-
1
-
-
77956877124
-
The Internet of things: A survey
-
28/10/
-
Atzori, Luigi, et al. The Internet of things: A survey. Comput. Netw.(54), 2010, 2787–2805 28/10/.
-
(2010)
Comput. Netw.
, Issue.54
, pp. 2787-2805
-
-
Atzori, L.1
-
2
-
-
84965033218
-
A fog-based DSS model for driving rule violation monitoring framework on the Internet of things
-
01/03/
-
Roy, Sandip, et al. A fog-based DSS model for driving rule violation monitoring framework on the Internet of things. Int. J. Adv. Sci. Technol., 2015, 23–32 01/03/.
-
(2015)
Int. J. Adv. Sci. Technol.
, pp. 23-32
-
-
Roy, S.1
-
3
-
-
85043748098
-
Sensor Mania! The Internet of things, wearable computing, objective metrics, and the quantified self 2.0
-
8 November
-
Swan, Melanie, Sensor Mania! The Internet of things, wearable computing, objective metrics, and the quantified self 2.0. Sensor Actuator Netw. 1:3 (2012), 217–253, 10.3390/jsan1030217 8 November.
-
(2012)
Sensor Actuator Netw.
, vol.1
, Issue.3
, pp. 217-253
-
-
Swan, M.1
-
4
-
-
85015319211
-
Internet of surveillance: a cloud supported large scale wireless surveillance system
-
Springer
-
Alsmirat, Mohammad A., Jararweh, Yaser, Obidat, Islam, Gupta, Brij B., Internet of surveillance: a cloud supported large scale wireless surveillance system. J. Supercomput., 2016 Springer.
-
(2016)
J. Supercomput.
-
-
Alsmirat, M.A.1
Jararweh, Y.2
Obidat, I.3
Gupta, B.B.4
-
5
-
-
84897603290
-
Conception of ID layer performance at the network level for Internet of things
-
Mongay Batalla, J., Krawiec, P., Conception of ID layer performance at the network level for Internet of things. Springer J. Pers. Ubiquitous Comput. 18:2 (2014), 465–480.
-
(2014)
Springer J. Pers. Ubiquitous Comput.
, vol.18
, Issue.2
, pp. 465-480
-
-
Mongay Batalla, J.1
Krawiec, P.2
-
6
-
-
84963978889
-
Efficient entertainment services provision over a novel network architecture
-
Kryftis, Y., Mastorakis, G., Mavromoustakis, C., Mongay Batalla, J., Pallis, E., Kormentzas, G., Efficient entertainment services provision over a novel network architecture. IEEE Wireless Commun. Mag., 23(1), 2016.
-
(2016)
IEEE Wireless Commun. Mag.
, vol.23
, Issue.1
-
-
Kryftis, Y.1
Mastorakis, G.2
Mavromoustakis, C.3
Mongay Batalla, J.4
Pallis, E.5
Kormentzas, G.6
-
7
-
-
84898825587
-
Mobile cloud computing: A survey, state of art and future directions
-
01/04/
-
Rahimi, M.R., et al. Mobile cloud computing: A survey, state of art and future directions. Mob. Netw. Appl. 19:2 (2014), 133–143 01/04/.
-
(2014)
Mob. Netw. Appl.
, vol.19
, Issue.2
, pp. 133-143
-
-
Rahimi, M.R.1
-
9
-
-
84875530510
-
Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility
-
01/10/2013
-
S. Fremdt, R. Beck, S. Weber, Does cloud computing matter? An analysis of the cloud model software-as-a-service and its impact on operational agility, in: 46th Hawaii International Conference on System Sciences, 01/10/2013, pp. 1025–1034.
-
46th Hawaii International Conference on System Sciences
, pp. 1025-1034
-
-
Fremdt, S.1
Beck, R.2
Weber, S.3
-
10
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
11/07/
-
Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 1:34 (2010), 1–11 11/07/.
