


default search action
ICC 2016: Cambridge, UK
- Proceedings of the International Conference on Internet of Things and Cloud Computing, Cambridge, UK, March 22-23, 2016. ACM 2016, ISBN 978-1-4503-4063-2

- Ahcène Bounceur:

CupCarbon: A New Platform for Designing and Simulating Smart-City and IoT Wireless Sensor Networks (SCI-WSN). 1:1 - Homero Toral-Cruz:

Self-Similarity in Voice over Internet Traffic. 2:1 - Djallel Eddine Boubiche

:
Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor Networks. 3:1 - Mohammad Hammoudeh:

Putting the lab on the map: A wireless sensor network system for border security and surveillance. 4:1 - Bill Karakostas, Nik Bessis

:
Intelligent Brokers in an Internet of Things for Logistics. 5:1-5:7 - Ankita Sharma

, Hema Banati
:
A Framework for Implementing Trust in Cloud Computing. 6:1-6:7 - Meriem Azaiez, Walid Chainbi

:
A Multi-agent System Architecture for Self-Healing Cloud Infrastructure. 7:1-7:6 - Taha Alwajeeh, Pierre Combeau, Ahcène Bounceur, Rodolphe Vauzelle:

Efficient Method for Associating Radio Propagation Models with Spatial Partitioning for Smart City Applications. 8:1-8:7 - Talal Albalawi

, Austin Melton, Michael Rothstein:
A New Approach to Data Dynamic Integrity Control. 9:1-9:8 - Alshaimaa Abo-Alian

, Nagwa L. Badr, Mohamed F. Tolba:
Authentication as a Service for Cloud Computing. 10:1-10:7 - Tarek Elghazaly

, Amal Mahmoud, Hesham A. Hefny
:
Political Sentiment Analysis Using Twitter Data. 11:1-11:5 - Suchi Kumari

, Anurag Singh
, Priya Ranjan:
Towards A Framework for Rate Control on Dynamic Communication Networks. 12:1-12:7 - A. B. N. Alvi, Usman Qamar

, Abdul Wahab Muzaffar
, Wasi Haider Butt
:
A Novel Hybrid Classifiers based Model for mining in Neuro-imaging. 13:1-13:6 - Alfredo Cuzzocrea:

Warehousing and Protecting Big Data: State-Of-The-Art-Analysis, Methodologies, Future Challenges. 14:1-14:7 - Bhaskar Bhuyan, Nityananda Sarma

:
A QoS aware Routing Protocol in Wireless Sensor Networks with Mobile Base Stations. 15:1-15:6 - Majed Almubaddel, Ahmed M. Elmogy

:
Cloud Computing Antecedents, Challenges, and Directions. 16:1-16:5 - Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier

, Changyu Dong, David M. Eyers, Jean Bacon:
Information Flow Control with Minimal Tag Disclosure. 17:1-17:4 - Abdel-Rahman Al-Ghuwairi, Hazem Eid, Mohammad Aloran, Zaher Salah

, Aladdin Hussein Baarah, Ahmad A. Al-Oqaily
:
A mutation-based model to rank testing as a service (TaaS) Providers in cloud computing. 18:1-18:5 - Enrique Festijo, Younchan Jung

:
An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems. 19:1-19:12 - Amita Ajith Kamath, Chirag Jamadagni, K. Chandrasekaran

:
VirtTorrent: BitTorrent for Inter-VM File Distribution. 20:1-20:7 - Geun-Jun Kim, Bongsoon Kang:

Automation System Architecture For Barcode Region Detection Algorithm. 21:1-21:4 - Moudhi M. Aljamea, Ljiljana Brankovic

, Jia Gao, Costas S. Iliopoulos, M. Samiruzzaman:
Smart Meter Data Analysis. 22:1-22:6 - Moudhi M. Aljamea, Costas S. Iliopoulos, M. Samiruzzaman:

Detection Of URL In Image Steganography. 23:1-23:6 - Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook Al-Rakhami

, Majed A. AlRubaian, Atif Alamri:
A Framework for Optimum Selection of Online Social Network Management Systems. 24:1-24:6 - Mabrook Al-Rakhami

, Ahmad Alhamed:
Cloud-based Graphical Simulation Tool of ECG for Educational Purpose. 25:1-25:6 - Hassan Saad Alqahtani

, Paul Sant
:
Multiple-Clouds Computing Security Approaches: A Comparative Study. 26:1-26:6 - Amir Mohamed Talib

, Fahad Omar Alomary:
Cloud Computing Based E-Commerce as a Service Model: Impacts and Recommendations. 27:1-27:7 - Nyan Lin, Brian M. Kurkoski, Yuto Lim

, Yasuo Tan:
Balanced Cooperative Linear Data Exchange with Physical Layer Network Coding. 28:1-28:6 - Wan Aida Nadia Wan Abdullah

