Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FICLOUD
FICLOUD 2014
Generate Citations
2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud)
Aug. 27 2014 to Aug. 29 2014
Barcelona, Spain
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xiii
Message from the FiCloud 2014 Program Chairs
Freely available from IEEE.
pp. xiv-xiv
FiCloud 2014 Organizing Committee
Freely available from IEEE.
pp. xv-xv
FiCloud 2014 Program Committee
Freely available from IEEE.
pp. xvi-xix
Message from ICI 2014 Symposium Chairs
Freely available from IEEE.
pp. xx-xx
ICI 2014 Committees
Freely available from IEEE.
pp. xxi-xxi
Message from BigR&I 2014 Symposium Chair
Freely available from IEEE.
pp. xxii-xxii
BigR&I 2014 Committees
Freely available from IEEE.
pp. xxiii-xxiii
Message from MobiApps 2014 Workshop Chairs
Freely available from IEEE.
pp. xxiv-xxiv
MobiApps 2014 Committees
Freely available from IEEE.
pp. xxv-xxv
Message from AWMA 2014 Symposium Chairs
Freely available from IEEE.
pp. xxvi-xxvi
AWMA 2014 Committees
Freely available from IEEE.
pp. xxvii-xxvii
Message from EMSICC 2014 Workshop Chairs
Freely available from IEEE.
pp. xxviii-xxviii
EMSICC 2014 Committees
Freely available from IEEE.
pp. xxix-xxix
Message from PMECT 2014 Symposium Chairs
Freely available from IEEE.
pp. xxx-xxx
PMECT 2014 Committees
Freely available from IEEE.
pp. xxxi-xxxi
Message from SNAMS 2014 Workshop Chairs
Freely available from IEEE.
pp. xxxii-xxxii
SNAMS 2014 Committees
Freely available from IEEE.
pp. xxxiii-xxxiii
Keynote abstracts
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxiv-xxxvii
by
Keith G. Jeffery
,
Azzedine Boukerche
,
Schahram Dustdar
,
Fun Hu
Cielo: An Evolutionary Game Theoretic Framework for Virtual Machine Placement in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yi Ren
,
Junichi Suzuki
,
Athanasios Vasilakos
,
Shingo Omura
,
Katsuya Oba
Online Traffic Prediction in the Cloud: A Dynamic Window Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-14
by
Bruno L. Dalmazo
,
Joao P. Vilela
,
Marilia Curado
Dynamic Media Stream Mobility with TURN
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-22
by
Alvaro Alonso
,
Pedro Rodriguez
,
Joaquin Salvachua
,
Javier Cervino
On the Integration of Cloud Computing and Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Alessio Botta
,
Walter de Donato
,
Valerio Persico
,
Antonio Pescape
Call Admission Control in Cloud Radio Access Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Tshiamo Sigwele
,
Prashant Pillai
,
Yim Fun Hu
RPR over Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Ammar Hamad
,
Michel Kadoch
Distortion in Social Networks: Comparison of Various Types of Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-47
by
Ofir Ben-Assuli
,
Arie Jacobi
Video Streaming Considerations for Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-52
by
Rubem Pereira
,
E.G. Pereira
An On-Demand WebRTC and IoT Device Tunneling Service for Hospitals
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Thomas Sandholm
,
Boris Magnusson
,
Bjorn A. Johnsson
dOTM: A Mechanism for Distributing Centralized Multi-party Video Conferencing in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-67
by
Pedro Rodriguez
,
Alvaro Alonso
,
Joaquin Salvachua
,
Javier Cervino
Media Abstraction Framework for the Pervasive Middleware PalCom
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Amr Ergawy
,
Boris Magnusson
DoLen: User-Side Multi-cloud Application Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Do Le Quoc
,
Lenar Yazdanov
,
Christof Fetzer
Mobile Cloud Contextual Awareness with the Cloud Personal Assistant
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-89
by
Michael Joseph O'Sullivan
,
Dan Grigoras
TCP Hole Punching Approach to Address Devices in Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
Satish Narayana Srirama
,
Mohan Liyanage
Wireless Sensor Networks and Efficient Localisation
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-100
by
Pinar Kirci
,
Hakima Chaouchi
,
Anis Laouiti
Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
Abdallah Khreishah
,
Issa Khalil
,
Ammar Gharaibeh
,
Haythem Bany Salameh
,
Rafe Alasem
A Mobile Crowdsensing Ecosystem Enabled by a Cloud-Based Publish/Subscribe Middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-114
by
Aleksandar Antonic
,
Kristijan Roankovic
,
Martina Marjanovic
,
Kreimir Pripuic
,
Ivana Podnar Zarko
Comparative Analysis of Adaptive File Replication Algorithms for Cloud Data Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-123
by
Julia Myint
,
Axel Hunger
Standardized Framework for Integrating Domain-Specific Applications into the IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Neela Shrestha
,
Sylvain Kubler
,
Kary Framling
Cost Based Approach to Block Placement for Distributed File Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-138
by
Lakshminarayanan Srinivasan
,
Vasudeva Varma
Empowering End-Users to Develop Context-Aware Mobile Applications Using a Web Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-145
