default search action
4th FMEC 2019: Rome, Italy
- Fourth International Conference on Fog and Mobile Edge Computing, FMEC 2019, Rome, Italy, June 10-13, 2019. IEEE 2019, ISBN 978-1-7281-1796-6
Fog and Mobile Edge Computing
- Cosimo Anglano, Massimo Canonico, Marco Guazzone:
Online User-driven Task Scheduling for FemtoClouds. 5-12 - Isaac Lera, Carlos Guerrero, Carlos Juiz:
Analyzing the Applicability of a Multi-Criteria Decision Method in Fog Computing Placement Problem. 13-20 - Areeg Samir, Claus Pahl:
Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov Models. 21-28 - Roberto Beraldi, Hussein M. Alnuweiri:
Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog Providers. 29-36 - Michele Berno, Juan José Alcaraz, Michele Rossi:
On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC Architectures. 37-44 - Nour Mostafa:
Cooperative Fog Communications using A Multi-Level Load Balancing. 45-51 - Mohammad Heydari, Alexios Mylonas, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. 52-59 - Roberto Casadei, Mirko Viroli:
Coordinating Computation at the Edge: a Decentralized, Self-Organizing, Spatial Approach. 60-67 - Areeg Samir, Claus Pahl:
Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models. 68-73 - Michele Zanella, Giuseppe Massari, William Fornaciari:
Run-Time Managed Mobile Application Execution. 74-77 - Giuseppe Astuti, Antonio Brogi, Stefano Forti:
Making a Business Out of (Predictive Application Management in) the Fog. 78-85 - Tadeu F. Oliveira, Luiz Felipe Q. Silveira:
Distributed SDN controllers optimization for energy saving. 86-89 - Lylia Alouache, Mohamed Maachaoui, Makhlouf Aliouat, Rachid Chelouah:
Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust. 90-97 - Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker:
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. 98-104 - Hazem A. Abdelhafez, Matei Ripeanu:
Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1. 105-112 - Gianfranco Ciccarella, Romeo Giuliano, Franco Mazzenga, Francesco Vatalaro, Alessandro Vizzarri:
Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO Saving. 113-120 - Sambit Shukla, Dipak Ghosal, Kesheng Wu, Alex Sim, Matthew K. Farrens:
Co-optimizing Latency and Energy for IoT services using HMP servers in Fog Clusters. 121-128 - Sarra Mehamel, Samia Bouzefrane, Khaled Slimani, Mehammed Daoui:
New Caching System Under Uncertainty for Mobile Edge Computing. 129-134 - Alessandro Randazzo, Ilenia Tinnirello:
Recognizing Video Resolution by Monitoring Memory Metrics in Mobile Clients. 135-141 - Muder Almiani, Abdul Razaque, Liu Yimu, Meer Jaro Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi:
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending. 142-148 - Eric Gyamfi, James Adu Ansere, Lina Xu:
ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing. 149-154 - Francesco Buccafurri, Gianluca Lax, Antonia Russo:
Exploiting Digital Identity for Mobility in Fog Computing. 155-160 - Pietro Battistoni, Monica Sebillo, Giuliana Vitiello:
Experimenting with a Fog-computing Architecture for Indoor Navigation. 161-165 - Amir Karamoozian, Abdelhakim Hafid, El Mostapha Aboulhamid:
On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applications. 166-172 - Themis Melissaris, Kelly A. Shaw, Margaret Martonosi:
OKAPI: In Support of Application Correctness in Smart Home Environments. 173-180 - Muhammad Mazhar Ullah Rathore, Yaser Jararweh, Muhammad Raheel, Anand Paul:
Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication. 181-188 - Gizem Gultekin Varkonyi, Attila Kertész, Szilvia Varadi:
Privacy-awareness of Users in our Cloudy Smart World. 189-196 - Kamil Macheta, Krzysztof Mateusz Malarski, Martin Nordal Petersen, Sarah Ruepp:
Network Slicing for End-to-End Latency Provisioning in Internet of Things. 197-198
Internet of Things: Networking Applications and Technologies
- Martin Gergeleit:
Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree Network. 199-203 - Nesrine Ammar, Ludovic Noirie, Sébastien Tixeuil:
Network-Protocol-Based IoT Device Identification. 204-209 - Syed Rameez Ullah Kakakhel, Tomi Westerlund, Masoud Daneshtalab, Zhuo Zou, Juha Plosila, Hannu Tenhunen:
A Qualitative Comparison Model for Application Layer IoT Protocols. 210-215 - Nour Takiddeen, Imran A. Zualkernan:
Smartwatches as IoT Edge Devices: A Framework and Survey. 216-222 - Emmanuel Eyo Effiok, Enjie Liu, Jon Hitchcock:
Lifestyle Risk Association Aggregation. 223-228 - Gökay Saldamli, Sumedh Deshpande, Kaustubh Jawalekar, Pritam Gholap, Lo'ai Tawalbeh, Levent Ertaul:
Wildfire Detection using Wireless Mesh Network. 229-234 - Gökay Saldamli, Levent Ertaul, Asharani Maratkere Shankaralingappa:
Analysis of Lightweight Message Authentication Codes for IoT Environments. 235-240 - Smriti Bhatt, Lo'ai Tawalbeh, Pankaj Chhetri, Paras Bhatt:
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. 241-246 - Michael Opoku Agyeman, Ali Al-Mahmood:
Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home Rehabilitation. 247-252 - Michael Opoku Agyeman, Zainab Al-Waisi, Igla Hoxha:
Design and Implementation of an IoT-Based Energy Monitoring System for Managing Smart Homes. 253-258 - Mustafa Daraghmeh, Ismaeel Al Ridhawi, Moayad Aloqaily, Yaser Jararweh, Anjali Agarwal:
A Power Management Approach to Reduce Energy Consumption for Edge Computing Servers. 259-264
Smart Living with IoT, Cloud, and Edge Computing
- Elena Markoska, Sanja Lazarova-Molnar:
Usability Requirements for Smart Buildings' Performance Testing Solutions: A Survey. 265-270 - Preeti Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla:
vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment. 271-277 - Suresh K. Peddoju, Himanshu Upadhyay, Shekhar Bhansali:
Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm. 278-282 - Venkatraman Balasubramanian, Kees Kroep, Kishor Chandra Joshi, R. Venkatesha Prasad:
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds. 283-288 - Raghubir Singh, Simon Armour, Aftab Khan, Mahesh Sooriyabandara, George Oikonomou:
The Advantage of Computation Offloading in Multi-Access Edge Computing. 289-294 - Victor K. Sarker, Jorge Peña Queralta, Tuan Nguyen Gia, Hannu Tenhunen, Tomi Westerlund:
A Survey on LoRa for IoT: Integrating Edge Computing. 295-300 - Xiangfeng Dai, Irena Spasic, Bradley Meyer, Samuel Chapman, Frédéric Andrès:
Machine Learning on Mobile: An On-device Inference App for Skin Cancer Detection. 301-305
Smart Cities Systems Engineering
- Elena Markoska, Sanja Lazarova-Molnar:
LEAF: Live Building Performance Evaluation Framework. 306-311 - Philipp Kisters, Dirk Bade, Julius Wulk:
Dynamic Routing Using Precipitation Data. 312-317 - Sandra Sendra, José Luis García-Navas, Pablo Romero-Díaz, Jaime Lloret:
Collaborative LoRa-Based Sensor Network for Pollution Monitoring in Smart Cities. 318-323 - Javier Rocher, Daniel A. Basterrechea, Miran Taha, Mar Parra, Jaime Lloret:
Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart Cities. 324-329 - Shoayee Alotaibi, Rashid Mehmood, Iyad A. Katib:
Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi Dialect. 330-335 - M. Mazhar Rathore, Yaser Jararweh, Hojae Son, Anand Paul:
Real-time Traffic Management Model using GPUenabled Edge Devices. 336-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.