, Naimah Yaakob
, Mohamed Elshaikh Elobaid
, Mohd Nazri Mohd Warip
, Siti Asilah Yah:
Energy-Efficient Remote Healthcare Monitoring Using IoT: A Review of Trends and Challenges. 29:1-29:8 - Mohammad N. Khalaf

, Abdel-Rahman Al-Ghuwairi, Laith Al-Yasen:
A Trust Framework for Ranking User as a Cloud Provider in Peer-to-Peer cloud system. 30:1-30:5 - Marnel Peradilla

, Younchan Jung
:
Combined Operations of Mobility and NAT Management on the Horizontal Model of Software-Defined Networking. 31:1-31:10 - Akanksha Das, Ravi Kant Kumar

, Dakshina Ranjan Kisku
:
Heterogeneous Face Detection. 32:1-32:6 - Sriram Birudavolu, Biswajit Nag, Omprakash Wali:

Open Innovation in ICT Services for Quadruple Helix Model: The Cloud Proposition. 33:1-33:13 - Seyoung Park, Jae-Gil Lee

, So-Jeong Kim, Dong-Hee Shin:
The Effect of Visual Cueing in 3D Animations for Learning Procedural-manipulative Tasks: From the Perspective of Cognitive Load Theory. 34:1-34:4 - Mohamed Abdlhamed, Kashif Kifayat

, Qi Shi
, William Hurst
:
A System for Intrusion Prediction in Cloud Computing. 35:1-35:9 - Mohd Hafriz Bin Nural Azhan, Md. Yazid Bin Mohd. Saman, Mustafa Bin Man

:
A Framework for Collaborative Multi-Institution MOOC Environment. 36:1-36:6 - Manar Abourezq, Abdellah Idrissi

, Fadoua Yakine
:
Routing in wireless Ad Hoc networks using the Skyline operator and an outranking method. 37:1-37:10 - Priya Dudhale Pise

, Nilesh J. Uke
:
Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud Platforms. 38:1-38:5 - Fayçal M'hamed Bouyakoub, Abdelkader Belkhir

:
Communities detection based services, time and location. 39:1-39:8 - Mohamed Boubenia, Abdelkader Belkhir

, Fayçal M'hamed Bouyakoub:
A multi-level approach for mobile recommendation of services. 40:1-40:6 - Anas M. Mzahm, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Azhana Ahmad:

Towards a Design Model for Things in Agents of Things. 41:1-41:5 - Kurra Mallaiah, Rishi Kumar Gandhi, Ramachandram Sirandas

:
Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases. 42:1-42:12 - Yu-Chi Liu, Wei-Chun Chung, Meng-Huang Lee, Kuan-Jen Wang, Shin-Hung Chang, Chi-Jen Wu

, Ray-I Chang
, Jan-Ming Ho:
Scheduling of Optimal DASH Streaming. 43:1-43:9 - Hanen Bouali, Jalel Akaichi

:
Out-Of-Order Events Processing: Healthcare Use Case. 44:1-44:4 - Baha'a Al-Sharafat, Bara'a Qadoumi:

Generic Usability Monitoring Model for Cloud Computing Environment (GUM). 45:1-45:6 - Aniruddha Bhattacharjya

, Xiaofeng Zhong
, Jing Wang:
Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. 46:1-46:5 - Muhammad Summair Raza

, Usman Qamar
:
A hybrid feature selection approach based on heuristic and exhaustive algorithms using Rough set theory. 47:1-47:7 - Supun Kamburugamuve, Hengjing He, Geoffrey C. Fox, David J. Crandall

:
Cloud-based Parallel Implementation of SLAM for Mobile Robots. 48:1-48:7 - Saad Bin Ahmed, Muhammad Imran Razzak

, Bandar Alhaqbani:
The Minutiae Based Latent Fingerprint Recognition System. 49:1-49:9 - Roaa Elghondakly

, Sherin M. Moussa
, Nagwa L. Badr:
A Comprehensive Study for Software Testing and Test Cases Generation Paradigms. 50:1-50:7 - Jamaiah Haji Yahaya, Aziz Deraman, Zuriani Hayati Abdullah:

Evergreen Software Preservation: The Anti-Ageing Model. 51:1-51:6 - Shih-Hsiung Lee, Chih-Nan Hu, Chu-Sing Yang:

Token-oriented based for Internet of Things and Clouding computing services. 52:1-52:4 - Muawya Habib Sarnoub Eldaw, Mark Levene, George Roussos

:
Presence Analytics: Discovering Meaningful Patterns about Human Presence Using WLAN Digital Imprints. 53:1-53:7 - Muhammad Waqar Aziz

