doi.org/10.1109/IC2E.2015.51","url":"https://dblp.org/rec/conf/ic2e/GuptaJS15"}, "url":"URL#3569837" }, { "@score":"1", "@id":"3569838", "info":{"authors":{"author":{"@pid":"99/8152","text":"Mohammad Hamdaqa"}},"title":"A Bird's-Eye View on Modelling Malleable Multi-cloud Applications.","venue":"IC2E","pages":"505-507","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Hamdaqa15","doi":"10.1109/IC2E.2015.94","ee":"https://doi.org/10.1109/IC2E.2015.94","url":"https://dblp.org/rec/conf/ic2e/Hamdaqa15"}, "url":"URL#3569838" }, { "@score":"1", "@id":"3569839", "info":{"authors":{"author":[{"@pid":"99/8152","text":"Mohammad Hamdaqa"},{"@pid":"23/5313","text":"Ladan Tahvildari"}]},"title":"Stratus ML: A Layered Cloud Modeling Framework.","venue":"IC2E","pages":"96-105","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/HamdaqaT15","doi":"10.1109/IC2E.2015.42","ee":"https://doi.org/10.1109/IC2E.2015.42","url":"https://dblp.org/rec/conf/ic2e/HamdaqaT15"}, "url":"URL#3569839" }, { "@score":"1", "@id":"3569840", "info":{"authors":{"author":[{"@pid":"117/3629","text":"Benjamin Heintz"},{"@pid":"97/3628","text":"Abhishek Chandra"},{"@pid":"s/RameshKSitaraman","text":"Ramesh K. Sitaraman"}]},"title":"Towards Optimizing Wide-Area Streaming Analytics.","venue":"IC2E","pages":"452-457","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/HeintzCS15","doi":"10.1109/IC2E.2015.53","ee":"https://doi.org/10.1109/IC2E.2015.53","url":"https://dblp.org/rec/conf/ic2e/HeintzCS15"}, "url":"URL#3569840" }, { "@score":"1", "@id":"3569841", "info":{"authors":{"author":[{"@pid":"90/8524","text":"Dachuan Huang"},{"@pid":"24/4470-5","text":"Yang Song 0005"},{"@pid":"21/5885","text":"Ramani Routray"},{"@pid":"31/3488","text":"Feng Qin"}]},"title":"Smart Cache: An Optimized MapReduce Implementation of Frequent Itemset Mining.","venue":"IC2E","pages":"16-25","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/HuangSRQ15","doi":"10.1109/IC2E.2015.12","ee":"https://doi.org/10.1109/IC2E.2015.12","url":"https://dblp.org/rec/conf/ic2e/HuangSRQ15"}, "url":"URL#3569841" }, { "@score":"1", "@id":"3569842", "info":{"authors":{"author":[{"@pid":"86/4818","text":"Antonio Iera"},{"@pid":"66/6239","text":"Giacomo Morabito"},{"@pid":"42/4582","text":"Luigi Atzori"}]},"title":"The Social Internet of Things.","venue":"IC2E","pages":"1","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/IeraMA15","doi":"10.1109/IC2E.2015.68","ee":"https://doi.org/10.1109/IC2E.2015.68","url":"https://dblp.org/rec/conf/ic2e/IeraMA15"}, "url":"URL#3569842" }, { "@score":"1", "@id":"3569843", "info":{"authors":{"author":[{"@pid":"161/7938","text":"Saba Jamalian"},{"@pid":"21/6515","text":"Hassan Rajaei"}]},"title":"ASETS: A SDN Empowered Task Scheduling System for HPCaaS on the Cloud.","venue":"IC2E","pages":"329-334","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/JamalianR15","doi":"10.1109/IC2E.2015.56","ee":"https://doi.org/10.1109/IC2E.2015.56","url":"https://dblp.org/rec/conf/ic2e/JamalianR15"}, "url":"URL#3569843" }, { "@score":"1", "@id":"3569844", "info":{"authors":{"author":[{"@pid":"141/2123","text":"Hiranya Jayathilaka"},{"@pid":"87/1311","text":"Chandra Krintz"},{"@pid":"w/RichardWolski","text":"Rich Wolski"}]},"title":"EAGER: Deployment-Time API Governance for Modern PaaS Clouds.","venue":"IC2E","pages":"275-278","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/JayathilakaKW15","doi":"10.1109/IC2E.2015.69","ee":"https://doi.org/10.1109/IC2E.2015.69","url":"https://dblp.org/rec/conf/ic2e/JayathilakaKW15"}, "url":"URL#3569844" }, { "@score":"1", "@id":"3569845", "info":{"authors":{"author":[{"@pid":"17/4858","text":"Ivo Jimenez"},{"@pid":"83/2134","text":"Carlos Maltzahn"},{"@pid":"189/1241","text":"Adam Moody"},{"@pid":"05/772","text":"Kathryn M. Mohror"},{"@pid":"34/6823","text":"Jay F. Lofstead"},{"@pid":"a/RemziHArpaciDusseau","text":"Remzi H. Arpaci-Dusseau"},{"@pid":"a/AndreaCArpaciDusseau","text":"Andrea C. Arpaci-Dusseau"}]},"title":"The Role of Container