


default search action
EDGE 2017: Honolulu, HI, USA
- IEEE International Conference on Edge Computing, EDGE 2017, Honolulu, HI, USA, June 25-30, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2017-5

- Dumitrel Loghin, Lavanya Ramapantulu, Yong Meng Teo

:
On Understanding Time, Energy and Cost Performance of Wimpy Heterogeneous Systems for Edge Computing. 1-8 - Ajay Kattepur, Hemant Kumar Rath, Anantha Simha:

A-Priori Estimation of Computation Times in Fog Networked Robotics. 9-16 - Ashkan Yousefpour, Genya Ishigaki

, Jason P. Jue:
Fog Computing: Towards Minimizing Delay in the Internet of Things. 17-24 - Fatemeh Jalali, Safieh Khodadustan, Chrispin Gray

, Kerry Hinton, Frank Suits
:
Greening IoT with Fog: A Survey. 25-31 - Yaozhong Song, Stephen S. Yau, Ruozhou Yu

, Xiang Zhang, Guoliang Xue:
An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications. 32-39 - Guanlin Wu

, Junjie Chen, Weidong Bao, Xiaomin Zhu, Wenhua Xiao, Ji Wang, Ling Liu:
MECCAS: Collaborative Storage Algorithm Based on Alternating Direction Method of Multipliers on Mobile Edge Cloud. 40-46 - Jinlai Xu

, Balaji Palanisamy, Heiko Ludwig, Qingyang Wang:
Zenith: Utility-Aware Resource Allocation for Edge Computing. 47-54 - Ruma R. Paul, Jérémie Melchior, Peter Van Roy, Vladimir Vlassov

:
Designing Distributed Applications Using a Phase-Aware, Reversible System. 55-64 - Ahmed Taha, Salman Manzoor, Neeraj Suri

:
SLA-Based Service Selection for Multi-Cloud Environments. 65-72 - Mehdi Ahmed-Nacer, Walid Gaaloul

, Samir Tata:
OCCI-Compliant Cloud Configuration Simulation. 73-81 - Stephen S. Kirkman, Richard Newman:

Bridging the Cloud Trust Gap: Using ORCON Policy to Manage Consumer Trust between Different Clouds. 82-89 - Nesrine Kaaniche

, Mohamed Mohamed, Maryline Laurent
, Heiko Ludwig:
Security SLA Based Monitoring in Clouds. 90-97 - Everaldo Leme, Naghmeh Ramezani Ivaki

, Nuno Laranjeiro
, Regina Moraes
:
Analyzing Gossip Protocols for Reliable MANET Applications. 98-105 - Mehran Khan, Maria Toeroe, Ferhat Khendek

:
Comparing Pacemaker with OpenSAF for Availability Management in the Cloud. 106-111 - Peng Wang, Jing Liu, Kai Ding:

TRCID: Optimized Task Recovery in MapReduce Based on Checkpointing Intermediate Data. 112-119 - Qizhi Zhang, Haopeng Chen, Zhida Yin:

PRMRAP: A Proactive Virtual Resource Management Framework in Cloud. 120-127 - Shigeto Suzuki, Hiroyoshi Kodama, Hiroyuki Fukuda:

Optimizing ICT Equipment via Resource Allocation in Cloud Systems. 128-135 - Xianrong Zheng, Li Da Xu, Sheng Chai:

Ranking-Based Cloud Service Recommendation. 136-141 - Maithilee P. Joshi, Sudip Mittal, Karuna P. Joshi

, Tim Finin
:
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage. 142-149 - Zhitao Wan, Lihua Duan, Ping Wang:

Cloud Migration: Layer Partition and Integration. 150-157 - Mohan Baruwal Chhetri

, Markus Lumpe, Quoc Bao Vo, Ryszard Kowalczyk
:
On Forecasting Amazon EC2 Spot Prices Using Time-Series Decomposition with Hybrid Look-Backs. 158-165 - Atakan Aral

, Ivona Brandic:
Quality of Service Channelling for Latency Sensitive Edge Applications. 166-173 - Bongjin Sohn, Kiwoong Kwon, Daeyoung Kim:

GS1 Video: Open Service System for Video Using MPEG 7 and GS1 Standard. 174-181 - Rakesh Jain, Samir Tata:

Cloud to Edge: Distributed Deployment of Process-Aware IoT Applications. 182-189 - Xinhui Li, Kai Li, Xudong Pang, Yiping Wang:

An Orchestration Based Cloud Auto-Healing Service Framework. 190-193 - Binod Kumar Adhikari, Wanli Zuo, Ramesh Maharjan:

A Performance Analysis of OpenStack Cloud vs Real System on Hadoop Clusters. 194-201 - Gang Xu

, Ming Zhang, Hai-He Jin, Yan Wang:
Research on the Topological Evolution of Uncertain Social Relations in Opportunistic Networks. 202-205 - Muhammed Abdulazeez, Pawel Garncarek

, Dariusz R. Kowalski, Prudence W. H. Wong:
Lightweight Robust Framework for Workload Scheduling in Clouds. 206-209 - Qassim Bani Hani, Julius P. Ditcher:

Stand-Out Segmentation Access Control for Cloud Outsourced Data. 210-215 - Tulha Al-Salah, Liang Hong, Sachin Shetty

:
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure. 216-219 - Nadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki

, Pedro Nunes Da Costa, Marco Paulo Amorim Vieira
:
Towards an Approach for Trustworthiness Assessment of Software as a Service. 220-223 - Chiao-Yi Cheng, Yao-Hung Lin, Fang Yu:

Adaptive Social Network Services: The Practice of 9EMBA.COM. 224-227 - Hsin-Han Wu, Yung-Ting Chuang:

Low-Cost Smart Refrigerator. 228-231 - Xiaojuan Wei, Shangguang Wang

, Ao Zhou, Jinliang Xu, Sen Su, Sathish A. P. Kumar, Fangchun Yang:
MVR: An Architecture for Computation Offloading in Mobile Edge Computing. 232-235 - Narendra Anand, Anuraag Chintalapally, Colin Puri, Teresa Tung:

Practical Edge Analytics: Architectural Approach and Use Cases. 236-239 - Yanik Ngoko, Christophe Cérin:

An Edge Computing Platform for the Detection of Acoustic Events. 240-243 - Parag S. Chandakkar, Yikang Li, Pak Lun Kevin Ding, Baoxin Li:

Strategies for Re-Training a Pruned Neural Network in an Edge Computing Paradigm. 244-247 - Smruthi Sridhar, Matthew E. Tolentino:

Evaluating Voice Interaction Pipelines at the Edge. 248-251 - Mohamed Nabeel:

The Many Faces of End-to-End Encryption and Their Security Analysis. 252-259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