-
(2010)
J. Netw. Comput. Appl.
, vol.1
, Issue.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
11
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
01/11/
-
Takabi, Hassan, Joshi, James B.D., Security and privacy challenges in cloud computing environments. IEEE Comput. Reliab. Soc., 2010, 24–31 01/11/.
-
(2010)
IEEE Comput. Reliab. Soc.
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
-
13
-
-
84896931467
-
CCIoT-CMfg: Cloud computing and Internet of things-based cloud manufacturing service system
-
02/05/
-
Tao, Fei, et al. CCIoT-CMfg: Cloud computing and Internet of things-based cloud manufacturing service system. IEEE Trans. Ind. Inform. 2:10 (2014), 1435–1442 02/05/.
-
(2014)
IEEE Trans. Ind. Inform.
, vol.2
, Issue.10
, pp. 1435-1442
-
-
Tao, F.1
-
14
-
-
85029723206
-
CloudThings: a common architecture for integrating the Internet of things with cloud computing
-
Jiehan Zhou, et al. CloudThings: a common architecture for integrating the Internet of things with cloud computing, in: Huazhong University of Science and Technology, Wuhan, 2013.
-
(2013)
in: Huazhong University of Science and Technology, Wuhan
-
-
Zhou, J.1
-
15
-
-
84971671604
-
Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and Internet of things technologies
-
01/12/
-
Guerrero Ibáñez, Juan Antonio, et al. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and Internet of things technologies. IEEE Wirel. Commun., 2015, 122–128 01/12/.
-
(2015)
IEEE Wirel. Commun.
, pp. 122-128
-
-
Guerrero Ibáñez, J.A.1
-
17
-
-
84876943063
-
Internet of things (IoT): A vision, architectural elements, and future directions
-
24/02/
-
Gubbi, Jayavardhana, et al. Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst., 2013, 1645–1660 24/02/.
-
(2013)
Future Gener. Comput. Syst.
, pp. 1645-1660
-
-
Gubbi, J.1
-
19
-
-
85011110622
-
Cloud of Things: Integration of IoT with Cloud Computing
-
Springer International Publishing 01/01/
-
Aazam, Mohammad, et al. Cloud of Things: Integration of IoT with Cloud Computing. 2016, Springer International Publishing, 77–94 01/01/.
-
(2016)
, pp. 77-94
-
-
Aazam, M.1
-
20
-
-
84958935292
-
Integration of cloud computing and Internet of things: a survey
-
14/09/
-
Botta, Alessio, et al. Integration of cloud computing and Internet of things: a survey. J. Future Gener. Comput. Syst., 2015, 1–54 14/09/.
-
(2015)
J. Future Gener. Comput. Syst.
, pp. 1-54
-
-
Botta, A.1
-
21
-
-
84903726093
-
Smart gateway based communication for cloud of things
-
Mohammad Aazam, et al. Smart gateway based communication for cloud of things, in: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP, Symposium on Public Internet of Things, Singapore, 2014.
-
(2014)
in: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP, Symposium on Public Internet of Things, Singapore
-
-
Aazam, M.1
-
22
-
-
84976266081
-
State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing
-
25/09/
-
Díaz, Manuel, et al. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl., 2015, 99–117 25/09/.
-
(2015)
J. Netw. Comput. Appl.
, pp. 99-117
-
-
Díaz, M.1
-
23
-
-
85020229266
-
Accelerating compute intensive medical imaging segmentation algorithms using GPUs
-
Springer
-
Alsmirat, Mohammad, Jararweh, Yaser, Al-Ayyoub, Mahmoud, Shehab, Mohammed A., Gupta, B.B., Accelerating compute intensive medical imaging segmentation algorithms using GPUs. MTA, 2016, Springer.
-
(2016)
MTA
-
-
Alsmirat, M.1
Jararweh, Y.2
Al-Ayyoub, M.3
Shehab, M.A.4
Gupta, B.B.5
-
24
-
-
84994514374
-
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
-
IGI Global Publisher USA
-
Gupta, B.B., Agrawal, D.P., Yamaguchi, Shingo, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. 2016, IGI Global Publisher, USA.