Technology in Reproducible Computer Systems Research.","venue":"IC2E","pages":"379-385","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/JimenezMMMLAA15","doi":"10.1109/IC2E.2015.75","ee":"https://doi.org/10.1109/IC2E.2015.75","url":"https://dblp.org/rec/conf/ic2e/JimenezMMMLAA15"}, "url":"URL#3569845" }, { "@score":"1", "@id":"3569846", "info":{"authors":{"author":[{"@pid":"161/7948","text":"Karuna Pande Joshi"},{"@pid":"93/3722","text":"Claudia Pearce"}]},"title":"Automating Cloud Service Level Agreements Using Semantic Technologies.","venue":"IC2E","pages":"416-421","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/JoshiP15","doi":"10.1109/IC2E.2015.63","ee":"https://doi.org/10.1109/IC2E.2015.63","url":"https://dblp.org/rec/conf/ic2e/JoshiP15"}, "url":"URL#3569846" }, { "@score":"1", "@id":"3569847", "info":{"authors":{"author":[{"@pid":"88/2904","text":"Teemu Kanstrén"},{"@pid":"73/3391","text":"Sami Lehtonen"},{"@pid":"29/1736","text":"Reijo Savola"},{"@pid":"161/7898","text":"Hilkka Kukkohovi"},{"@pid":"h/KimmoHatonen","text":"Kimmo Hätönen"}]},"title":"Architecture for High Confidence Cloud Security Monitoring.","venue":"IC2E","pages":"195-200","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/KanstrenLSKH15","doi":"10.1109/IC2E.2015.21","ee":"https://doi.org/10.1109/IC2E.2015.21","url":"https://dblp.org/rec/conf/ic2e/KanstrenLSKH15"}, "url":"URL#3569847" }, { "@score":"1", "@id":"3569848", "info":{"authors":{"author":[{"@pid":"158/4356","text":"Pradeeban Kathiravelu"},{"@pid":"v/LuisVeiga","text":"Luís Veiga"}]},"title":"An Expressive Simulator for Dynamic Network Flows.","venue":"IC2E","pages":"311-316","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/KathiraveluV15","doi":"10.1109/IC2E.2015.43","ee":"https://doi.org/10.1109/IC2E.2015.43","url":"https://dblp.org/rec/conf/ic2e/KathiraveluV15"}, "url":"URL#3569848" }, { "@score":"1", "@id":"3569849", "info":{"authors":{"author":[{"@pid":"29/5816","text":"Yasuharu Katsuno"},{"@pid":"52/175","text":"Hitomi Takahashi"}]},"title":"An Automated Parallel Approach for Rapid Deployment of Composite Application Servers.","venue":"IC2E","pages":"126-134","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/KatsunoT15","doi":"10.1109/IC2E.2015.16","ee":"https://doi.org/10.1109/IC2E.2015.16","url":"https://dblp.org/rec/conf/ic2e/KatsunoT15"}, "url":"URL#3569849" }, { "@score":"1", "@id":"3569850", "info":{"authors":{"author":[{"@pid":"158/5947","text":"John Kolb"},{"@pid":"37/10626","text":"Prashant Chaudhary"},{"@pid":"161/7964","text":"Alexander Schillinger"},{"@pid":"97/3628","text":"Abhishek Chandra"},{"@pid":"52/4225","text":"Jon B. Weissman"}]},"title":"Cloud-Based, User-Centric Mobile Application Optimization.","venue":"IC2E","pages":"26-35","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/KolbCSCW15","doi":"10.1109/IC2E.2015.28","ee":"https://doi.org/10.1109/IC2E.2015.28","url":"https://dblp.org/rec/conf/ic2e/KolbCSCW15"}, "url":"URL#3569850" }, { "@score":"1", "@id":"3569851", "info":{"authors":{"author":{"@pid":"116/1011","text":"Jun Li"}},"title":"In-memory Computing for Scalable Data Analytics.","venue":"IC2E","pages":"93-94","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Li15","doi":"10.1109/IC2E.2015.59","ee":"https://doi.org/10.1109/IC2E.2015.59","url":"https://dblp.org/rec/conf/ic2e/Li15"}, "url":"URL#3569851" }, { "@score":"1", "@id":"3569852", "info":{"authors":{"author":[{"@pid":"42/5208","text":"Wubin Li"},{"@pid":"54/5327","text":"Ali Kanso"}]},"title":"Comparing Containers versus Virtual Machines for Achieving High Availability.","venue":"IC2E","pages":"353-358","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/LiK15","doi":"10.1109/IC2E.2015.79","ee":"https://doi.org/10.1109/IC2E.2015.79","url":"https://dblp.org/rec/conf/ic2e/LiK15"}, "url":"URL#3569852" }, { "@score":"1", "@id":"3569853", "info":{"authors":{"author":[{"@pid":"42/5208","text":"Wubin Li"},{"@pid":"54/5327","text":"Ali Kanso"},{"@pid":"55/1758","text":"Abdelouahed