Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00042
J. Swacha, Artur Kulpa
The eGuides, or, more formally, multimedia visitor guidance systems, have become increasingly available in a variety of tourist attractions. The experiences of visitors using them can be further enriched and their engagement raised by enhancing the eGuides with gamification. In this paper, we describe a cloud-based service providing functionality enabling gamification of eGuides and simplifying the development and maintenance of complex eGuide gamification systems spanning over multiple tourist attractions.
{"title":"A Cloud-Based Service for Gamification of eGuides","authors":"J. Swacha, Artur Kulpa","doi":"10.1109/W-FiCloud.2018.00042","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00042","url":null,"abstract":"The eGuides, or, more formally, multimedia visitor guidance systems, have become increasingly available in a variety of tourist attractions. The experiences of visitors using them can be further enriched and their engagement raised by enhancing the eGuides with gamification. In this paper, we describe a cloud-based service providing functionality enabling gamification of eGuides and simplifying the development and maintenance of complex eGuide gamification systems spanning over multiple tourist attractions.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00015
N. Miloslavskaya, A. Nikiforov, V. Budzko
Evolvement of Big Data technologies demanding huge amounts of data processing and big processing rates, as well as direct and close interactions of complicated systems prompts an idea of urgent improvement in international standards and protocols contributing to working out adequate requirements to modern Big Data technologies' operation. At present, these technologies have stepped far forward and require a new approach due to a change in data operation scale. Interactions with such 'Big Data' have to be regulated by the organizations which formulate requirements for handling huge information sets. At the same time issues of ensuring information security (IS) in such approaches cannot be considered properly worked out nowadays. The paper discusses existing standards in the field of Big Data, where reviewed with a gross emphasis on the adequate ensuring of its IS. This research is focused on how the issues of IS are solved in the existing standards and it attempts to work out some prognostications in the studied area.
{"title":"Standardization of Ensuring Information Security for Big Data Technologies","authors":"N. Miloslavskaya, A. Nikiforov, V. Budzko","doi":"10.1109/W-FiCloud.2018.00015","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00015","url":null,"abstract":"Evolvement of Big Data technologies demanding huge amounts of data processing and big processing rates, as well as direct and close interactions of complicated systems prompts an idea of urgent improvement in international standards and protocols contributing to working out adequate requirements to modern Big Data technologies' operation. At present, these technologies have stepped far forward and require a new approach due to a change in data operation scale. Interactions with such 'Big Data' have to be regulated by the organizations which formulate requirements for handling huge information sets. At the same time issues of ensuring information security (IS) in such approaches cannot be considered properly worked out nowadays. The paper discusses existing standards in the field of Big Data, where reviewed with a gross emphasis on the adequate ensuring of its IS. This research is focused on how the issues of IS are solved in the existing standards and it attempts to work out some prognostications in the studied area.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116484399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00029
Aishah Khan, Ashraf Khalil, H. Hajjdiab
The objective of this mobile hand-held microscopic device is to provide aid to people residing in developing coun- tries with early detection of various blood and gastrointestinal diseases. This device is created using a cell scope attached to the camera lens of the phone. The detection of disease is done using image processing algorithms which are stored on a cloud based server to generate reports and efficiently send results to the end user. The main goal behind the device is to create a revolution in the world of technology and healthcare by facilitating easier approaches of disease detection and prevention in rural areas. Index Terms—mobile microscope, healthcare, malaria, image pre-processing, neural networks, feature extraction, classification
{"title":"Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine Learning","authors":"Aishah Khan, Ashraf Khalil, H. Hajjdiab","doi":"10.1109/W-FICLOUD.2018.00029","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00029","url":null,"abstract":"The objective of this mobile hand-held microscopic device is to provide aid to people residing in developing coun- tries with early detection of various blood and gastrointestinal diseases. This device is created using a cell scope attached to the camera lens of the phone. The detection of disease is done using image processing algorithms which are stored on a cloud based server to generate reports and efficiently send results to the end user. The main goal behind the device is to create a revolution in the world of technology and healthcare by facilitating easier approaches of disease detection and prevention in rural areas. Index Terms—mobile microscope, healthcare, malaria, image pre-processing, neural networks, feature extraction, classification","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00013
Wojciech Rzepecki, Lukasz Iwanecki, Piotr Ryba
the goal of the publication is to describe outcome form environmental tests of wireless Thread mesh network which was designed for indoor environment monitoring. The sensor is based on NRF52840 SoC (System on Chip) and allows to monitor parameters like: temperature, humidity, atmospheric pressure and light luminescence. For implementation of wireless communication OpenThread Thread protocol stack was used. All test were set in office building, where the harsh environmental condition, generated by hundreds of wire and wireless devices create perfect test place for verifying network reliability. The paper contains description of hardware and software solution, tests setup and outcomes concluded from collected data.