-
(2016)
-
-
Gupta, B.B.1
Agrawal, D.P.2
Yamaguchi, S.3
-
25
-
-
85048444894
-
Social media security and trustworthiness: Overview and new direction
-
Elsevier
-
Zhang, Zhiyong, Gupta, Brij B., Social media security and trustworthiness: Overview and new direction. Future Gener. Comput. Syst., 2016 Elsevier.
-
(2016)
Future Gener. Comput. Syst.
-
-
Zhang, Z.1
Gupta, B.B.2
-
26
-
-
84961385029
-
Data-driven monitoring of cyber-physical systems leveraging on big data and the Internet-of-things for diagnosis and control
-
DX, 01/08/2015
-
Oliver Niggemann, Gautaman Biswas, et al. Data-driven monitoring of cyber-physical systems leveraging on big data and the Internet-of-things for diagnosis and control, in: International Workshop on the Principles of Diagnosis, DX, 01/08/2015, pp. 185–192.
-
in: International Workshop on the Principles of Diagnosis
, pp. 185-192
-
-
Niggemann, O.1
Biswas, G.2
-
27
-
-
84945308766
-
Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding
-
24/04/
-
Batalla, J.M., Advanced multimedia service provisioning based on efficient interoperability of adaptive streaming protocol and high efficient video coding. J. Real-Time Image Process., 2015, 1–12 24/04/.
-
(2015)
J. Real-Time Image Process.
, pp. 1-12
-
-
Batalla, J.M.1
-
28
-
-
85029722151
-
-
IoT security (Internet of Things security), IoT Agenda, 01/11/2015. [Online]. Available: (Accessed 27 July 2016).
-
M. Rouse, IoT security (Internet of Things security), IoT Agenda, 01/11/2015. [Online]. Available: http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security (Accessed 27 July 2016).
-
-
-
Rouse, M.1
-
29
-
-
84952054527
-
Mutual authentication scheme in secure Internet of things technology for comfortable lifestyle
-
24 12, 2015.
-
Park, N., Kang, N., Mutual authentication scheme in secure Internet of things technology for comfortable lifestyle. Sensors 1:16 (2016), 1–20 24 12 2015.
-
(2016)
Sensors
, vol.1
, Issue.16
, pp. 1-20
-
-
Park, N.1
Kang, N.2
-
30
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Dong, Lun, Han, Zhu, Petropulu, Athina P., Vincent Poor, H., Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process., 58(3), 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Vincent Poor, H.4
-
31
-
-
85009423597
-
Analysis of physical layer security via co-operative communication in Internet of things
-
Aparna K. Nair, et al. Analysis of physical layer security via co-operative communication in Internet of things, in: International Conference on Emerging Trends in Engineering, Science and Technology, ICETEST - 2015, no. 24, 1 1 2016, pp. 896–903.
-
(2016)
in: International Conference on Emerging Trends in Engineering, Science and Technology, ICETEST - 2015
, vol.24
, Issue.11
, pp. 896-903
-
-
Aparna, K.N.1
-
32
-
-
77956128351
-
Toward trusted wireless sensor networks
-
Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S., Toward trusted wireless sensor networks. ACM Trans. Sensor Netw. 7 (2010), 5:1–5:25.
-
(2010)
ACM Trans. Sensor Netw.
, vol.7
, pp. 51-5:25
-
-
Hu, W.1
Tan, H.2
Corke, P.3
Shih, W.C.4
Jha, S.5
-
34
-
-
84904136525
-
A study on strategic provision of cloud computing services
-
15/6/
-
Md Whaiduzzaman, G., et al. A study on strategic provision of cloud computing services. Sci. World J., 2014, 1–8 15/6/.
-
(2014)
Sci. World J.