Gherbi"}]},"title":"Leveraging Linux Containers to Achieve High Availability for Cloud Services.","venue":"IC2E","pages":"76-83","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/LiKG15","doi":"10.1109/IC2E.2015.17","ee":"https://doi.org/10.1109/IC2E.2015.17","url":"https://dblp.org/rec/conf/ic2e/LiKG15"}, "url":"URL#3569853" }, { "@score":"1", "@id":"3569854", "info":{"authors":{"author":[{"@pid":"151/5134","text":"Guyue Liu"},{"@pid":"w/TimothyWood","text":"Timothy Wood 0001"}]},"title":"Cloud-Scale Application Performance Monitoring with SDN and NFV.","venue":"IC2E","pages":"440-445","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/LiuW15","doi":"10.1109/IC2E.2015.45","ee":"https://doi.org/10.1109/IC2E.2015.45","url":"https://dblp.org/rec/conf/ic2e/LiuW15"}, "url":"URL#3569854" }, { "@score":"1", "@id":"3569855", "info":{"authors":{"author":[{"@pid":"19/953","text":"Beniamino Di Martino"},{"@pid":"117/8141","text":"Giuseppina Cretella"},{"@pid":"85/1860-1","text":"Antonio Esposito 0001"},{"@pid":"74/2188","text":"Alexander Willner"},{"@pid":"161/8017","text":"A. Alloush"},{"@pid":"24/634","text":"David Bernstein"},{"@pid":"24/8331","text":"Deepak Vij"},{"@pid":"161/8025","text":"J. Weinman"}]},"title":"Towards an Ontology-Based Intercloud Resource Catalogue - The IEEE P2302 Intercloud Approach for a Semantic Resource Exchange.","venue":"IC2E","pages":"458-464","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MartinoCEWABVW15","doi":"10.1109/IC2E.2015.76","ee":"https://doi.org/10.1109/IC2E.2015.76","url":"https://dblp.org/rec/conf/ic2e/MartinoCEWABVW15"}, "url":"URL#3569855" }, { "@score":"1", "@id":"3569856", "info":{"authors":{"author":[{"@pid":"161/7992","text":"M. Garrett McGrath"},{"@pid":"161/7951","text":"Patrick Raycroft"},{"@pid":"161/7970","text":"Paul R. Brenner"}]},"title":"Intercloud Networks Performance Analysis.","venue":"IC2E","pages":"487-492","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/McGrathRB15","doi":"10.1109/IC2E.2015.85","ee":"https://doi.org/10.1109/IC2E.2015.85","url":"https://dblp.org/rec/conf/ic2e/McGrathRB15"}, "url":"URL#3569856" }, { "@score":"1", "@id":"3569857", "info":{"authors":{"author":[{"@pid":"151/5038","text":"Amardeep Mehta"},{"@pid":"156/3240","text":"Jonas Durango"},{"@pid":"03/2542","text":"Johan Tordsson"},{"@pid":"36/2690","text":"Erik Elmroth"}]},"title":"Online Spike Detection in Cloud Workloads.","venue":"IC2E","pages":"446-451","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MehtaDTE15","doi":"10.1109/IC2E.2015.50","ee":"https://doi.org/10.1109/IC2E.2015.50","url":"https://dblp.org/rec/conf/ic2e/MehtaDTE15"}, "url":"URL#3569857" }, { "@score":"1", "@id":"3569858", "info":{"authors":{"author":[{"@pid":"161/7909","text":"Khaleel Mershad 0001"},{"@pid":"99/5275","text":"Qutaibah M. Malluhi"},{"@pid":"o/MouradOuzzani","text":"Mourad Ouzzani"},{"@pid":"01/7213","text":"MingJie Tang"},{"@pid":"a/WGAref","text":"Walid G. Aref"}]},"title":"Approving Updates in Collaborative Databases.","venue":"IC2E","pages":"42-47","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MershadMOTA15","doi":"10.1109/IC2E.2015.31","ee":"https://doi.org/10.1109/IC2E.2015.31","url":"https://dblp.org/rec/conf/ic2e/MershadMOTA15"}, "url":"URL#3569858" }, { "@score":"1", "@id":"3569859", "info":{"authors":{"author":[{"@pid":"46/4581","text":"Reza Farrahi Moghaddam"},{"@pid":"69/4317","text":"Mohamed Cheriet"}]},"title":"Smart Packet: Re-distributing the Routing Intelligence among Network Components in SDNs.","venue":"IC2E","pages":"293-298","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MoghaddamC15","doi":"10.1109/IC2E.2015.44","ee":"https://doi.org/10.1109/IC2E.2015.44","url":"https://dblp.org/rec/conf/ic2e/MoghaddamC15"}, "url":"URL#3569859" }, { "@score":"1", "@id":"3569860", "info":{"authors":{"author":[{"@pid":"161/7997","text":"Roberto Morabito"},{"@pid":"119/0659","text":"Jimmy Kjällman"},{"@pid":"89/7882","text":"Miika Komu"}]},"title":"Hypervisors vs. Lightweight