Default Cover Image

2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud)

Aug. 27 2014 to Aug. 29 2014

Barcelona, Spain

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiii
Message from the FiCloud 2014 Program ChairsFreely available from IEEE.pp. xiv-xiv
FiCloud 2014 Organizing CommitteeFreely available from IEEE.pp. xv-xv
FiCloud 2014 Program CommitteeFreely available from IEEE.pp. xvi-xix
Message from ICI 2014 Symposium ChairsFreely available from IEEE.pp. xx-xx
ICI 2014 CommitteesFreely available from IEEE.pp. xxi-xxi
Message from BigR&I 2014 Symposium ChairFreely available from IEEE.pp. xxii-xxii
BigR&I 2014 CommitteesFreely available from IEEE.pp. xxiii-xxiii
Message from MobiApps 2014 Workshop ChairsFreely available from IEEE.pp. xxiv-xxiv
MobiApps 2014 CommitteesFreely available from IEEE.pp. xxv-xxv
Message from AWMA 2014 Symposium ChairsFreely available from IEEE.pp. xxvi-xxvi
AWMA 2014 CommitteesFreely available from IEEE.pp. xxvii-xxvii
Message from EMSICC 2014 Workshop ChairsFreely available from IEEE.pp. xxviii-xxviii
EMSICC 2014 CommitteesFreely available from IEEE.pp. xxix-xxix
Message from PMECT 2014 Symposium ChairsFreely available from IEEE.pp. xxx-xxx
PMECT 2014 CommitteesFreely available from IEEE.pp. xxxi-xxxi
Message from SNAMS 2014 Workshop ChairsFreely available from IEEE.pp. xxxii-xxxii
SNAMS 2014 CommitteesFreely available from IEEE.pp. xxxiii-xxxiii
Keynote abstractsFull-text access may be available. Sign in or learn about subscription options.pp. xxxiv-xxxvii
Online Traffic Prediction in the Cloud: A Dynamic Window ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 9-14
Dynamic Media Stream Mobility with TURNFull-text access may be available. Sign in or learn about subscription options.pp. 15-22
On the Integration of Cloud Computing and Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Call Admission Control in Cloud Radio Access NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
RPR over EthernetFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Distortion in Social Networks: Comparison of Various Types of NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Video Streaming Considerations for Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
An On-Demand WebRTC and IoT Device Tunneling Service for HospitalsFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Media Abstraction Framework for the Pervasive Middleware PalComFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
DoLen: User-Side Multi-cloud Application MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Mobile Cloud Contextual Awareness with the Cloud Personal AssistantFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
TCP Hole Punching Approach to Address Devices in Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Wireless Sensor Networks and Efficient LocalisationFull-text access may be available. Sign in or learn about subscription options.pp. 98-100
Comparative Analysis of Adaptive File Replication Algorithms for Cloud Data StorageFull-text access may be available. Sign in or learn about subscription options.pp. 115-123
Standardized Framework for Integrating Domain-Specific Applications into the IoTFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
Cost Based Approach to Block Placement for Distributed File SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 132-138
Ontology Model to Support Multi-tenancy in Software as a Service EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Scalable Semantic Aware Context StorageFull-text access may be available. Sign in or learn about subscription options.pp. 152-158
Social Network-Based Framework for Web Services DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 159-166
Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
Towards Continuous Cloud Service Assurance for Critical Infrastructure ITFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
On the Risk Exposure of Smart Home Automation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
E-Commerce Security IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 197-201
Low Cost Quality Aware Multi-tier Application Hosting on the Amazon CloudFull-text access may be available. Sign in or learn about subscription options.pp. 202-209
On the Impact of Layer-Splitting for Cloud-Based SVC StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Live Migration Impact on Virtual Datacenter Performance: Vmware vMotion Based StudyFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Cloud Technology and Performance Improvement with Intserv over Diffserv for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Cascading Permissions Policy Model for Token-Based Access Control in the Web of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 238-245
Courteous Priority Access to the Shared Commercial Radio for Public Safety in LTE Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 246-252
Large Scale Environmental Monitoring and Maintaining Sensing Coverage in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Interconnecting Standard M2M Platforms to Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
The Moving IoTFull-text access may be available. Sign in or learn about subscription options.pp. 264-271
Enhanced Routing over Sleeping Nodes in 6LoWPAN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 272-279
Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 280-287
Provisioning Software-Defined IoT Cloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 288-295
Software Defined Networking: Redefining the Future of Internet in IoT and Cloud EraFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Cloud Computing: Adoption Considerations for Business and EducationFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
An Expert Consultant for Cloudifying E-Learning EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 308-315
Policy Based Security Middleware as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Service Composition Framework for Big Data ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 328-333
A Virtual Channel-Based Framework for the Integration of Wireless Sensor Networks in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Virtual Private Network over Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
Device Description Language: Factorizing the Control of Arbitrary Networked DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Stationary Transformation of Video Traffic in LTE NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
Stratified Multi-ring Distributed Search Model for Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Information Security Maintenance Issues for Big Security-Related DataFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
From Big Data to Big Projects: A Step-by-Step RoadmapFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
MRTree: Functional Testing Based on MapReduce's Execution BehaviourFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
A Big Data Financial Information Management Architecture for Global BankingFull-text access may be available. Sign in or learn about subscription options.pp. 385-388
Big Data issues in Computational ChemistryFull-text access may be available. Sign in or learn about subscription options.pp. 389-392
Smart Tablet Monitoring by a Real-Time Head Movement and Eye Gestures Recognition SystemFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Improving I/O Performance in Smart TVsFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
SlowDroid: Turning a Smartphone into a Mobile Attack VectorFull-text access may be available. Sign in or learn about subscription options.pp. 405-410
Android Executable Modeling: Beyond Android ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 411-414
Smart WalkerFull-text access may be available. Sign in or learn about subscription options.pp. 415-419
A Framework for Cross-Platform Mobile Web Applications Using HTML5Full-text access may be available. Sign in or learn about subscription options.pp. 420-424
RemindMe: An Enhanced Mobile Location-Based Reminder ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 425-430
A Two-Stage Resolution Search-Based Heuristic for the Team Orienteering ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Towards an Energy-Efficient Tool for Processing the Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
Sustainable Quality of Service for Real-Time Jobs in Autonomous Computing DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 453-457
Fog Computing and Smart Gateway Based Communication for Cloud of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 464-470
To Build or Not to Build? Addressing the Expansion Strategies of Cloud ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Dynamic Arrival Process for TCP Using a Novel Time-Dependant Statistical Calculation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 483-490
Stochastic Modeling and Performance Evaluation of an Event Based SystemFull-text access may be available. Sign in or learn about subscription options.pp. 491-496
Scalar: Systematic Scalability Analysis with the Universal Scalability LawFull-text access may be available. Sign in or learn about subscription options.pp. 497-504
Showing 100 out of 114