IoTEC 2018 - International Workshop on Edge Computing for 5G/IoT (IoTEC 2018)
Topics/Call fo Papers
This workshop aims to investigate the opportunities and requirements for Edge Computing dominance for 5G/IoT Development. In addition, it seeks for novel contributions that help mitigating edge computing challenges for 5G and IoT Development. That is, the objective of Edge Computing Workshop for 5G/IoT Development (IoTEC 2018) in IoTaaS 2018 is to provide a forum for scientists, engineers, and researchers to discuss and exchange new ideas, novel results and experience on all aspects of Edge Computing for IoT.
We are pleased to invite you to submit original contributions to IoTEC 2018 via the official submission system for the conference http://iotaas.org/. This can include, technical and experimental, theoretical, conceptual, or a survey. All submissions will be peer-reviewed on the basis of relevance, originality, importance and clarity.
All registered papers will be submitted for inclusion by Springer and made available through SpringerLink Digital Library. Proceedings will be submitted for inclusion in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).
Including but not limited to the topics of interest listed below:
Mobile Cloud Computing Systems
Edge Computing Security and Privacy Issues
Edge Computing and billing models
Edge Computing for VANETS and MANETS
Cloudlet based edge Computing
Lightweight authentication mechanisms in Edge Computing architecture
Access Control models in Edge Computing
Identification of incentives for Edge Computing service providers
The future perspective for Edge Computing: Challenges and Open Issues
Edge Computing Quality of Service (QoS) improvements techniques
Edge Computing architecture features and evolution
Edge Computing Real-time communication interfaces and protocols
Edge Computing Resource scheduling that enhances the reliability and scalability
Edge Computing Resources monitoring mechanism and utilization measuring mechanism
Edge Computing resources allocation and management
Real-time load prediction model to optimize the user satisfaction
Edge Computing virtualization
Data storage, processing, and management at Edge Computing
Cyber hacking, next generation fire wall of Edge Computing
Deployment strategies of Edge Computing Servers
Admission control for Edge Computing
Security protocols in Edge Computing
We are pleased to invite you to submit original contributions to IoTEC 2018 via the official submission system for the conference http://iotaas.org/. This can include, technical and experimental, theoretical, conceptual, or a survey. All submissions will be peer-reviewed on the basis of relevance, originality, importance and clarity.
All registered papers will be submitted for inclusion by Springer and made available through SpringerLink Digital Library. Proceedings will be submitted for inclusion in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).
Including but not limited to the topics of interest listed below:
Mobile Cloud Computing Systems
Edge Computing Security and Privacy Issues
Edge Computing and billing models
Edge Computing for VANETS and MANETS
Cloudlet based edge Computing
Lightweight authentication mechanisms in Edge Computing architecture
Access Control models in Edge Computing
Identification of incentives for Edge Computing service providers
The future perspective for Edge Computing: Challenges and Open Issues
Edge Computing Quality of Service (QoS) improvements techniques
Edge Computing architecture features and evolution
Edge Computing Real-time communication interfaces and protocols
Edge Computing Resource scheduling that enhances the reliability and scalability
Edge Computing Resources monitoring mechanism and utilization measuring mechanism
Edge Computing resources allocation and management
Real-time load prediction model to optimize the user satisfaction
Edge Computing virtualization
Data storage, processing, and management at Edge Computing
Cyber hacking, next generation fire wall of Edge Computing
Deployment strategies of Edge Computing Servers
Admission control for Edge Computing
Security protocols in Edge Computing
Other CFPs
- 4th EAI International Conference on IoT as a Service
- 2nd International Conference on 5G for Ubiquitous Connectivity
- 3rd EAI International Conference on Industrial IoT Technologies and Applications
- 11th EAI International Wireless Internet Conference
- 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
Last modified: 2018-05-22 11:44:19