Abstract is missing.
- On Understanding Time, Energy and Cost Performance of Wimpy Heterogeneous Systems for Edge ComputingDumitrel Loghin, Lavanya Ramapantulu, Yong Meng Teo. 1-8 [doi]
- A-Priori Estimation of Computation Times in Fog Networked RoboticsAjay Kattepur, Hemant Kumar Rath, Anantha Simha. 9-16 [doi]
- Fog Computing: Towards Minimizing Delay in the Internet of ThingsAshkan Yousefpour, Genya Ishigaki, Jason P. Jue. 17-24 [doi]
- Greening IoT with Fog: A SurveyFatemeh Jalali, Safieh Khodadustan, Chrispin Gray, Kerry Hinton, Frank Suits. 25-31 [doi]
- An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT ApplicationsYaozhong Song, Stephen S. Yau, Ruozhou Yu, Xiang Zhang 0005, Guoliang Xue. 32-39 [doi]
- MECCAS: Collaborative Storage Algorithm Based on Alternating Direction Method of Multipliers on Mobile Edge CloudGuanlin Wu, Junjie Chen, Weidong Bao, Xiaomin Zhu, Wenhua Xiao, Ji Wang, Ling Liu. 40-46 [doi]
- Zenith: Utility-Aware Resource Allocation for Edge ComputingJinlai Xu, Balaji Palanisamy, Heiko Ludwig, Qingyang Wang. 47-54 [doi]
- Designing Distributed Applications Using a Phase-Aware, Reversible SystemRuma R. Paul, Jérémie Melchior, Peter Van Roy, Vladimir Vlassov. 55-64 [doi]
- SLA-Based Service Selection for Multi-Cloud EnvironmentsAhmed Taha, Salman Manzoor, Neeraj Suri. 65-72 [doi]
- OCCI-Compliant Cloud Configuration SimulationMehdi Ahmed-Nacer, Walid Gaaloul, Samir Tata. 73-81 [doi]
- Bridging the Cloud Trust Gap: Using ORCON Policy to Manage Consumer Trust between Different CloudsStephen S. Kirkman, Richard Newman. 82-89 [doi]
- Security SLA Based Monitoring in CloudsNesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. 90-97 [doi]
- Analyzing Gossip Protocols for Reliable MANET ApplicationsEveraldo Leme, Naghmeh Ivaki, Nuno Laranjeiro, Regina Moraes. 98-105 [doi]
- Comparing Pacemaker with OpenSAF for Availability Management in the CloudMehran Khan, Maria Toeroe, Ferhat Khendek. 106-111 [doi]
- TRCID: Optimized Task Recovery in MapReduce Based on Checkpointing Intermediate DataPeng Wang, Jing Liu, Kai Ding. 112-119 [doi]
- PRMRAP: A Proactive Virtual Resource Management Framework in CloudQizhi Zhang, Haopeng Chen, Zhida Yin. 120-127 [doi]
- Optimizing ICT Equipment via Resource Allocation in Cloud SystemsShigeto Suzuki, Hiroyoshi Kodama, Hiroyuki Fukuda. 128-135 [doi]
- Ranking-Based Cloud Service RecommendationXianrong Zheng, Li Da Xu, Sheng Chai. 136-141 [doi]
- Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud StorageMaithilee Joshi, Sudip Mittal, Karuna P. Joshi, Tim Finin. 142-149 [doi]
- Cloud Migration: Layer Partition and IntegrationZhitao Wan, Lihua Duan, Ping Wang. 150-157 [doi]
- On Forecasting Amazon EC2 Spot Prices Using Time-Series Decomposition with Hybrid Look-BacksMohan Baruwal Chhetri, Markus Lumpe, Quoc Bao Vo, Ryszard Kowalczyk. 158-165 [doi]
- Quality of Service Channelling for Latency Sensitive Edge ApplicationsAtakan Aral, Ivona Brandic. 166-173 [doi]
- GS1 Video: Open Service System for Video Using MPEG 7 and GS1 StandardBongjin Sohn, Kiwoong Kwon, Daeyoung Kim 0001. 174-181 [doi]
- Cloud to Edge: Distributed Deployment of Process-Aware IoT ApplicationsRakesh Jain, Samir Tata. 182-189 [doi]
- An Orchestration Based Cloud Auto-Healing Service FrameworkXinhui Li, Kai Li, Xudong Pang, Yiping Wang. 190-193 [doi]
- A Performance Analysis of OpenStack Cloud vs Real System on Hadoop ClustersBinod Kumar Adhikari, WanLi Zuo, Ramesh Maharjan. 194-201 [doi]
- Research on the Topological Evolution of Uncertain Social Relations in Opportunistic NetworksGang Xu, Ming Zhang, Hai-He Jin, Yan Wang. 202-205 [doi]
- Lightweight Robust Framework for Workload Scheduling in CloudsMuhammed Abdulazeez, Pawel Garncarek, Dariusz R. Kowalski, Prudence W. H. Wong. 206-209 [doi]
- Stand-Out Segmentation Access Control for Cloud Outsourced DataQassim Bani Hani, Julius P. Ditcher. 210-215 [doi]
- Attack Surface Expansion Using Decoys to Protect Virtualized InfrastructureTulha Al-Salah, Liang Hong, Sachin Shetty. 216-219 [doi]
- Towards an Approach for Trustworthiness Assessment of Software as a ServiceNadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki, Pedro Nunes Da Costa, Marco Paulo Amorim Vieira. 220-223 [doi]
- Adaptive Social Network Services: The Practice of 9EMBA.COMChiao-Yi Cheng, Yao Hung Lin, Fang Yu. 224-227 [doi]
- Low-Cost Smart RefrigeratorHsin-Han Wu, Yung-Ting Chuang. 228-231 [doi]
- MVR: An Architecture for Computation Offloading in Mobile Edge ComputingXiaojuan Wei, Shangguang Wang, Ao Zhou, Jinliang Xu, Sen Su, Sathish A. P. Kumar, Fangchun Yang. 232-235 [doi]
- Practical Edge Analytics: Architectural Approach and Use CasesNarendra Anand, Anuraag Chintalapally, Colin Puri, Teresa Tung. 236-239 [doi]
- An Edge Computing Platform for the Detection of Acoustic EventsYanik Ngoko, Christophe Cérin. 240-243 [doi]
- Strategies for Re-Training a Pruned Neural Network in an Edge Computing ParadigmParag S. Chandakkar, Yikang Li, Pak Lun Kevin Ding, Baoxin Li. 244-247 [doi]
- Evaluating Voice Interaction Pipelines at the EdgeSmruthi Sridhar, Matthew E. Tolentino. 248-251 [doi]
- The Many Faces of End-to-End Encryption and Their Security AnalysisMohamed Nabeel. 252-259 [doi]