{"title":"IEEE 802.15.4 Thread Mesh Network – Data Transmission in Harsh Environment","authors":"Wojciech Rzepecki, Lukasz Iwanecki, Piotr Ryba","doi":"10.1109/W-FICLOUD.2018.00013","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00013","url":null,"abstract":"the goal of the publication is to describe outcome form environmental tests of wireless Thread mesh network which was designed for indoor environment monitoring. The sensor is based on NRF52840 SoC (System on Chip) and allows to monitor parameters like: temperature, humidity, atmospheric pressure and light luminescence. For implementation of wireless communication OpenThread Thread protocol stack was used. All test were set in office building, where the harsh environmental condition, generated by hundreds of wire and wireless devices create perfect test place for verifying network reliability. The paper contains description of hardware and software solution, tests setup and outcomes concluded from collected data.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00030
H. Hajjdiab, Ayesha Anzer, Hadeel A. Tabaza, Wedad Ahmed
Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.
{"title":"A Food Wastage Reduction Mobile Application","authors":"H. Hajjdiab, Ayesha Anzer, Hadeel A. Tabaza, Wedad Ahmed","doi":"10.1109/W-FiCloud.2018.00030","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00030","url":null,"abstract":"Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00016
Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima, H. Matsuo
Apache Spark caches reusable data into memory/disk. From our preliminary evaluation, we have found that a memory-and-disk caching is ineffective compared to disk-only caching when memory usage has reached its limit. This is because a thrashing state involving frequent data move between the memory and the disk occurs for a memory-and-disk caching. Spark has introduced a thrashing avoidance method for a single RDD (Resilient Distributed Dataset), but it cannot be applied to workloads using multiple RDDs because prior detection of the dependencies between the RDDs is difficult due to unpredictable access pattern. In this paper, we propose a thrashing avoidance method for such workloads. Our method adaptively modifies the cache I/O behavior depending on characteristics of the workload. In particular, caching data are directly written to the disk instead of the memory if cached data are frequently moved from the memory to the disk. Further, cached data are directly returned to the execution-memory instead of the storage-memory if cached data in the disk are required. Our method can adaptively select the optimal cache I/O behavior by observing workload characteristics at runtime instead of analyzing the dependence among RDDs. Evaluation results showed that execution time was reduced by 33% for KMeans using the modified Spark memory-and-disk caching rather than the original.
{"title":"Adaptive Control of Apache Spark's Data Caching Mechanism Based on Workload Characteristics","authors":"Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima, H. Matsuo","doi":"10.1109/W-FICLOUD.2018.00016","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00016","url":null,"abstract":"Apache Spark caches reusable data into memory/disk. From our preliminary evaluation, we have found that a memory-and-disk caching is ineffective compared to disk-only caching when memory usage has reached its limit. This is because a thrashing state involving frequent data move between the memory and the disk occurs for a memory-and-disk caching. Spark has introduced a thrashing avoidance method for a single RDD (Resilient Distributed Dataset), but it cannot be applied to workloads using multiple RDDs because prior detection of the dependencies between the RDDs is difficult due to unpredictable access pattern. In this paper, we propose a thrashing avoidance method for such workloads. Our method adaptively modifies the cache I/O behavior depending on characteristics of the workload. In particular, caching data are directly written to the disk instead of the memory if cached data are frequently moved from the memory to the disk. Further, cached data are directly returned to the execution-memory instead of the storage-memory if cached data in the disk are required. Our method can adaptively select the optimal cache I/O behavior by observing workload characteristics at runtime instead of analyzing the dependence among RDDs. Evaluation results showed that execution time was reduced by 33% for KMeans using the modified Spark memory-and-disk caching rather than the original.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00043
Nabila Djennane, R. Aoudjit, S. Bouzefrane
Nowadays, cloud computing is an effective solution for providing computing services to consumers. However, data centers that host computing resources are still faced with a misuse of resources and a workload imbalance of servers, where some servers become overloaded while others are underloaded or even idle. This results in performance degradation and resource wastage. The load balancing is a key aspect and has an important role in the management of cloud data centers. It allows an optimal use of the resources and improves the desired Quality of Service (QoS) using optimal methods for allocating resources and distributing workload. In this paper, we propose a load-balancing algorithm that is based on a new parameter called the balance factor of the data center, introduced here, to determine if a data center is imbalanced or not, in order to redistribute the workload equally over all the hosts. To minimize the energy consumption of the data center, our strategy relies on the live migration of virtual machines (VMs) while using a mathematical model. The simulation results, using the CloudSim toolkit, have shown that the energy efficiency can be managed by reassigning VMs to the data-center hosts.
