Abstract is missing.
- The Effect of Visual Cueing in 3D Animations for Learning Procedural-manipulative Tasks: From the Perspective of Cognitive Load TheorySeyoung Park, Jae-Gil Lee 0002, So-Jeong Kim, Dong-Hee Shin. [doi]
- Evergreen Software Preservation: The Anti-Ageing ModelJamaiah Haji Yahaya, Aziz Deraman, Zuriani Hayati Abdullah. [doi]
- An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private SystemsEnrique Festijo, Younchan Jung. [doi]
- Cloud-based Graphical Simulation Tool of ECG for Educational PurposeMabrook Al-Rakhami, Ahmad Alhamed. [doi]
- Analysis and Interpretation of Brain Wave SignalsChristofer N. Yalung, Salah S. Al-Majeed, Jalal Karam. [doi]
- The Minutiae Based Latent Fingerprint Recognition SystemSaad Bin Ahmed, Muhammad Imran Razzak, Bandar Alhaqbani. [doi]
- Cloud Computing Antecedents, Challenges, and DirectionsMajed Almubaddel, Ahmed M. Elmogy. [doi]
- A privacy-preserving Proximity Detection Method in social networkQiuling Chen, Ayong Ye, Li Xu. [doi]
- Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSAAniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang 0001. [doi]
- Combined Operations of Mobility and NAT Management on the Horizontal Model of Software-Defined NetworkingMarnel Peradilla, Younchan Jung. [doi]
- Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor NetworksDjallel Eddine Boubiche. [doi]
- MeNDARIN: Mobile Education Network Using DTN Approach in North IRAQRahul Johari, Dhari Ali Mahmood. [doi]
- Balanced Cooperative Linear Data Exchange with Physical Layer Network CodingNyan Lin, Brian M. Kurkoski, Yuto Lim, Yasuo Tan. [doi]
- A mutation-based model to rank testing as a service (TaaS) Providers in cloud computingAbdel-Rahman Al-Ghuwairi, Hazem Eid, Mohammad Aloran, Zaher Salah, Aladdin Hussein Baarah, Ahmad A. Al-oqaily. [doi]
- A Novel Hybrid Classifiers based Model for mining in Neuro-imagingA. B. N. Alvi, Usman Qamar, Abdul Wahab Muzaffar, Wasi Haider Butt. [doi]
- Political Sentiment Analysis Using Twitter DataTarek Elghazaly, Amal Mahmoud, Hesham A. Hefny. [doi]
- Putting the lab on the map: A wireless sensor network system for border security and surveillanceMohammad Hammoudeh. [doi]
- A Multi-agent System Architecture for Self-Healing Cloud InfrastructureMeriem Azaiez, Walid Chainbi. [doi]
- Generic Usability Monitoring Model for Cloud Computing Environment (GUM)Baha'a Al-Sharafat, Bara'a Qadoumi. [doi]
- Towards a Design Model for Things in Agents of ThingsAnas M. Mzahm, Mohd Sharifuddin Ahmad, Alicia Y. C. Tang, Azhana Ahmad. [doi]
- Improvement of Leach Routing Algorithm Based on the Use of Game TheoryEl Fatimi Youssef, Fihri Mohammed, Ezzati Abedellah. [doi]
- Wherever You Are, I'll Catch You Modeling the Identification of Location-Based Communities in Mobile Social NetworksZeineb Dhouioui, Jalel Akaichi. [doi]
- VirtTorrent: BitTorrent for Inter-VM File DistributionAmita Ajith Kamath, Chirag Jamadagni, K. Chandrasekaran. [doi]
- Cloud Computing and ProcurementBernardo Nicoletti. [doi]
- Providing Services in an Intelligent Environment: Smart Home Simulator based WoTWassila Guebli, Abdelkader Belkhir. [doi]
- Heterogeneous Face DetectionAkanksha Das, Ravi Kant Kumar, Dakshina Ranjan Kisku. [doi]
- Requirement Engineering Technique for Smart SpacesMuhammad Waqar Aziz, Adil Amjad Sheikh, Emad A. Felemban. [doi]
- A System for Intrusion Prediction in Cloud ComputingMohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst. [doi]