Virtualization: A Performance Comparison.","venue":"IC2E","pages":"386-393","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MorabitoKK15","doi":"10.1109/IC2E.2015.74","ee":"https://doi.org/10.1109/IC2E.2015.74","url":"https://dblp.org/rec/conf/ic2e/MorabitoKK15"}, "url":"URL#3569860" }, { "@score":"1", "@id":"3569861", "info":{"authors":{"author":{"@pid":"161/7913","text":"Stephen Mutkoski"}},"title":"National Cloud Computing Principles: Guidance for Public Sector Authorities Moving to the Cloud.","venue":"IC2E","pages":"404-409","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Mutkoski15","doi":"10.1109/IC2E.2015.104","ee":"https://doi.org/10.1109/IC2E.2015.104","url":"https://dblp.org/rec/conf/ic2e/Mutkoski15"}, "url":"URL#3569861" }, { "@score":"1", "@id":"3569862", "info":{"authors":{"author":[{"@pid":"131/4206","text":"Ioannis Mytilinis"},{"@pid":"48/2152","text":"Dimitrios Tsoumakos"},{"@pid":"k/VerenaKantere","text":"Verena Kantere"},{"@pid":"98/1941","text":"Anastassios Nanos"},{"@pid":"24/4627","text":"Nectarios Koziris"}]},"title":"I/O Performance Modeling for Big Data Applications over Cloud Infrastructures.","venue":"IC2E","pages":"201-206","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/MytilinisTKNK15","doi":"10.1109/IC2E.2015.29","ee":"https://doi.org/10.1109/IC2E.2015.29","url":"https://dblp.org/rec/conf/ic2e/MytilinisTKNK15"}, "url":"URL#3569862" }, { "@score":"1", "@id":"3569863", "info":{"authors":{"author":{"@pid":"00/9379","text":"Parth Nagarkar"}},"title":"Compressed Hierarchical Bitmaps for Efficiently Processing Different Query Workloads.","venue":"IC2E","pages":"508-510","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Nagarkar15","doi":"10.1109/IC2E.2015.99","ee":"https://doi.org/10.1109/IC2E.2015.99","url":"https://dblp.org/rec/conf/ic2e/Nagarkar15"}, "url":"URL#3569863" }, { "@score":"1", "@id":"3569864", "info":{"authors":{"author":{"@pid":"39/6523","text":"Youngchoon Park"}},"title":"Connected Smart Buildings, a New Way to Interact with Buildings.","venue":"IC2E","pages":"5","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Park15","doi":"10.1109/IC2E.2015.57","ee":"https://doi.org/10.1109/IC2E.2015.57","url":"https://dblp.org/rec/conf/ic2e/Park15"}, "url":"URL#3569864" }, { "@score":"1", "@id":"3569865", "info":{"authors":{"author":[{"@pid":"144/4204","text":"Thomas F. J.-M. Pasquier"},{"@pid":"161/7915","text":"Julia E. Powles"}]},"title":"Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control.","venue":"IC2E","pages":"410-415","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/PasquierP15","doi":"10.1109/IC2E.2015.71","ee":"https://doi.org/10.1109/IC2E.2015.71","url":"https://dblp.org/rec/conf/ic2e/PasquierP15"}, "url":"URL#3569865" }, { "@score":"1", "@id":"3569866", "info":{"authors":{"author":[{"@pid":"144/4204","text":"Thomas F. J.-M. Pasquier"},{"@pid":"53/3181","text":"Jatinder Singh"},{"@pid":"b/JeanBacon","text":"Jean Bacon"}]},"title":"Information Flow Control for Strong Protection with Flexible Sharing in PaaS.","venue":"IC2E","pages":"279-282","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/PasquierSB15","doi":"10.1109/IC2E.2015.64","ee":"https://doi.org/10.1109/IC2E.2015.64","url":"https://dblp.org/rec/conf/ic2e/PasquierSB15"}, "url":"URL#3569866" }, { "@score":"1", "@id":"3569867", "info":{"authors":{"author":[{"@pid":"37/9569","text":"Mithun Paul"},{"@pid":"c/ChristianSCollberg","text":"Christian S. Collberg"},{"@pid":"129/5372","text":"Derek E. Bambauer"}]},"title":"A Possible Solution for Privacy Preserving Cloud Data Storage.","venue":"IC2E","pages":"397-403","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/PaulCB15","doi":"10.1109/IC2E.2015.103","ee":"https://doi.org/10.1109/IC2E.2015.103","url":"https://dblp.org/rec/conf/ic2e/PaulCB15"}, "url":"URL#3569867" }, { "@score":"1", "@id":"3569868", "info":{"authors":{"author":[{"@pid":"128/8104","text":"Alexander Pucher"},{"@pid":"161/7959","text":"Emre Gul"},{"@pid":"w/RichardWolski","text":"Rich