


default search action
4th FMEC 2019: Rome, Italy
- Fourth International Conference on Fog and Mobile Edge Computing, FMEC 2019, Rome, Italy, June 10-13, 2019. IEEE 2019, ISBN 978-1-7281-1796-6

Fog and Mobile Edge Computing
- Cosimo Anglano, Massimo Canonico, Marco Guazzone

:
Online User-driven Task Scheduling for FemtoClouds. 5-12 - Isaac Lera, Carlos Guerrero, Carlos Juiz:

Analyzing the Applicability of a Multi-Criteria Decision Method in Fog Computing Placement Problem. 13-20 - Areeg Samir, Claus Pahl

:
Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov Models. 21-28 - Roberto Beraldi

, Hussein M. Alnuweiri:
Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog Providers. 29-36 - Michele Berno, Juan José Alcaraz, Michele Rossi:

On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC Architectures. 37-44 - Nour Mostafa

:
Cooperative Fog Communications using A Multi-Level Load Balancing. 45-51 - Mohammad Heydari, Alexios Mylonas

, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. 52-59 - Roberto Casadei

, Mirko Viroli:
Coordinating Computation at the Edge: a Decentralized, Self-Organizing, Spatial Approach. 60-67 - Areeg Samir, Claus Pahl

:
Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models. 68-73 - Michele Zanella

, Giuseppe Massari, William Fornaciari
:
Run-Time Managed Mobile Application Execution. 74-77 - Giuseppe Astuti, Antonio Brogi

, Stefano Forti
:
Making a Business Out of (Predictive Application Management in) the Fog. 78-85 - Tadeu F. Oliveira, Luiz Felipe Q. Silveira

:
Distributed SDN controllers optimization for energy saving. 86-89 - Lylia Alouache, Mohamed Maachaoui

, Makhlouf Aliouat
, Rachid Chelouah
:
Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust. 90-97 - Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved

, Timothy S. Kroecker:
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. 98-104 - Hazem A. Abdelhafez, Matei Ripeanu:

Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1. 105-112 - Gianfranco Ciccarella, Romeo Giuliano

, Franco Mazzenga, Francesco Vatalaro, Alessandro Vizzarri
:
Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO Saving. 113-120 - Sambit Shukla, Dipak Ghosal

, Kesheng Wu
, Alex Sim
, Matthew K. Farrens:
Co-optimizing Latency and Energy for IoT services using HMP servers in Fog Clusters. 121-128 - Sarra Mehamel, Samia Bouzefrane, Khaled Slimani, Mehammed Daoui:

New Caching System Under Uncertainty for Mobile Edge Computing. 129-134 - Alessandro Randazzo

, Ilenia Tinnirello:
Recognizing Video Resolution by Monitoring Memory Metrics in Mobile Clients. 135-141 - Muder Almiani

, Abdul Razaque
, Liu Yimu, Meer Jaro Khan
, Tang Minjie, Mohammed Alweshah
, Saleh Atiewi
:
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending. 142-148 - Eric Gyamfi

, James Adu Ansere
, Lina Xu:
ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing. 149-154 - Francesco Buccafurri, Gianluca Lax, Antonia Russo

:
Exploiting Digital Identity for Mobility in Fog Computing. 155-160 - Pietro Battistoni

, Monica Sebillo, Giuliana Vitiello
:
Experimenting with a Fog-computing Architecture for Indoor Navigation. 161-165 - Amir Karamoozian, Abdelhakim Hafid, El Mostapha Aboulhamid:

On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applications. 166-172 - Themis Melissaris, Kelly A. Shaw, Margaret Martonosi:

OKAPI: In Support of Application Correctness in Smart Home Environments. 173-180 - Muhammad Mazhar Ullah Rathore, Yaser Jararweh, Muhammad Raheel

, Anand Paul
:
Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication. 181-188 - Gizem Gültekin-Várkonyi, Attila Kertész

, Szilvia Varadi:
Privacy-awareness of Users in our Cloudy Smart World. 189-196 - Kamil Macheta, Krzysztof Mateusz Malarski, Martin Nordal Petersen

, Sarah Ruepp
:
Network Slicing for End-to-End Latency Provisioning in Internet of Things. 197-198
Internet of Things: Networking Applications and Technologies
- Martin Gergeleit