- A Dynamic Model for automatic Updating cloud computing SLA (DSLA)Abdel-Rahman Al-Ghuwairi, Mohammad N. Khalaf, Laith Al-Yasen, Zaher Salah, Ayoub Alsarhan, Aladdin Hussein Baarah. [doi]
- Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational DatabasesKurra Mallaiah, Rishi Kumar Gandhi, S. Ramachandram. [doi]
- Automation System Architecture For Barcode Region Detection AlgorithmGeun-Jun Kim, Bongsoon Kang. [doi]
- A Framework for Optimum Selection of Online Social Network Management SystemsMohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook Al-Rakhami, Majed A. Alrubaian, Atif Alamri. [doi]
- Open Innovation in ICT Services for Quadruple Helix Model: The Cloud PropositionSriram Birudavolu, Biswajit Nag, Omprakash Wali. [doi]
- Cloud Computing Based E-Commerce as a Service Model: Impacts and RecommendationsAmir Mohamed Talib, Fahad Omar Alomary. [doi]
- Software Defect Prediction Using Feature Space TransformationMd. Habibur Rahman, Sadia Sharmin, Sheikh Muhammad Sarwar, Mohammad Shoyaib. [doi]
- Warehousing and Protecting Big Data: State-Of-The-Art-Analysis, Methodologies, Future ChallengesAlfredo Cuzzocrea. [doi]
- Data Mining Techniques Applied to Wireless Sensor Networks for Early Forest Fire DetectionMassinissa Saoudi, Ahcène Bounceur, Reinhardt Euler, M. Tahar Kechadi. [doi]
- Impact of routing protocols on the quality of transmission for video streamingSedrati Maamar, Taleb Hafnaoui. [doi]
- Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud PlatformsPriya Dudhale Pise, Nilesh J. Uke. [doi]
- Presence Analytics: Discovering Meaningful Patterns about Human Presence Using WLAN Digital ImprintsMuawya Habib Sarnoub Eldaw, Mark Levene, George Roussos. [doi]
- Integration of OFDM Based Communication System with Alpha-Stable Interference using CupCarbon SimulatorUmber Noreen, Ahcène Bounceur, Laurent Clavier. [doi]
- Out-Of-Order Events Processing: Healthcare Use CaseHanen Bouali, Jalel Akaichi. [doi]
- Mesh Node placement in Wireless mesh network based on multiobjective evolutionary metaheuristicOumarou Mamadou Bello, Dina Taiwé Kolyang. [doi]
- Multiple-Clouds Computing Security Approaches: A Comparative StudyHassan Saad Alqahtani, Paul Sant. [doi]
- Towards A Framework for Rate Control on Dynamic Communication NetworksSuchi Kumari, Anurag Singh, Priya Ranjan. [doi]
- Sub-Network Coverage Method as an Efficient Method of Wireless Sensor Networks for Forest Fire DetectionAhmad Alkhatib. [doi]
- Intelligent Brokers in an Internet of Things for LogisticsBill Karakostas, Nik Bessis. [doi]
- A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud ComputingAdel Alkhalil, Reza Sahandi, David John. [doi]
- Authentication as a Service for Cloud ComputingAlshaimaa Abo-Alian, Nagwa L. Badr, Mohamed F. Tolba. [doi]
- CupCarbon: A New Platform for Designing and Simulating Smart-City and IoT Wireless Sensor Networks (SCI-WSN)Ahcène Bounceur. [doi]
- Part: Performance Analysis of Routing Techniques in Delay Tolerant NetworkAfreen Fatimah, Rahul Johari. [doi]
- Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security FrameworkAbdul Fuad Abdul Rahman, Maslina Daud, Madihah Zulfa Mohamad. [doi]
- Smart Meter Data AnalysisMoudhi M. Aljamea, Ljiljana Brankovic, Jia Gao, Costas S. Iliopoulos, M. Samiruzzaman. [doi]
- Privacy Protection Protocol in Social Networks Based on Sexual Predators DetectionZeineb Dhouioui, Jalel Akaichi. [doi]
- A multi-level approach for mobile recommendation of servicesBoubenia Mohamed, Belkhir Abdelkader, Bouyakoub Fayçal M'hamed. [doi]
- Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric ApproachesIbrahim Ejdayid A. Mansour, Reza Sahandi, Kendra M. L. Cooper, Adrian Warman. [doi]