Wolski"},{"@pid":"87/1311","text":"Chandra Krintz"}]},"title":"Using Trustworthy Simulation to Engineer Cloud Schedulers.","venue":"IC2E","pages":"256-265","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/PucherGWK15","doi":"10.1109/IC2E.2015.14","ee":"https://doi.org/10.1109/IC2E.2015.14","url":"https://dblp.org/rec/conf/ic2e/PucherGWK15"}, "url":"URL#3569868" }, { "@score":"1", "@id":"3569869", "info":{"authors":{"author":{"@pid":"124/0457","text":"Karima Qayumi"}},"title":"Multi-agent Based Intelligence Generation from Very Large Datasets.","venue":"IC2E","pages":"502-504","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Qayumi15","doi":"10.1109/IC2E.2015.96","ee":"https://doi.org/10.1109/IC2E.2015.96","url":"https://dblp.org/rec/conf/ic2e/Qayumi15"}, "url":"URL#3569869" }, { "@score":"1", "@id":"3569870", "info":{"authors":{"author":{"@pid":"124/2158","text":"Safraz Rampersaud"}},"title":"Sharing-Aware Resource Management Algorithms for Virtual Computing Environments.","venue":"IC2E","pages":"493-495","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Rampersaud15","doi":"10.1109/IC2E.2015.88","ee":"https://doi.org/10.1109/IC2E.2015.88","url":"https://dblp.org/rec/conf/ic2e/Rampersaud15"}, "url":"URL#3569870" }, { "@score":"1", "@id":"3569871", "info":{"authors":{"author":[{"@pid":"124/2158","text":"Safraz Rampersaud"},{"@pid":"g/DanielGrosu","text":"Daniel Grosu"}]},"title":"A Multi-resource Sharing-Aware Approximation Algorithm for Virtual Machine Maximization.","venue":"IC2E","pages":"266-274","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/RampersaudG15","doi":"10.1109/IC2E.2015.20","ee":"https://doi.org/10.1109/IC2E.2015.20","url":"https://dblp.org/rec/conf/ic2e/RampersaudG15"}, "url":"URL#3569871" }, { "@score":"1", "@id":"3569872", "info":{"authors":{"author":[{"@pid":"121/2685","text":"Kaveh Razavi"},{"@pid":"139/7682","text":"Ana Ion"},{"@pid":"161/7943","text":"Genc Tato"},{"@pid":"161/4146","text":"Kyuho Jeong"},{"@pid":"73/2450","text":"Renato J. O. Figueiredo"},{"@pid":"63/6649","text":"Guillaume Pierre"},{"@pid":"k/ThiloKielmann","text":"Thilo Kielmann"}]},"title":"Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure.","venue":"IC2E","pages":"106-115","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/RazaviITJFPK15","doi":"10.1109/IC2E.2015.19","ee":"https://doi.org/10.1109/IC2E.2015.19","url":"https://dblp.org/rec/conf/ic2e/RazaviITJFPK15"}, "url":"URL#3569872" }, { "@score":"1", "@id":"3569873", "info":{"authors":{"author":[{"@pid":"161/7927","text":"Javier Rey"},{"@pid":"161/7981","text":"Matias Cogorno"},{"@pid":"50/7664","text":"Sergio Nesmachnow"},{"@pid":"b/LuizAngeloBarchet","text":"Luiz Angelo Steffenel"}]},"title":"Efficient Prototyping of Fault Tolerant Map-Reduce Applications with Docker-Hadoop.","venue":"IC2E","pages":"369-376","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/ReyCNS15","doi":"10.1109/IC2E.2015.73","ee":"https://doi.org/10.1109/IC2E.2015.73","url":"https://dblp.org/rec/conf/ic2e/ReyCNS15"}, "url":"URL#3569873" }, { "@score":"1", "@id":"3569874", "info":{"authors":{"author":{"@pid":"21/5885","text":"Ramani Routray"}},"title":"Cloud Storage Infrastructure Optimization Analytics.","venue":"IC2E","pages":"92","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Routray15","doi":"10.1109/IC2E.2015.83","ee":"https://doi.org/10.1109/IC2E.2015.83","url":"https://dblp.org/rec/conf/ic2e/Routray15"}, "url":"URL#3569874" }, { "@score":"1", "@id":"3569875", "info":{"authors":{"author":[{"@pid":"91/4689","text":"Haythem Bany Salameh"},{"@pid":"161/8021","text":"Mohammed Fozi Dhainat"},{"@pid":"161/8026","text":"Ali Al-Hajji"},{"@pid":"161/7950","text":"Raed Aqeli"},{"@pid":"115/6482","text":"Mohammad Fathi"}]},"title":"A Two-Level Cluster-Based Cognitive Radio Sensor Network: System Architecture, Hardware Design, and Distributed