, pp. 1-8
-
-
Md Whaiduzzaman, G.1
-
35
-
-
84865048353
-
A framework for ranking of cloud computing services
-
Garg, S.K., Versteeg, S., Buyya, R., A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29:4 (2013), 1012–1023.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.4
, pp. 1012-1023
-
-
Garg, S.K.1
Versteeg, S.2
Buyya, R.3
-
36
-
-
84981321664
-
An evaluation of cloud-based mobile services with limited capacity: a linear approach
-
27/2/
-
Skourletopoulos, Georgios, et al. An evaluation of cloud-based mobile services with limited capacity: a linear approach. Soft Comput., 2016, 1–8 27/2/.
-
(2016)
Soft Comput.
, pp. 1-8
-
-
Skourletopoulos, G.1
-
37
-
-
85029420711
-
The critical role of the network in big data applications
-
1/4/
-
Villars, L., et al. The critical role of the network in big data applications. IDC Anal. Future, 2012, 1–12 1/4/.
-
(2012)
IDC Anal. Future
, pp. 1-12
-
-
Villars, L.1
-
38
-
-
85029677363
-
-
Cloud Computing–Is it Really All That Beneficial?, abouttech, 07/07/2012. [Online]. Available: (Accessed 24 January 2015].
-
P. Viswanathan, Cloud Computing–Is it Really All That Beneficial?, abouttech, 07/07/2012. [Online]. Available: http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm (Accessed 24 January 2015].
-
-
-
Viswanathan, P.1
-
39
-
-
84902266783
-
Cloud computing data protection–a literature review and analysis
-
01/10/2014
-
Florian Pfarr, et al. Cloud computing data protection–a literature review and analysis, in: 47th Hawaii International Conference on System Science, 01/10/2014, pp. 5018–5027.
-
in: 47th Hawaii International Conference on System Science
, pp. 5018-5027
-
-
Pfarr, F.1
-
40
-
-
85019322722
-
A Study of the Advantages & Disadvantages of Mobile Cloud Computing Versus Native Environment
-
Blekinge Institute of Technology Karlskrona
-
Andersson, S., et al. A Study of the Advantages & Disadvantages of Mobile Cloud Computing Versus Native Environment. 2013, Blekinge Institute of Technology, Karlskrona.
-
(2013)
-
-
Andersson, S.1
-
41
-
-
84875530510
-
Does cloud computing matter? An analysis of the Cloud Model software-as-a-service and its impact on operational agility
-
01/10/2013
-
Sabine Fremdt, et al. Does cloud computing matter? An analysis of the Cloud Model software-as-a-service and its impact on operational agility, in: 46th Hawaii International Conference on System Sciences, 01/10/2013, pp. 1025–1034.
-
in: 46th Hawaii International Conference on System Sciences
, pp. 1025-1034
-
-
Fremdt, S.1
-
42
-
-
85029699855
-
-
Blog: Follow what's happening at Get Cloud Services, “Mobile Cloud Computing–Pros and Cons”, GetCloud Services, 23/12/2014. [Online]. Available: (Accessed 24 January 2015).
-
Blog: Follow what's happening at Get Cloud Services, “Mobile Cloud Computing–Pros and Cons”, GetCloud Services, 23/12/2014. [Online]. Available: https://www.getcloudservices.com/blog/mobile-cloud-computing-pros-and-cons/ (Accessed 24 January 2015).
-
-
-
-
43
-
-
85037074313
-
Implicit authentication through learning user behavior
-
01/01/
-
Elaine Shi, R.C., et al. Implicit authentication through learning user behavior. Inf. Secur.(6531), 2011, 99–113 01/01/.
-
(2011)
Inf. Secur.
, Issue.6531
, pp. 99-113
-
-
Elaine Shi, R.C.1
-
44
-
-
84935496015
-
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
-
30/11/
-
Haghighat, Mohammad, et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst. Appl. 11:42 (2015), 7905–7916 30/11/.
-
(2015)
Expert Syst. Appl.