- Information Flow Control with Minimal Tag DisclosureHajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier, Changyu Dong, David M. Eyers, Jean Bacon. [doi]
- Communities detection based services, time and locationBouyakoub Fayçal M'hamed, Belkhir Abdelkader. [doi]
- Cloud-based Parallel Implementation of SLAM for Mobile RobotsSupun Kamburugamuve, Hengjing He, Geoffrey C. Fox, David J. Crandall. [doi]
- Aman: Spatial Cloaking for Privacy-Aware Location-Based Queries in the CloudHiba Jadallah, Zaher Al Aghbari. [doi]
- Routing in wireless Ad Hoc networks using the Skyline operator and an outranking methodManar Abourezq, Abdellah Idrissi, Fadoua Yakine. [doi]
- IoT for Smart City Services: Lifecycle ApproachAhmed Hefnawy, Abdelaziz Bouras, Chantal Cherifi. [doi]
- A Comprehensive Study for Software Testing and Test Cases Generation ParadigmsRoaa Elghondakly, Sherin Moussa, Nagwa L. Badr. [doi]
- Clustering-Based Spatio-Temporal Analysis of Big Atmospheric DataAlfredo Cuzzocrea, Mohamed Medhat Gaber, Staci Lattimer, Giorgio Mario Grasso. [doi]
- Token-oriented based for Internet of Things and Clouding computing servicesShih-Hsiung Lee, Chih-Nan Hu, Chu-Sing Yang. [doi]
- Scheduling of Optimal DASH StreamingYu-Chi Liu, Wei-Chun Chung, Meng-Huang Lee, Kuan-Jen Wang, Shin-Hung Chang, Chi-Jen Wu, Ray-I Chang, Jan-Ming Ho. [doi]
- OoDAAS: Ontology-Driven Analysis for Self-Adaptive Ambient SystemsAhmed Jemal, Hend Ktait, Riadh Ben Halima, Mohamed Jmaiel. [doi]
- A Framework for Collaborative Multi-Institution MOOC EnvironmentMohd Hafriz Bin Nural Azhan, Md. Yazid Bin Mohd. Saman, Mustafa Bin Man. [doi]
- A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, FunctionalitiesMirko Mariotti, Osvaldo Gervasi, Flavio Vella, Alessandro Costantini, Alfredo Cuzzocrea. [doi]
- Efficient Method for Associating Radio Propagation Models with Spatial Partitioning for Smart City ApplicationsTaha Alwajeeh, Pierre Combeau, Ahcène Bounceur, Rodolphe Vauzelle. [doi]
- A QoS aware Routing Protocol in Wireless Sensor Networks with Mobile Base StationsBhaskar Bhuyan, Nityananda Sarma. [doi]
- A hybrid feature selection approach based on heuristic and exhaustive algorithms using Rough set theoryMuhammad Summair Raza, Usman Qamar. [doi]
- A Framework for Implementing Trust in Cloud ComputingAnkita Sharma, Hema Banati. [doi]
- Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSNFihri Mohammed, El Fatimi Youssef, Hnini Abedehalim, Ezzati Abdellah. [doi]
- A New Approach to Data Dynamic Integrity ControlTalal Albalawi, Austin Melton, Michael Rothstein. [doi]
- Energy-Efficient Remote Healthcare Monitoring Using IoT: A Review of Trends and ChallengesWan Aida Nadia Wan Abdullah, Naimah Yaakob, Mohamed Elshaikh Elobaid, Mohd Nazri Mohd Warip, Siti Asilah Yah. [doi]
- Self-Similarity in Voice over Internet TrafficHomero Toral-Cruz. [doi]
- A Trust Framework for Ranking User as a Cloud Provider in Peer-to-Peer cloud systemMohammad N. Khalaf, Abdel-Rahman Al-Ghuwairi, Laith Al-Yasen. [doi]
- Detection Of URL In Image SteganographyMoudhi M. Aljamea, Costas S. Iliopoulos, M. Samiruzzaman. [doi]
- Toward Adaptive Data Aggregation Protocols in Wireless Sensor NetworksDjallel Eddine Boubiche, Sabrina Boubiche, Azeddine Bilami, Homero Toral-Cruz. [doi]
- A Dynamic and Distributed Key Management Scheme for Wireless Sensor NetworksAbdelkader Laouid, Mohamed-Lamine Messai, Ahcène Bounceur, Reinhardt Euler, Abdelnasser Dahmani, Abdelkamel Tari. [doi]