Abstract is missing.
- Online User-driven Task Scheduling for FemtoCloudsCosimo Anglano, Massimo Canonico, Marco Guazzone. 5-12 [doi]
- Analyzing the Applicability of a Multi-Criteria Decision Method in Fog Computing Placement ProblemIsaac Lera, Carlos Guerrero, Carlos Juiz. 13-20 [doi]
- Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov ModelsAreeg Samir, Claus Pahl. 21-28 [doi]
- Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog ProvidersRoberto Beraldi, Hussein M. Alnuweiri. 29-36 [doi]
- On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC ArchitecturesMichele Berno, Juan José Alcaraz, Michele Rossi. 37-44 [doi]
- Cooperative Fog Communications using A Multi-Level Load BalancingNour Mostafa. 45-51 [doi]
- Uncertainty-Aware Authentication Model for Fog Computing in IoTMohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa. 52-59 [doi]
- Coordinating Computation at the Edge: a Decentralized, Self-Organizing, Spatial ApproachRoberto Casadei, Mirko Viroli. 60-67 [doi]
- Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov ModelsAreeg Samir, Claus Pahl. 68-73 [doi]
- Run-Time Managed Mobile Application ExecutionMichele Zanella, Giuseppe Massari, William Fornaciari. 74-77 [doi]
- Making a Business Out of (Predictive Application Management in) the FogGiuseppe Astuti, Antonio Brogi, Stefano Forti 0002. 78-85 [doi]
- Distributed SDN controllers optimization for energy savingTadeu F. Oliveira, Luiz Felipe Q. Silveria. 86-89 [doi]
- Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed TrustLylia Alouache, Mohamed Maachaoui, Makhlouf Aliouat, Rachid Chelouah. 90-97 [doi]
- Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep LearningJoshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker. 98-104 [doi]
- Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1Hazem A. Abdelhafez, Matei Ripeanu. 105-112 [doi]
- Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO SavingGianfranco Ciccarella, Romeo Giuliano, Franco Mazzenga, Francesco Vatalaro, Alessandro Vizzarri. 113-120 [doi]
- Co-optimizing Latency and Energy for IoT services using HMP servers in Fog ClustersSambit Shukla, Dipak Ghosal, Kesheng Wu, Alex Sim, Matthew K. Farrens. 121-128 [doi]
- New Caching System Under Uncertainty for Mobile Edge ComputingSarra Mehamel, Samia Bouzefrane, Khaled Slimani, Mehammed Daoui. 129-134 [doi]
- Recognizing Video Resolution by Monitoring Memory Metrics in Mobile ClientsAlessandro Randazzo, Ilenia Tinnirello. 135-141 [doi]
- Bluetooth Application-Layer Packet-Filtering For Blueborne Attack DefendingMuder Almiani, Abdul Razaque, Liu Yimu, Meer Jaro Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi. 142-148 [doi]
- ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge ComputingEric Gyamfi, James Adu Ansere, Lina Xu. 149-154 [doi]
- Exploiting Digital Identity for Mobility in Fog ComputingFrancesco Buccafurri, Gianluca Lax, Antonia Russo. 155-160 [doi]
- Experimenting with a Fog-computing Architecture for Indoor NavigationPietro Battistoni, Monica Sebillo, Giuliana Vitiello. 161-165 [doi]
- On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applicationsAmir Karamoozian, Abdelhakim Hafid, El Mostapha Aboulhamid. 166-172 [doi]
- OKAPI: In Support of Application Correctness in Smart Home EnvironmentsThemis Melissaris, Kelly A. Shaw 0001, Margaret Martonosi. 173-180 [doi]
- Securing High-Velocity Data: Authentication and Key Management Model for Smart City CommunicationMuhammad Mazhar Ullah Rathore, Yaser Jararweh, Muhammad Raheel, Anand Paul. 181-188 [doi]
- Privacy-awareness of Users in our Cloudy Smart WorldGizem Gultekin Varkonyi, Attila Kertész, Szilvia Varadi. 189-196 [doi]