Protocols.","venue":"IC2E","pages":"287-292","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SalamehDAAF15","doi":"10.1109/IC2E.2015.46","ee":"https://doi.org/10.1109/IC2E.2015.46","url":"https://dblp.org/rec/conf/ic2e/SalamehDAAF15"}, "url":"URL#3569875" }, { "@score":"1", "@id":"3569876", "info":{"authors":{"author":[{"@pid":"95/9990","text":"Mohamed Sarwat"},{"@pid":"94/5893","text":"Mohamed F. Mokbel"}]},"title":"Mobi Social (Mobile and Social) Data Management: A Tutorial.","venue":"IC2E","pages":"4","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SarwatM15","doi":"10.1109/IC2E.2015.34","ee":"https://doi.org/10.1109/IC2E.2015.34","url":"https://dblp.org/rec/conf/ic2e/SarwatM15"}, "url":"URL#3569876" }, { "@score":"1", "@id":"3569877", "info":{"authors":{"author":[{"@pid":"151/4986","text":"John T. Saxon"},{"@pid":"58/6025","text":"Behzad Bordbar"},{"@pid":"48/5227","text":"Keith Harrison"}]},"title":"Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud.","venue":"IC2E","pages":"155-164","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SaxonBH15","doi":"10.1109/IC2E.2015.26","ee":"https://doi.org/10.1109/IC2E.2015.26","url":"https://dblp.org/rec/conf/ic2e/SaxonBH15"}, "url":"URL#3569877" }, { "@score":"1", "@id":"3569878", "info":{"authors":{"author":[{"@pid":"31/6720","text":"Seetharami R. Seelam"},{"@pid":"80/3979","text":"Paolo Dettori"},{"@pid":"23/1795","text":"Peter H. Westerink"},{"@pid":"161/7989","text":"Ben Bo Yang"}]},"title":"Polyglot Application Auto Scaling Service for Platform as a Service Cloud.","venue":"IC2E","pages":"84-91","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SeelamDWY15","doi":"10.1109/IC2E.2015.30","ee":"https://doi.org/10.1109/IC2E.2015.30","url":"https://dblp.org/rec/conf/ic2e/SeelamDWY15"}, "url":"URL#3569878" }, { "@score":"1", "@id":"3569879", "info":{"authors":{"author":{"@pid":"s/HowardJaySiegel","text":"Howard Jay Siegel"}},"title":"Panel on Cloud Sustainability.","venue":"IC2E","pages":"95","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Siegel15","doi":"10.1109/IC2E.2015.81","ee":"https://doi.org/10.1109/IC2E.2015.81","url":"https://dblp.org/rec/conf/ic2e/Siegel15"}, "url":"URL#3569879" }, { "@score":"1", "@id":"3569880", "info":{"authors":{"author":[{"@pid":"53/3181","text":"Jatinder Singh"},{"@pid":"144/4204","text":"Thomas F. J.-M. Pasquier"},{"@pid":"b/JeanBacon","text":"Jean Bacon"},{"@pid":"55/684","text":"David M. Eyers"}]},"title":"Integrating Messaging Middleware and Information Flow Control.","venue":"IC2E","pages":"54-59","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SinghPBE15","doi":"10.1109/IC2E.2015.13","ee":"https://doi.org/10.1109/IC2E.2015.13","url":"https://dblp.org/rec/conf/ic2e/SinghPBE15"}, "url":"URL#3569880" }, { "@score":"1", "@id":"3569881", "info":{"authors":{"author":[{"@pid":"39/4743","text":"Aleksander Slominski"},{"@pid":"31/4489","text":"Vinod Muthusamy"},{"@pid":"36/4111","text":"Rania Khalaf"}]},"title":"Building a Multi-tenant Cloud Service from Legacy Code with Docker Containers.","venue":"IC2E","pages":"394-396","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SlominskiMK15","doi":"10.1109/IC2E.2015.66","ee":"https://doi.org/10.1109/IC2E.2015.66","url":"https://dblp.org/rec/conf/ic2e/SlominskiMK15"}, "url":"URL#3569881" }, { "@score":"1", "@id":"3569882", "info":{"authors":{"author":{"@pid":"128/7855","text":"Mikhail Strizhov"}},"title":"Towards a Practical and Efficient Search over Encrypted Data in the Cloud.","venue":"IC2E","pages":"496-498","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Strizhov15","doi":"10.1109/IC2E.2015.86","ee":"https://doi.org/10.1109/IC2E.2015.86","url":"https://dblp.org/rec/conf/ic2e/Strizhov15"}, "url":"URL#3569882" }, { "@score":"1", "@id":"3569883", "info":{"authors":{"author":[{"@pid":"128/7855","text":"Mikhail Strizhov"},{"@pid":"r/IndrajitRay","text":"Indrajit Ray"}]},"title":"Substring Position Search over Encrypted Cloud Data Using Tree-Based