


default search action
4th FMEC 2019: Rome, Italy
- Fourth International Conference on Fog and Mobile Edge Computing, FMEC 2019, Rome, Italy, June 10-13, 2019. IEEE 2019, ISBN 978-1-7281-1796-6
Fog and Mobile Edge Computing
- Cosimo Anglano, Massimo Canonico, Marco Guazzone
:
Online User-driven Task Scheduling for FemtoClouds. 5-12 - Isaac Lera, Carlos Guerrero, Carlos Juiz:
Analyzing the Applicability of a Multi-Criteria Decision Method in Fog Computing Placement Problem. 13-20 - Areeg Samir, Claus Pahl
:
Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov Models. 21-28 - Roberto Beraldi
, Hussein M. Alnuweiri:
Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog Providers. 29-36 - Michele Berno, Juan José Alcaraz, Michele Rossi:
On the Allocation of Computing Tasks under QoS Constraints in Hierarchical MEC Architectures. 37-44 - Nour Mostafa
:
Cooperative Fog Communications using A Multi-Level Load Balancing. 45-51 - Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. 52-59 - Roberto Casadei
, Mirko Viroli:
Coordinating Computation at the Edge: a Decentralized, Self-Organizing, Spatial Approach. 60-67 - Areeg Samir, Claus Pahl
:
Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models. 68-73 - Michele Zanella
, Giuseppe Massari, William Fornaciari
:
Run-Time Managed Mobile Application Execution. 74-77 - Giuseppe Astuti, Antonio Brogi
, Stefano Forti
:
Making a Business Out of (Predictive Application Management in) the Fog. 78-85 - Tadeu F. Oliveira, Luiz Felipe Q. Silveira
:
Distributed SDN controllers optimization for energy saving. 86-89 - Lylia Alouache, Mohamed Maachaoui
, Makhlouf Aliouat
, Rachid Chelouah
:
Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust. 90-97 - Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved
, Timothy S. Kroecker:
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. 98-104 - Hazem A. Abdelhafez, Matei Ripeanu:
Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1. 105-112 - Gianfranco Ciccarella, Romeo Giuliano
, Franco Mazzenga, Francesco Vatalaro, Alessandro Vizzarri:
Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO Saving. 113-120 - Sambit Shukla, Dipak Ghosal
, Kesheng Wu
, Alex Sim
, Matthew K. Farrens:
Co-optimizing Latency and Energy for IoT services using HMP servers in Fog Clusters. 121-128 - Sarra Mehamel, Samia Bouzefrane, Khaled Slimani, Mehammed Daoui:
New Caching System Under Uncertainty for Mobile Edge Computing. 129-134 - Alessandro Randazzo
, Ilenia Tinnirello:
Recognizing Video Resolution by Monitoring Memory Metrics in Mobile Clients. 135-141 - Muder Almiani
, Abdul Razaque
, Liu Yimu, Meer Jaro Khan, Tang Minjie, Mohammed Alweshah
, Saleh Atiewi
:
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending. 142-148 - Eric Gyamfi
, James Adu Ansere
, Lina Xu:
ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing. 149-154 - Francesco Buccafurri, Gianluca Lax, Antonia Russo
:
Exploiting Digital Identity for Mobility in Fog Computing. 155-160 - Pietro Battistoni
, Monica Sebillo, Giuliana Vitiello
:
Experimenting with a Fog-computing Architecture for Indoor Navigation. 161-165 - Amir Karamoozian, Abdelhakim Hafid, El Mostapha Aboulhamid:
On the Fog-Cloud Cooperation: How Fog Computing can address latency concerns of IoT applications. 166-172 - Themis Melissaris, Kelly A. Shaw, Margaret Martonosi:
OKAPI: In Support of Application Correctness in Smart Home Environments. 173-180 - Muhammad Mazhar Ullah Rathore, Yaser Jararweh, Muhammad Raheel, Anand Paul
:
Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication. 181-188 - Gizem Gültekin-Várkonyi, Attila Kertész
, Szilvia Varadi:
Privacy-awareness of Users in our Cloudy Smart World. 189-196 - Kamil Macheta, Krzysztof Mateusz Malarski, Martin Nordal Petersen