by
David Martin
,
Carlos Lamsfus
,
Aurkene Alzua-Sorzabal
,
Emilio Torres-Manzanera
Ontology Model to Support Multi-tenancy in Software as a Service Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Taewoo Nam
,
Keunhyuk Yeom
Scalable Semantic Aware Context Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-158
by
Mario Luis Pinto Antunes
,
Diogo Nuno Pereira Gomes
,
Rui Luis Andrade Aguiar
Social Network-Based Framework for Web Services Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-166
by
Hiba Fallatah
,
Jamal Bentahar
,
Ehsan Khosrowshahi Asl
Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Mai Ali
,
Sherif Khattab
,
Reem Bahgat
Towards Continuous Cloud Service Assurance for Critical Infrastructure IT
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-182
by
Aleksandar Hudic
,
Thomas Hecht
,
Markus Tauber
,
Andreas Mauthe
,
Santiago Caceres Elvira
On the Risk Exposure of Smart Home Automation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-190
by
Andreas Jacobsson
,
Martin Boldt
,
Bengt Carlsson
User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-196
by
Martin Henze
,
Lars Hermerschmidt
,
Daniel Kerpen
,
Roger Haussling
,
Bernhard Rumpe
,
Klaus Wehrle
E-Commerce Security Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-201
by
Mohamad Ibrahim Ladan
Low Cost Quality Aware Multi-tier Application Hosting on the Amazon Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-209
by
Waheed Iqbal
,
Matthew N. Dailey
,
David Carrera
On the Impact of Layer-Splitting for Cloud-Based SVC Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Seonghoon Moon
,
Chanhyuk Jung
,
Jong-Seok Lee
,
Songkuk Kim
Live Migration Impact on Virtual Datacenter Performance: Vmware vMotion Based Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-221
by
Mohamed Esam Elsaid
,
Christoph Meinel
Cloud Technology and Performance Improvement with Intserv over Diffserv for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-229
by
Abdullah Sinan Yildirim
,
Tolga Girici
Data Dissemination Algorithms for Communicating Materials Using Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-237
by
Kais Mekki
,
William Derigent
,
Ahmed Zouinkhi
,
Eric Rondeau
,
Mohamed Naceur Abdelkrim
Cascading Permissions Policy Model for Token-Based Access Control in the Web of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-245
by
Mohammad Amir
,
Prashant Pillai
,
Yim-Fun Hu
Courteous Priority Access to the Shared Commercial Radio for Public Safety in LTE Heterogeneous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-252
by
Chafika Tata
,
Michel Kadoch
Large Scale Environmental Monitoring and Maintaining Sensing Coverage in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-257
by
Fuad Bajaber
Interconnecting Standard M2M Platforms to Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-263
by
Asma Elmangoush
,
Andreea Corici
,
Marisa Catalan
,
Ronald Steinke
,
Thomas Magedanz
,
Joaquim Oller
The Moving IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-271
by
Julio Arauz
Enhanced Routing over Sleeping Nodes in 6LoWPAN Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-279
by
N. Hari Kumar
,
P. Karthikeyan
,
B. Deeksha
,
Tarun Mohandas
Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-287
by
Antesar M. Shabut
,
Keshav Dahal
,
Irfan Awan
Provisioning Software-Defined IoT Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-295
by
Stefan Nastic
,
Sanjin Sehic
,
Duc-Hung Le
,
Hong-Linh Truong
,
Schahram Dustdar
Software Defined Networking: Redefining the Future of Internet in IoT and Cloud Era
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-301
by
Vishwapathi Rao Tadinada
Cloud Computing: Adoption Considerations for Business and Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Adam Smith
,
Jagdev Bhogal
,
Mak Sharma
An Expert Consultant for Cloudifying E-Learning Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-315
by
Shehab Gamalel-Din
,
Reda Salama
,
Mashael Al-Sowaiel
The Impact of Cyber Security Issues on Businesses and Governments: A Framework for Implementing a Cyber Security Plan
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Hajar Iguer
,
Hicham Medromi
,
Adil Sayouti
,
Soukaina Elhasnaoui
,
Sophia Faris
Policy Based Security Middleware as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
Mhammed Chraibi
,
Mehdia Ajana El Khaddar
,
Hamid Harroud
,
Abdelilah Maach
,
Mohammed Elkoutbi
Service Composition Framework for Big Data Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-333
by
Taewoo Nam
,
Kyungsuk Choi
,
Cheolmin Ok
,
Keunhyuk Yeom
A Virtual Channel-Based Framework for the Integration of Wireless Sensor Networks in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Javier Barbaran
,
Manuel Diaz
,
Bartolome Rubio
Virtual Private Network over Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-345
by
Djedjiga Benzid
,
Michel Kadoch