Index.","venue":"IC2E","pages":"165-174","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/StrizhovR15","doi":"10.1109/IC2E.2015.33","ee":"https://doi.org/10.1109/IC2E.2015.33","url":"https://dblp.org/rec/conf/ic2e/StrizhovR15"}, "url":"URL#3569883" }, { "@score":"1", "@id":"3569884", "info":{"authors":{"author":[{"@pid":"121/2717","text":"Xiaoye Sun"},{"@pid":"35/2683","text":"T. S. Eugene Ng"},{"@pid":"48/2396","text":"Guohui Wang"}]},"title":"Software-Defined Flow Table Pipeline.","venue":"IC2E","pages":"335-340","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/SunNW15","doi":"10.1109/IC2E.2015.52","ee":"https://doi.org/10.1109/IC2E.2015.52","url":"https://dblp.org/rec/conf/ic2e/SunNW15"}, "url":"URL#3569884" }, { "@score":"1", "@id":"3569885", "info":{"authors":{"author":[{"@pid":"119/0930","text":"Nikola Tankovic"},{"@pid":"62/1717","text":"Tihana Galinac Grbac"},{"@pid":"48/6098","text":"Hong Linh Truong 0001"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Transforming Vertical Web Applications into Elastic Cloud Applications.","venue":"IC2E","pages":"135-144","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/TankovicGTD15","doi":"10.1109/IC2E.2015.15","ee":"https://doi.org/10.1109/IC2E.2015.15","url":"https://dblp.org/rec/conf/ic2e/TankovicGTD15"}, "url":"URL#3569885" }, { "@score":"1", "@id":"3569886", "info":{"authors":{"author":[{"@pid":"81/4116","text":"Lo'ai Ali Tawalbeh"},{"@pid":"161/8010","text":"Yousef Haddad"},{"@pid":"161/8001","text":"Omar Khamis"},{"@pid":"143/6399","text":"Fahd M. Aldosari"},{"@pid":"29/5366","text":"Elhadj Benkhelifa"}]},"title":"Efficient Software-Based Mobile Cloud Computing Framework.","venue":"IC2E","pages":"317-322","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/TawalbehHKAB15","doi":"10.1109/IC2E.2015.48","ee":"https://doi.org/10.1109/IC2E.2015.48","url":"https://dblp.org/rec/conf/ic2e/TawalbehHKAB15"}, "url":"URL#3569886" }, { "@score":"1", "@id":"3569887", "info":{"authors":{"author":{"@pid":"161/7986","text":"Douglas Terry"}},"title":"Cloud Storage Services: A Model of (In)Consistency.","venue":"IC2E","pages":"235","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/Terry15","doi":"10.1109/IC2E.2015.82","ee":"https://doi.org/10.1109/IC2E.2015.82","url":"https://dblp.org/rec/conf/ic2e/Terry15"}, "url":"URL#3569887" }, { "@score":"1", "@id":"3569888", "info":{"authors":{"author":[{"@pid":"38/2083","text":"Peipei Wang"},{"@pid":"142/1083","text":"Daniel Joseph Dean"},{"@pid":"55/6848","text":"Xiaohui Gu"}]},"title":"Understanding Real World Data Corruptions in Cloud Systems.","venue":"IC2E","pages":"116-125","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/WangDG15","doi":"10.1109/IC2E.2015.41","ee":"https://doi.org/10.1109/IC2E.2015.41","url":"https://dblp.org/rec/conf/ic2e/WangDG15"}, "url":"URL#3569888" }, { "@score":"1", "@id":"3569889", "info":{"authors":{"author":[{"@pid":"49/8549","text":"Wenting Wang"},{"@pid":"26/628","text":"Le Xu"},{"@pid":"02/6135","text":"Indranil Gupta"}]},"title":"Scale Up vs. Scale Out in Cloud Storage and Graph Processing Systems.","venue":"IC2E","pages":"428-433","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/WangXG15","doi":"10.1109/IC2E.2015.55","ee":"https://doi.org/10.1109/IC2E.2015.55","url":"https://dblp.org/rec/conf/ic2e/WangXG15"}, "url":"URL#3569889" }, { "@score":"1", "@id":"3569890", "info":{"authors":{"author":[{"@pid":"134/1173","text":"Johannes Wettinger"},{"@pid":"36/6537","text":"Vasilios Andrikopoulos"},{"@pid":"l/FrankLeymann","text":"Frank Leymann"}]},"title":"Automated Capturing and Systematic Usage of DevOps Knowledge for Cloud Applications.","venue":"IC2E","pages":"60-65","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/WettingerAL15","doi":"10.1109/IC2E.2015.23","ee":"https://doi.org/10.1109/IC2E.2015.23","url":"https://dblp.org/rec/conf/ic2e/WettingerAL15"}, "url":"URL#3569890" }, { "@score":"1", "@id":"3569891", "info":{"authors":{"author":[{"@pid":"74/2188","text":"Alexander Willner"},{"@pid":"161/7962","text":"Robyn Loughnane"},{"@pid":"47/2348","text":"Thomas Magedanz"}]},"title":"FIDDLE: Federated Infrastructure