Abstract is missing.
- Finding Feasible Application Deployments in Edge Clusters, with Limited ResourcesJacopo Soldani. 5-17 [doi]
- Edge Computing Simulation Platforms: A Technology SurveyVan Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar. 18-28 [doi]
- Platforms for Serverless at the Edge: A ReviewNabil El Ioini, David Hästbacka, Claus Pahl, Davide Taibi 0001. 29-40 [doi]
- Formal Modeling and Simulation of Collaborative Intelligent RobotsAbdelhakim Baouya, Salim Chehida, Miquel Cantero, Marta Millet, Saddek Bensalem, Marius Bozga. 41-52 [doi]
- Virtual Machine Placement for Edge and Cloud ComputingBehdad Partovi, Alireza Bagheri, Maryam Haddad Kazarji, Claus Pahl, Hamid R. Barzegar. 53-64 [doi]
- Cloud-Edge Microservice Architecture for DNN-based Distributed Multimedia Event ProcessingFelipe Arruda Pontes, Edward Curry. 65-72 [doi]
- Modelling Service-Oriented Systems and Cloud Services with HeraklitPeter Fettke, Wolfgang Reisig. 77-89 [doi]
- An Evaluation of Frameworks for Microservices DevelopmentIsabell Sailer, Robin Lichtenthäler, Guido Wirtz. 90-102 [doi]
- Mining the Architecture of Microservice-Based Applications from their Kubernetes DeploymentGiuseppe Muntoni, Jacopo Soldani, Antonio Brogi. 103-115 [doi]
- Trusted Orchestrator Architecture in Mobile Edge Cloud ComputingVan Thanh Le. 121-132 [doi]
- Towards Resolving Security Smells in Microservice-Based ApplicationsFrancisco Ponce. 133-139 [doi]
- Towards Citizen-Centric Marketplaces for Urban Sensed DataHeiko Bornholdt. 140-150 [doi]
- DevOps and Quality Management in Serverless Computing: The RADON ApproachStefano Dalla Palma, Martin Garriga, Dario Di Nucci, Damian Andrew Tamburri, Willem-Jan van den Heuvel. 155-160 [doi]
- 5G-CARMEN: Service Continuity in 5G-Enabled Edge CloudsHamid R. Barzegar, Nabil El Ioini, Van Thanh Le, Claus Pahl. 161-165 [doi]
- Services Computing for Cyber-Threat Intelligence: The ANITA ApproachDaniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan van den Heuvel. 166-172 [doi]
- Quality Assurance of Heterogeneous Applications: The SODALITE ApproachIndika Kumara, Giovanni Quattrocchi, Damian A. Tamburri, Willem-Jan van den Heuvel. 173-178 [doi]
- FogProtect: Protecting Sensitive Data in the Computing ContinuumDhouha Ayed, Eva Jaho, Clemens Lachner, Zoltán Ádám Mann, Robert Seidl, Mike Surridge. 179-184 [doi]
- Intelligent Monitoring of Virtualized ServicesThanasis Tziouvaras, Kostas Kolomvatsos. 185-189 [doi]