- Network Slicing for End-to-End Latency Provisioning in Internet of ThingsKamil Macheta, Krzysztof Mateusz Malarski, Martin Nordal Petersen, Sarah Ruepp. 197-198 [doi]
- Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree NetworkMartin Gergeleit. 199-203 [doi]
- Network-Protocol-Based IoT Device IdentificationNesrine Ammar 0001, Ludovic Noirie, Sébastien Tixeuil. 204-209 [doi]
- A Qualitative Comparison Model for Application Layer IoT ProtocolsSyed Rameez Ullah Kakakhel, Tomi Westerlund, Masoud Daneshtalab, Zhuo Zou, Juha Plosila, Hannu Tenhunen. 210-215 [doi]
- Smartwatches as IoT Edge Devices: A Framework and SurveyNour Takiddeen, Imran A. Zualkernan. 216-222 [doi]
- Lifestyle Risk Association AggregationEmmanuel Eyo Effiok, Enjie Liu, Jon Hitchcock. 223-228 [doi]
- Wildfire Detection using Wireless Mesh NetworkGökay Saldamli, Sumedh Deshpande, Kaustubh Jawalekar, Pritam Gholap, Lo'ai Tawalbeh, Levent Ertaul. 229-234 [doi]
- Analysis of Lightweight Message Authentication Codes for IoT EnvironmentsGökay Saldamli, Levent Ertaul, Asharani Maratkere Shankaralingappa. 235-240 [doi]
- Authorizations in Cloud-Based Internet of Things: Current Trends and Use CasesSmriti Bhatt, Lo'ai A. Tawalbeh, Pankaj Chhetri, Paras Bhatt. 241-246 [doi]
- Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home RehabilitationMichael Opoku Agyeman, Ali Al-Mahmood. 247-252 [doi]
- Design and Implementation of an IoT-Based Energy Monitoring System for Managing Smart HomesMichael Opoku Agyeman, Zainab Al-Waisi, Igla Hoxha. 253-258 [doi]
- A Power Management Approach to Reduce Energy Consumption for Edge Computing ServersMustafa Daraghmeh, Ismaeel Al Ridhawi, Moayad Aloqaily, Yaser Jararweh, Anjali Agarwal. 259-264 [doi]
- Usability Requirements for Smart Buildings' Performance Testing Solutions: A SurveyElena Markoska, Sanja Lazarova-Molnar. 265-270 [doi]
- vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud EnvironmentPreeti Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla. 271-277 [doi]
- Health Monitoring with Low Power IoT Devices using Anomaly Detection AlgorithmSuresh K. Peddoju, Himanshu Upadhyay, Shekhar Bhansali. 278-282 [doi]
- Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device CloudsVenkatraman Balasubramanian, Kees Kroep, Kishor Chandra Joshi, R. Venkatesha Prasad. 283-288 [doi]
- The Advantage of Computation Offloading in Multi-Access Edge ComputingRaghubir Singh, Simon Armour, Aftab Khan, Mahesh Sooriyabandara, George Oikonomou. 289-294 [doi]
- A Survey on LoRa for IoT: Integrating Edge ComputingVictor K. Sarker, Jorge Peña Queralta, Tuan Nguyen Gia, Hannu Tenhunen, Toni Westerlund. 295-300 [doi]
- Machine Learning on Mobile: An On-device Inference App for Skin Cancer DetectionXiangfeng Dai, Irena Spasic, Bradley Meyer, Samuel Chapman, Frédéric Andrès. 301-305 [doi]
- LEAF: Live Building Performance Evaluation FrameworkElena Markoska, Sanja Lazarova-Molnar. 306-311 [doi]
- Dynamic Routing Using Precipitation DataPhilipp Kisters, Dirk Bade, Julius Wulk. 312-317 [doi]
- Collaborative LoRa-Based Sensor Network for Pollution Monitoring in Smart CitiesSandra Sendra, José Luis García-Navas, Pablo Romero-Diaz, Jaime Lloret. 318-323 [doi]
- Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart CitiesJavier Rocher, Daniel A. Basterrechea, Miran Taha, Mar Parra, Jaime Lloret. 324-329 [doi]
- Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi DialectShoayee Alotaibi, Rashid Mehmood, Iyad Katib. 330-335 [doi]
- Real-time Traffic Management Model using GPUenabled Edge DevicesM. Mazhar Rathore, Yaser Jararweh, Hojae Son, Anand Paul. 336-343 [doi]