{"title":"Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers","authors":"Nabila Djennane, R. Aoudjit, S. Bouzefrane","doi":"10.1109/W-FICLOUD.2018.00043","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00043","url":null,"abstract":"Nowadays, cloud computing is an effective solution for providing computing services to consumers. However, data centers that host computing resources are still faced with a misuse of resources and a workload imbalance of servers, where some servers become overloaded while others are underloaded or even idle. This results in performance degradation and resource wastage. The load balancing is a key aspect and has an important role in the management of cloud data centers. It allows an optimal use of the resources and improves the desired Quality of Service (QoS) using optimal methods for allocating resources and distributing workload. In this paper, we propose a load-balancing algorithm that is based on a new parameter called the balance factor of the data center, introduced here, to determine if a data center is imbalanced or not, in order to redistribute the workload equally over all the hosts. To minimize the energy consumption of the data center, our strategy relies on the live migration of virtual machines (VMs) while using a mathematical model. The simulation results, using the CloudSim toolkit, have shown that the energy efficiency can be managed by reassigning VMs to the data-center hosts.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00039
Balázs Barna, Szabina Fodor
Over the last decade, increasing attention has been paid to the examination of employee engagement and to potential approaches for promoting engagement, in order to improve workplace atmosphere and to increase employee productivity.
{"title":"Gamification’s Impact on Employee Engagement: Enhancing Employee Well-Being with a Cloud Based Gamified Team-Building Application","authors":"Balázs Barna, Szabina Fodor","doi":"10.1109/W-FiCloud.2018.00039","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00039","url":null,"abstract":"Over the last decade, increasing attention has been paid to the examination of employee engagement and to potential approaches for promoting engagement, in order to improve workplace atmosphere and to increase employee productivity.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00023
Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo
Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.
{"title":"Social Engineering: Application of Psychology to Information Security","authors":"Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo","doi":"10.1109/W-FiCloud.2018.00023","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00023","url":null,"abstract":"Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00022
Xiangyu Xiao, N. Caporusso
In the last decade, social media experienced a dramatic increase in terms of quantity and variety of available platforms, in addition to an exponential growth in the number of users. Recent reports show that social media have a total of almost 2.5 billion active users, that is, about 71% of Internet users have at least one account on social media. At the beginning of the social media era, the word "cyber Migration" emerged to represent and describe a new phenomenon: users switching between one social network platform to another. Several studies investigated the different reasons and factors behind cyber migration, and tried to identify patterns. In this paper, we analyze how the concept of cyber migration evolved over the last decade, and we evaluate whether the model can still be applied to nowadays' social media landscape. To this end, we use the push-pull-mooring framework, a well-known model in economics domain, to address the technological and human factors that affect switching behavior. Specifically, we investigate the dynamics of cyber migration in relation to the types of social network and digital media platforms (e.g., personal, professional, video sharing, and other categories).
{"title":"Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape","authors":"Xiangyu Xiao, N. Caporusso","doi":"10.1109/W-FiCloud.2018.00022","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00022","url":null,"abstract":"In the last decade, social media experienced a dramatic increase in terms of quantity and variety of available platforms, in addition to an exponential growth in the number of users. Recent reports show that social media have a total of almost 2.5 billion active users, that is, about 71% of Internet users have at least one account on social media. At the beginning of the social media era, the word \"cyber Migration\" emerged to represent and describe a new phenomenon: users switching between one social network platform to another. Several studies investigated the different reasons and factors behind cyber migration, and tried to identify patterns. In this paper, we analyze how the concept of cyber migration evolved over the last decade, and we evaluate whether the model can still be applied to nowadays' social media landscape. To this end, we use the push-pull-mooring framework, a well-known model in economics domain, to address the technological and human factors that affect switching behavior. Specifically, we investigate the dynamics of cyber migration in relation to the types of social network and digital media platforms (e.g., personal, professional, video sharing, and other categories).","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131300043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}