Discovery and Description Language.","venue":"IC2E","pages":"465-471","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/WillnerLM15","doi":"10.1109/IC2E.2015.77","ee":"https://doi.org/10.1109/IC2E.2015.77","url":"https://dblp.org/rec/conf/ic2e/WillnerLM15"}, "url":"URL#3569891" }, { "@score":"1", "@id":"3569892", "info":{"authors":{"author":[{"@pid":"70/1556","text":"Yasuhiro Yamasaki"},{"@pid":"86/3844","text":"Masayoshi Aritsugi"}]},"title":"A Case Study of IaaS and SaaS in a Public Cloud.","venue":"IC2E","pages":"434-439","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/YamasakiA15","doi":"10.1109/IC2E.2015.54","ee":"https://doi.org/10.1109/IC2E.2015.54","url":"https://dblp.org/rec/conf/ic2e/YamasakiA15"}, "url":"URL#3569892" }, { "@score":"1", "@id":"3569893", "info":{"authors":{"author":[{"@pid":"66/10084","text":"Yongen Yu"},{"@pid":"62/1197","text":"Hongbo Zou"},{"@pid":"58/1874-1","text":"Wei Tang 0001"},{"@pid":"01/7020","text":"Liwei Liu"},{"@pid":"74/1809","text":"Fei Teng"}]},"title":"Flex Tuner: A Flexible Container-Based Tuning System for Cloud Applications.","venue":"IC2E","pages":"145-154","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/YuZTLT15","doi":"10.1109/IC2E.2015.24","ee":"https://doi.org/10.1109/IC2E.2015.24","url":"https://dblp.org/rec/conf/ic2e/YuZTLT15"}, "url":"URL#3569893" }, { "@score":"1", "@id":"3569894", "info":{"authors":{"author":[{"@pid":"60/2536","text":"Rui Zhang"},{"@pid":"82/0","text":"Min Li"},{"@pid":"56/3008","text":"Dean Hildebrand"}]},"title":"Finding the Big Data Sweet Spot: Towards Automatically Recommending Configurations for Hadoop Clusters on Docker Containers.","venue":"IC2E","pages":"365-368","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/ZhangLH15","doi":"10.1109/IC2E.2015.101","ee":"https://doi.org/10.1109/IC2E.2015.101","url":"https://dblp.org/rec/conf/ic2e/ZhangLH15"}, "url":"URL#3569894" }, { "@score":"1", "@id":"3569895", "info":{"authors":{"author":[{"@pid":"24/8524","text":"Bingjing Zhang"},{"@pid":"84/9079","text":"Yang Ruan"},{"@pid":"68/8357","text":"Judy Qiu"}]},"title":"Harp: Collective Communication on Hadoop.","venue":"IC2E","pages":"228-233","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/ZhangRQ15","doi":"10.1109/IC2E.2015.35","ee":"https://doi.org/10.1109/IC2E.2015.35","url":"https://dblp.org/rec/conf/ic2e/ZhangRQ15"}, "url":"URL#3569895" }, { "@score":"1", "@id":"3569896", "info":{"authors":{"author":[{"@pid":"73/9688","text":"Qingji Zheng"},{"@pid":"78/2715","text":"Shouhuai Xu"}]},"title":"Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.","venue":"IC2E","pages":"175-184","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/ZhengX15","doi":"10.1109/IC2E.2015.38","ee":"https://doi.org/10.1109/IC2E.2015.38","url":"https://dblp.org/rec/conf/ic2e/ZhengX15"}, "url":"URL#3569896" }, { "@score":"1", "@id":"3569897", "info":{"authors":{"author":[{"@pid":"70/10367","text":"Judicael A. Zounmevo"},{"@pid":"59/6270","text":"Swann Perarnau"},{"@pid":"74/6622","text":"Kamil Iskra"},{"@pid":"34/146","text":"Kazutomo Yoshii"},{"@pid":"39/2283","text":"Roberto Gioiosa"},{"@pid":"57/3302","text":"Brian Van Essen"},{"@pid":"75/273","text":"Maya B. Gokhale"},{"@pid":"44/6007","text":"Edgar A. León"}]},"title":"A Container-Based Approach to OS Specialization for Exascale Computing.","venue":"IC2E","pages":"359-364","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/ic2e/ZounmevoPIYGEGL15","doi":"10.1109/IC2E.2015.78","ee":"https://doi.org/10.1109/IC2E.2015.78","url":"https://dblp.org/rec/conf/ic2e/ZounmevoPIYGEGL15"}, "url":"URL#3569897" }, { "@score":"1", "@id":"3669826", "info":{"title":"2015 IEEE International Conference on Cloud Engineering, IC2E 2015, Tempe, AZ, USA, March 9-13, 2015","venue":"IC2E","publisher":"IEEE Computer Society","year":"2015","type":"Editorship","key":"conf/ic2e/2015","ee":"https://ieeexplore.ieee.org/xpl/conhome/7092813/proceeding","url":"https://dblp.org/rec/conf/ic2e/2015"}, "url":"URL#3669826" } ] } } } )