, Adil Amjad Sheikh, Emad A. Felemban:
Requirement Engineering Technique for Smart Spaces. 54:1-54:7 - Ahmed Hefnawy, Abdelaziz Bouras, Chantal Cherifi

:
IoT for Smart City Services: Lifecycle Approach. 55:1-55:9 - Bernardo Nicoletti:

Cloud Computing and Procurement. 56:1-56:7 - Abdel-Rahman Al-Ghuwairi, Mohammad N. Khalaf

, Laith Al-Yasen, Zaher Salah
, Ayoub Alsarhan, Aladdin Hussein Baarah:
A Dynamic Model for automatic Updating cloud computing SLA (DSLA). 57:1-57:7 - Adel Alkhalil, Reza Sahandi, David John:

A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud Computing. 58:1-58:8 - Oumarou Mamadou Bello, Dina Taiwé Kolyang:

Mesh Node placement in Wireless mesh network based on multiobjective evolutionary metaheuristic. 59:1-59:6 - Hiba Jadallah, Zaher Al Aghbari:

Aman: Spatial Cloaking for Privacy-Aware Location-Based Queries in the Cloud. 60:1-60:6 - Wassila Guebli

, Abdelkader Belkhir
:
Providing Services in an Intelligent Environment: Smart Home Simulator based WoT. 61:1-61:5 - Ibrahim Ejdayid A. Mansour, Reza Sahandi, Kendra M. L. Cooper, Adrian Warman:

Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric Approaches. 62:1-62:7 - Zeineb Dhouioui, Jalel Akaichi

:
Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection. 63:1-63:6 - Zeineb Dhouioui, Jalel Akaichi

:
Wherever You Are, I'll Catch You Modeling the Identification of Location-Based Communities in Mobile Social Networks. 64:1-64:5 - Ahmad Alkhatib:

Sub-Network Coverage Method as an Efficient Method of Wireless Sensor Networks for Forest Fire Detection. 65:1-65:7 - Ahmed Jemal, Hend Ktait, Riadh Ben Halima, Mohamed Jmaiel:

OoDAAS: Ontology-Driven Analysis for Self-Adaptive Ambient Systems. 66:1-66:6 - Christofer N. Yalung, Salah S. Al-Majeed, Jalal Karam:

Analysis and Interpretation of Brain Wave Signals. 67:1-67:8 - Qiuling Chen, Ayong Ye, Li Xu:

A privacy-preserving Proximity Detection Method in social network. 68:1-68:6 - Umber Noreen, Ahcène Bounceur, Laurent Clavier

:
Integration of OFDM Based Communication System with Alpha-Stable Interference using CupCarbon Simulator. 69:1-69:8 - Abdelkader Laouid, Mohamed-Lamine Messai, Ahcène Bounceur, Reinhardt Euler, Abdelnasser Dahmani, Abdelkamel Tari:

A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks. 70:1-70:6 - Massinissa Saoudi, Ahcène Bounceur, Reinhardt Euler, M. Tahar Kechadi

:
Data Mining Techniques Applied to Wireless Sensor Networks for Early Forest Fire Detection. 71:1-71:7 - Md. Habibur Rahman

, Sadia Sharmin
, Sheikh Muhammad Sarwar, Mohammad Shoyaib:
Software Defect Prediction Using Feature Space Transformation. 72:1-72:6 - Djallel Eddine Boubiche

, Sabrina Boubiche, Azeddine Bilami
, Homero Toral-Cruz:
Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks. 73:1-73:6 - Alfredo Cuzzocrea, Mohamed Medhat Gaber

, Staci Lattimer, Giorgio Mario Grasso
:
Clustering-Based Spatio-Temporal Analysis of Big Atmospheric Data. 74:1-74:8 - Mirko Mariotti

, Osvaldo Gervasi
, Flavio Vella
, Alessandro Costantini
, Alfredo Cuzzocrea:
A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, Functionalities. 75:1-75:8 - Afreen Fatimah, Rahul Johari

:
Part: Performance Analysis of Routing Techniques in Delay Tolerant Network. 76:1-76:5 - Rahul Johari

, Dhari Ali Mahmood
:
MeNDARIN: Mobile Education Network Using DTN Approach in North IRAQ. 77:1-77:6 - Mohammed Fihri, Youssef El Fatimi, Abdelhalim Hnini

, Abdellah Ezzati
:
Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN. 78:1-78:4 - Abdul Fuad Abdul Rahman, Maslina Daud, Madihah Zulfa Mohamad:

Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework. 79:1-79:5 - Youssef El Fatimi, Mohammed Fihri, Abedellah Ezzati

:
Improvement of Leach Routing Algorithm Based on the Use of Game Theory. 80:1-80:5 - Sedrati Maamar, Hafnaoui Taleb:

Impact of routing protocols on the quality of transmission for video streaming. 81:1-81:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