, vol.11
, Issue.42
, pp. 7905-7916
-
-
Haghighat, M.1
-
46
-
-
85031394346
-
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
-
Springer
-
Gupta, B.B., Badve, Omkar P., Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing & Applications, 2016, Springer.
-
(2016)
Neural Computing & Applications
-
-
Gupta, B.B.1
Badve, O.P.2
-
47
-
-
85029676481
-
-
“Swamp Computing” a.k.a. Cloud Computing, WEB Security Journal, 28/12/2009. [Online]. Available: (Accessed 27 July 2016).
-
Y. Mamoon, “Swamp Computing” a.k.a. Cloud Computing, WEB Security Journal, 28/12/2009. [Online]. Available: http://security.sys-con.com/node/1231725 (Accessed 27 July 2016).
-
-
-
Mamoon, Y.1
-
48
-
-
84938583423
-
Data Classification for achieving Security in cloud computing
-
1 3
-
Shaikha, Rizwana, Sasikumar, Dr.M., Data Classification for achieving Security in cloud computing. Procedia Comput. Sci.(45), 2015, 493–498 1 3.
-
(2015)
Procedia Comput. Sci.
, Issue.45
, pp. 493-498
-
-
Shaikha, R.1
Sasikumar, M.2
-
49
-
-
84896658536
-
Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures
-
Kumar, Yogesh, Munjal, Rajiv, Sharma, Harsh, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int. J. Comput. Sci. Manag. Stud., 11(03), 2011.
-
(2011)
IJCSMS Int. J. Comput. Sci. Manag. Stud.
, vol.11
, Issue.3
-
-
Kumar, Y.1
Munjal, R.2
Sharma, H.3
-
50
-
-
84944409446
-
Analysis of security algorithms in cloud computing
-
1 3
-
Kaur, Randeep, Kinger, Supiya, Analysis of security algorithms in cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 3:3 (2014), 171–176 1 3.
-
(2014)
Int. J. Appl. Innov. Eng. Manag. (IJAIEM)
, vol.3
, Issue.3
, pp. 171-176
-
-
Kaur, R.1
Kinger, S.2
-
51
-
-
84898052514
-
Performance evaluation of symmetric encryption algorithms
-
Elminaam, D.S. Abdul., Abdul Kader, H.M., Hadhoud, M.M., Performance evaluation of symmetric encryption algorithms. Commun. IBIMA, 8, 2009.
-
(2009)
Commun. IBIMA
, vol.8
-
-
Elminaam, D.S.A.1
Abdul Kader, H.M.2
Hadhoud, M.M.3
-
52
-
-
84940073799
-
Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security
-
Singh, Gurpreet, Kinger, Supriya, Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security. Int. J. Sci. Eng. Res., 4(7), 2013.
-
(2013)
Int. J. Sci. Eng. Res.
, vol.4
, Issue.7
-
-
Singh, G.1
Kinger, S.2
-
53
-
-
84905752751
-
Enhancing cloud computing security using AES algorithm
-
1 4
-
Sachdev, Abha, Bhansali, Mohit, Enhancing cloud computing security using AES algorithm. Int. J. Comput. Appl. 9:67 (2013), 19–23 1 4.
-
(2013)
Int. J. Comput. Appl.
, vol.9
, Issue.67
, pp. 19-23
-
-
Sachdev, A.1
Bhansali, M.2
-
55
-
-
85029722779
-
-
The NIST definition of cloud computing, National Institute of Standards and Technology (Accessed 24 July 2015).
-
The NIST definition of cloud computing, National Institute of Standards and Technology (Accessed 24 July 2015).
-
-
-
-
56
-
-
85024395425
-
Recent advances delivered by mobile cloud computing and Internet of things for big data applications: a survey
-
11/03/
-
Stergiou, Christos, Psannis, Kostas E., Recent advances delivered by mobile cloud computing and Internet of things for big data applications: a survey. Int. J. Netw. Manag., 2016, 1–12 11/03/.
-
(2016)
Int. J. Netw. Manag.