:
Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree Network. 199-203 - Nesrine Ammar, Ludovic Noirie

, Sébastien Tixeuil:
Network-Protocol-Based IoT Device Identification. 204-209 - Syed Rameez Ullah Kakakhel

, Tomi Westerlund
, Masoud Daneshtalab, Zhuo Zou, Juha Plosila, Hannu Tenhunen
:
A Qualitative Comparison Model for Application Layer IoT Protocols. 210-215 - Nour Takiddeen, Imran A. Zualkernan

:
Smartwatches as IoT Edge Devices: A Framework and Survey. 216-222 - Emmanuel Eyo Effiok, Enjie Liu, Jon Hitchcock:

Lifestyle Risk Association Aggregation. 223-228 - Gökay Saldamli, Sumedh Deshpande, Kaustubh Jawalekar, Pritam Gholap, Lo'ai Tawalbeh

, Levent Ertaul:
Wildfire Detection using Wireless Mesh Network. 229-234 - Gökay Saldamli, Levent Ertaul, Asharani Maratkere Shankaralingappa:

Analysis of Lightweight Message Authentication Codes for IoT Environments. 235-240 - Smriti Bhatt, Lo'ai Tawalbeh

, Pankaj Chhetri, Paras Bhatt:
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. 241-246 - Michael Opoku Agyeman

, Ali Al-Mahmood:
Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home Rehabilitation. 247-252 - Michael Opoku Agyeman

, Zainab Al-Waisi, Igla Hoxha:
Design and Implementation of an IoT-Based Energy Monitoring System for Managing Smart Homes. 253-258 - Mustafa Daraghmeh

, Ismaeel Al Ridhawi, Moayad Aloqaily
, Yaser Jararweh, Anjali Agarwal:
A Power Management Approach to Reduce Energy Consumption for Edge Computing Servers. 259-264
Smart Living with IoT, Cloud, and Edge Computing
- Elena Markoska

, Sanja Lazarova-Molnar
:
Usability Requirements for Smart Buildings' Performance Testing Solutions: A Survey. 265-270 - Preeti Mishra

, Ishita Verma, Saurabh Gupta
, Varun S. Rana, Kavitha Kadarla:
vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment. 271-277 - Suresh K. Peddoju

, Himanshu Upadhyay, Shekhar Bhansali
:
Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm. 278-282 - Venkatraman Balasubramanian

, Kees Kroep, Kishor Chandra Joshi, R. Venkatesha Prasad
:
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds. 283-288 - Raghubir Singh

, Simon Armour, Aftab Khan, Mahesh Sooriyabandara, George Oikonomou
:
The Advantage of Computation Offloading in Multi-Access Edge Computing. 289-294 - Victor K. Sarker

, Jorge Peña Queralta
, Tuan Nguyen Gia
, Hannu Tenhunen, Tomi Westerlund
:
A Survey on LoRa for IoT: Integrating Edge Computing. 295-300 - Xiangfeng Dai, Irena Spasic, Bradley Meyer, Samuel Chapman, Frédéric Andrès:

Machine Learning on Mobile: An On-device Inference App for Skin Cancer Detection. 301-305
Smart Cities Systems Engineering
- Elena Markoska

, Sanja Lazarova-Molnar
:
LEAF: Live Building Performance Evaluation Framework. 306-311 - Philipp Kisters, Dirk Bade, Julius Wulk:

Dynamic Routing Using Precipitation Data. 312-317 - Sandra Sendra, José Luis García-Navas, Pablo Romero-Díaz, Jaime Lloret:

Collaborative LoRa-Based Sensor Network for Pollution Monitoring in Smart Cities. 318-323 - Javier Rocher

, Daniel A. Basterrechea, Miran Taha
, Mar Parra, Jaime Lloret:
Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart Cities. 324-329 - Shoayee Alotaibi

, Rashid Mehmood, Iyad A. Katib
:
Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi Dialect. 330-335 - M. Mazhar Rathore, Yaser Jararweh, Hojae Son, Anand Paul

:
Real-time Traffic Management Model using GPUenabled Edge Devices. 336-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














