default search action
EDGE 2017: Honolulu, HI, USA
- IEEE International Conference on Edge Computing, EDGE 2017, Honolulu, HI, USA, June 25-30, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2017-5
- Dumitrel Loghin, Lavanya Ramapantulu, Yong Meng Teo:
On Understanding Time, Energy and Cost Performance of Wimpy Heterogeneous Systems for Edge Computing. 1-8 - Ajay Kattepur, Hemant Kumar Rath, Anantha Simha:
A-Priori Estimation of Computation Times in Fog Networked Robotics. 9-16 - Ashkan Yousefpour, Genya Ishigaki, Jason P. Jue:
Fog Computing: Towards Minimizing Delay in the Internet of Things. 17-24 - Fatemeh Jalali, Safieh Khodadustan, Chrispin Gray, Kerry Hinton, Frank Suits:
Greening IoT with Fog: A Survey. 25-31 - Yaozhong Song, Stephen S. Yau, Ruozhou Yu, Xiang Zhang, Guoliang Xue:
An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications. 32-39 - Guanlin Wu, Junjie Chen, Weidong Bao, Xiaomin Zhu, Wenhua Xiao, Ji Wang, Ling Liu:
MECCAS: Collaborative Storage Algorithm Based on Alternating Direction Method of Multipliers on Mobile Edge Cloud. 40-46 - Jinlai Xu, Balaji Palanisamy, Heiko Ludwig, Qingyang Wang:
Zenith: Utility-Aware Resource Allocation for Edge Computing. 47-54 - Ruma R. Paul, Jérémie Melchior, Peter Van Roy, Vladimir Vlassov:
Designing Distributed Applications Using a Phase-Aware, Reversible System. 55-64 - Ahmed Taha, Salman Manzoor, Neeraj Suri:
SLA-Based Service Selection for Multi-Cloud Environments. 65-72 - Mehdi Ahmed-Nacer, Walid Gaaloul, Samir Tata:
OCCI-Compliant Cloud Configuration Simulation. 73-81 - Stephen S. Kirkman, Richard Newman:
Bridging the Cloud Trust Gap: Using ORCON Policy to Manage Consumer Trust between Different Clouds. 82-89 - Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig:
Security SLA Based Monitoring in Clouds. 90-97 - Everaldo Leme, Naghmeh Ramezani Ivaki, Nuno Laranjeiro, Regina Moraes:
Analyzing Gossip Protocols for Reliable MANET Applications. 98-105 - Mehran Khan, Maria Toeroe, Ferhat Khendek:
Comparing Pacemaker with OpenSAF for Availability Management in the Cloud. 106-111 - Peng Wang, Jing Liu, Kai Ding:
TRCID: Optimized Task Recovery in MapReduce Based on Checkpointing Intermediate Data. 112-119 - Qizhi Zhang, Haopeng Chen, Zhida Yin:
PRMRAP: A Proactive Virtual Resource Management Framework in Cloud. 120-127 - Shigeto Suzuki, Hiroyoshi Kodama, Hiroyuki Fukuda:
Optimizing ICT Equipment via Resource Allocation in Cloud Systems. 128-135 - Xianrong Zheng, Li Da Xu, Sheng Chai:
Ranking-Based Cloud Service Recommendation. 136-141 - Maithilee P. Joshi, Sudip Mittal, Karuna P. Joshi, Tim Finin:
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage. 142-149 - Zhitao Wan, Lihua Duan, Ping Wang:
Cloud Migration: Layer Partition and Integration. 150-157 - Mohan Baruwal Chhetri, Markus Lumpe, Quoc Bao Vo, Ryszard Kowalczyk:
On Forecasting Amazon EC2 Spot Prices Using Time-Series Decomposition with Hybrid Look-Backs. 158-165 - Atakan Aral, Ivona Brandic:
Quality of Service Channelling for Latency Sensitive Edge Applications. 166-173 - Bongjin Sohn, Kiwoong Kwon, Daeyoung Kim:
GS1 Video: Open Service System for Video Using MPEG 7 and GS1 Standard. 174-181 - Rakesh Jain, Samir Tata:
Cloud to Edge: Distributed Deployment of Process-Aware IoT Applications. 182-189 - Xinhui Li, Kai Li, Xudong Pang, Yiping Wang:
An Orchestration Based Cloud Auto-Healing Service Framework. 190-193 - Binod Kumar Adhikari, Wanli Zuo, Ramesh Maharjan:
A Performance Analysis of OpenStack Cloud vs Real System on Hadoop Clusters. 194-201 - Gang Xu, Ming Zhang, Hai-He Jin, Yan Wang:
Research on the Topological Evolution of Uncertain Social Relations in Opportunistic Networks. 202-205 - Muhammed Abdulazeez, Pawel Garncarek, Dariusz R. Kowalski, Prudence W. H. Wong:
Lightweight Robust Framework for Workload Scheduling in Clouds. 206-209 - Qassim Bani Hani, Julius P. Ditcher:
Stand-Out Segmentation Access Control for Cloud Outsourced Data. 210-215 - Tulha Al-Salah, Liang Hong, Sachin Shetty:
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure. 216-219 - Nadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki, Pedro Nunes Da Costa, Marco Paulo Amorim Vieira:
Towards an Approach for Trustworthiness Assessment of Software as a Service. 220-223 - Chiao-Yi Cheng, Yao-Hung Lin, Fang Yu:
Adaptive Social Network Services: The Practice of 9EMBA.COM. 224-227 - Hsin-Han Wu, Yung-Ting Chuang:
Low-Cost Smart Refrigerator. 228-231 - Xiaojuan Wei, Shangguang Wang, Ao Zhou, Jinliang Xu, Sen Su, Sathish A. P. Kumar, Fangchun Yang:
MVR: An Architecture for Computation Offloading in Mobile Edge Computing. 232-235 - Narendra Anand, Anuraag Chintalapally, Colin Puri, Teresa Tung:
Practical Edge Analytics: Architectural Approach and Use Cases. 236-239 - Yanik Ngoko, Christophe Cérin:
An Edge Computing Platform for the Detection of Acoustic Events. 240-243 - Parag S. Chandakkar, Yikang Li, Pak Lun Kevin Ding, Baoxin Li:
Strategies for Re-Training a Pruned Neural Network in an Edge Computing Paradigm. 244-247 - Smruthi Sridhar, Matthew E. Tolentino:
Evaluating Voice Interaction Pipelines at the Edge. 248-251 - Mohamed Nabeel:
The Many Faces of End-to-End Encryption and Their Security Analysis. 252-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.