Device Description Language: Factorizing the Control of Arbitrary Networked Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Philip Nye
Stationary Transformation of Video Traffic in LTE Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Suliman Albasheir
,
Michel Kadoch
Stratified Multi-ring Distributed Search Model for Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-360
by
Weiqing Cheng
,
Geng Yang
,
Shanshan Zhang
,
Shaobai Zhang
Information Security Maintenance Issues for Big Security-Related Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Natalia Miloslavskaya
,
Mikhail Senatorov
,
Alexander Tolstoy
,
Sergey Zapechnikov
Simulation and Big Data: A Way to Discover Unusual Knowledge in Emergency Departments: Work-in-Progress Paper
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Eva Bruballa
,
Manel Taboada
,
Eduardo Cabrera
,
Dolores Rexachs
,
Emilio Luque
From Big Data to Big Projects: A Step-by-Step Roadmap
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-378
by
Hajar Mousannif
,
Hasna Sabah
,
Yasmina Douiji
,
Younes Oulad Sayad
MRTree: Functional Testing Based on MapReduce's Execution Behaviour
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Jesús Morán
,
Claudio de la Riva
,
Javier Tuya
A Big Data Financial Information Management Architecture for Global Banking
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-388
by
Antoni Munar
,
Esteban Chiner
,
Ignacio Sales
Big Data issues in Computational Chemistry
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-392
by
Violeta Yeguas
,
Ruben Casado
Smart Tablet Monitoring by a Real-Time Head Movement and Eye Gestures Recognition System
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Hanene Elleuch
,
Ali Wali
,
Adel M. Alimi
Improving I/O Performance in Smart TVs
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
Cheolhee Lee
,
Taeho Hwang
,
Youjip Won
SlowDroid: Turning a Smartphone into a Mobile Attack Vector
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-410
by
Enrico Cambiaso
,
Gianluca Papaleo
,
Maurizio Aiello
Android Executable Modeling: Beyond Android Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-414
by
Olivier Le Goaer
,
Franck Barbier
,
Eric Cariou
,
Samson Pierre
Smart Walker
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-419
by
Gaby Abou Haidar
,
Roger Achkar
,
Richard Maalouf
,
Batoul Mchiek
,
Houssein Allam
,
Abdul Rahim Moussa
A Framework for Cross-Platform Mobile Web Applications Using HTML5
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-424
by
Christos Bouras
,
Andreas Papazois
,
Nikolaos Stasinos
RemindMe: An Enhanced Mobile Location-Based Reminder Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-430
by
Ali Mert Ertugrul
,
Itir Onal
Comparative Analysis of Freemium Policies and Procedure between Major Mobile Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-436
by
Muhamad Idaham Umar Ong
,
Imran Edzereiq Kamarudin
,
Mohamed Ariff Ameedeen
Human-Computer Interaction Patterns within the Mobile Nutrition Landscape: A Review of Literature
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-441
by
Stefan Scerri
,
Lalit Garg
,
Christian Scerri
,
Ramandeep Garg
A Two-Stage Resolution Search-Based Heuristic for the Team Orienteering Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Mhand Hifi
,
Moussa Ibrahim
,
Toufik Saadi
Towards an Energy-Efficient Tool for Processing the Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-452
by
Eric Renault
,
Selma Boumerdassi
Sustainable Quality of Service for Real-Time Jobs in Autonomous Computing Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-457
by
Rola El Osta
,
Maryline Chetto
A Real-Time Feedback Scheduler for Environmental Energy with Discrete Voltage/Frequency Modes
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-463
by
Akli Abbas
,
Emmanuel Grolleau
,
Driss Mehdi
,
Malik Loudini
,
Walid-Khaled Hidouci
Fog Computing and Smart Gateway Based Communication for Cloud of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-470
by
Mohammad Aazam
,
Eui-Nam Huh
In-Transit Data Analysis and Distribution in a Multi-cloud Environment Using CometCloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
Ioan Petri
,
Javier Diaz-Montes
,
Mengsong Zou
,
Omer F. Rana
,
Tom Beach
,
Haijiang Li
,
Yacine Rezgui
To Build or Not to Build? Addressing the Expansion Strategies of Cloud Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
Mohammad Wardat
,
Mahmoud Al-Ayyoub
,
Yaser Jararweh
,
Abdallah A. Khreishah
Dynamic Arrival Process for TCP Using a Novel Time-Dependant Statistical Calculation Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-490
by
Zhenyu Chen
,
Lin Guan
,
Peter Bull
Stochastic Modeling and Performance Evaluation of an Event Based System
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-496
by
Nitin Shukla
,
Mayank Pandey
Scalar: Systematic Scalability Analysis with the Universal Scalability Law
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-504
by
Thomas Heyman
,
Davy Preuveneers
,
Wouter Joosen
Showing 100 out of 114
Load More
Load All