, Sarah Ruepp
:
Network Slicing for End-to-End Latency Provisioning in Internet of Things. 197-198
Internet of Things: Networking Applications and Technologies
- Martin Gergeleit
:
Autotree: Connecting Cheap IoT Nodes with an Auto-Configuring WiFi Tree Network. 199-203 - Nesrine Ammar, Ludovic Noirie
, Sébastien Tixeuil:
Network-Protocol-Based IoT Device Identification. 204-209 - Syed Rameez Ullah Kakakhel
, Tomi Westerlund
, Masoud Daneshtalab, Zhuo Zou, Juha Plosila, Hannu Tenhunen
:
A Qualitative Comparison Model for Application Layer IoT Protocols. 210-215 - Nour Takiddeen, Imran A. Zualkernan
:
Smartwatches as IoT Edge Devices: A Framework and Survey. 216-222 - Emmanuel Eyo Effiok, Enjie Liu, Jon Hitchcock:
Lifestyle Risk Association Aggregation. 223-228 - Gökay Saldamli, Sumedh Deshpande, Kaustubh Jawalekar, Pritam Gholap, Lo'ai Tawalbeh
, Levent Ertaul:
Wildfire Detection using Wireless Mesh Network. 229-234 - Gökay Saldamli, Levent Ertaul, Asharani Maratkere Shankaralingappa:
Analysis of Lightweight Message Authentication Codes for IoT Environments. 235-240 - Smriti Bhatt, Lo'ai Tawalbeh
, Pankaj Chhetri, Paras Bhatt:
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. 241-246 - Michael Opoku Agyeman
, Ali Al-Mahmood:
Design and Implementation of a Wearable Device for Motivating Patients With Upper and/or Lower Limb Disability Via Gaming and Home Rehabilitation. 247-252 - Michael Opoku Agyeman
, Zainab Al-Waisi, Igla Hoxha:
Design and Implementation of an IoT-Based Energy Monitoring System for Managing Smart Homes. 253-258 - Mustafa Daraghmeh
, Ismaeel Al Ridhawi, Moayad Aloqaily
, Yaser Jararweh, Anjali Agarwal:
A Power Management Approach to Reduce Energy Consumption for Edge Computing Servers. 259-264
Smart Living with IoT, Cloud, and Edge Computing
- Elena Markoska
, Sanja Lazarova-Molnar
:
Usability Requirements for Smart Buildings' Performance Testing Solutions: A Survey. 265-270 - Preeti Mishra
, Ishita Verma, Saurabh Gupta
, Varun S. Rana, Kavitha Kadarla:
vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment. 271-277 - Suresh K. Peddoju
, Himanshu Upadhyay, Shekhar Bhansali
:
Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm. 278-282 - Venkatraman Balasubramanian
, Kees Kroep, Kishor Chandra Joshi, R. Venkatesha Prasad
:
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds. 283-288 - Raghubir Singh
, Simon Armour, Aftab Khan, Mahesh Sooriyabandara, George Oikonomou
:
The Advantage of Computation Offloading in Multi-Access Edge Computing. 289-294 - Victor K. Sarker
, Jorge Peña Queralta
, Tuan Nguyen Gia
, Hannu Tenhunen, Tomi Westerlund
:
A Survey on LoRa for IoT: Integrating Edge Computing. 295-300 - Xiangfeng Dai, Irena Spasic, Bradley Meyer, Samuel Chapman, Frédéric Andrès:
Machine Learning on Mobile: An On-device Inference App for Skin Cancer Detection. 301-305
Smart Cities Systems Engineering
- Elena Markoska
, Sanja Lazarova-Molnar
:
LEAF: Live Building Performance Evaluation Framework. 306-311 - Philipp Kisters, Dirk Bade, Julius Wulk:
Dynamic Routing Using Precipitation Data. 312-317 - Sandra Sendra, José Luis García-Navas, Pablo Romero-Díaz, Jaime Lloret:
Collaborative LoRa-Based Sensor Network for Pollution Monitoring in Smart Cities. 318-323 - Javier Rocher
, Daniel A. Basterrechea, Miran Taha
, Mar Parra, Jaime Lloret:
Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart Cities. 324-329 - Shoayee Alotaibi
, Rashid Mehmood, Iyad A. Katib
:
Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi Dialect. 330-335 - M. Mazhar Rathore, Yaser Jararweh, Hojae Son, Anand Paul
:
Real-time Traffic Management Model using GPUenabled Edge Devices. 336-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.