, pp. 1-12
-
-
Stergiou, C.1
Psannis, K.E.2
-
58
-
-
84915749742
-
Symmetric key-based authentication and the session key agreement scheme in IoT environment
-
three hundred and thirtyth ed. Springer Berlin, Heidelberg Berlin
-
Park, N., et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment. Computer Science and its Applications, three hundred and thirtyth ed., 2015, Springer Berlin, Heidelberg, Berlin, 379–384.
-
(2015)
Computer Science and its Applications
, pp. 379-384
-
-
Park, N.1
-
59
-
-
84894503247
-
Secure and trusted cloud of things
-
IEEE
-
Bhattasali, T., Chaki, R., Chaki, N., Secure and trusted cloud of things. India Conference (INDICON), 2013 Annual IEEE, 2013, IEEE, 1–6.
-
(2013)
India Conference (INDICON), 2013 Annual IEEE
, pp. 1-6
-
-
Bhattasali, T.1
Chaki, R.2
Chaki, N.3
-
60
-
-
80053168238
-
An analysis of security and privacy issues in smart grid software architectures on clouds
-
IEEE
-
Simmhan, Y., Kumbhare, A.G., Cao, B., Prasanna, V., An analysis of security and privacy issues in smart grid software architectures on clouds. 2011 IEEE International Conference on Cloud Computing, (CLOUD), 2011, IEEE, 582–589.
-
(2011)
2011 IEEE International Conference on Cloud Computing, (CLOUD)
, pp. 582-589
-
-
Simmhan, Y.1
Kumbhare, A.G.2
Cao, B.3
Prasanna, V.4
-
61
-
-
85029676749
-
-
Synapse Internet of Things Cloud, 2014. https://www.synapse-wireless.com/snap-components/iot.
-
(2014)
-
-
-
62
-
-
84893754378
-
Inter-cloud architectures and application brokering: taxonomy and survey
-
Grozev, N., Buyya, R., Inter-cloud architectures and application brokering: taxonomy and survey. Softw. - Pract. Exp. 44:3 (2014), 369–390.
-
(2014)
Softw. - Pract. Exp.
, vol.44
, Issue.3
, pp. 369-390
-
-
Grozev, N.1
Buyya, R.2
-
64
-
-
84874720030
-
Cloud computing for Internet of things & sensing based applications
-
IEEE
-
Rao, B.P., Saluia, P., Sharma, N., Mittal, A., Sharma, S.V., Cloud computing for Internet of things & sensing based applications. 2012 Sixth International Conference on Sensing technology, (ICST), 2012, IEEE, 374–380.
-
(2012)
2012 Sixth International Conference on Sensing technology, (ICST)
, pp. 374-380
-
-
Rao, B.P.1
Saluia, P.2
Sharma, N.3
Mittal, A.4
Sharma, S.V.5
-
65
-
-
84900537270
-
Developing vehicular data cloud services in the iot environment
-
He, W., Yan, G., Xu, L.D., Developing vehicular data cloud services in the iot environment. IEEE Trans. Ind. Inf. 10:2 (2014), 1587–1595.
-
(2014)
IEEE Trans. Ind. Inf.
, vol.10
, Issue.2
, pp. 1587-1595
-
-
He, W.1
Yan, G.2
Xu, L.D.3
-
66
-
-
84901607859
-
Intelligent services for big data science
-
Dobre, C., Xhafa, F., Intelligent services for big data science. Future Gener. Comput. Syst. 37 (2014), 267–281.
-
(2014)
Future Gener. Comput. Syst.
, vol.37
, pp. 267-281
-
-
Dobre, C.1
Xhafa, F.2
-
67
-
-
84878341131
-
Cloud monitoring: A survey
-
Aceto, G., Botta, A., de Donato, W., Pescapè, A., Cloud monitoring: A survey. Comput. Netw. 57:9 (2013), 2093–2115.
-
(2013)
Comput. Netw.
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
Botta, A.2
de Donato, W.3
Pescapè, A.4
|