<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p><br>
</p>
<div class="moz-forward-container"><font size="4"><b><span>
<div><span style="font-weight:normal"></span><span
style="font-size:12pt"><span style="font-weight:normal">[Apologies
if you got multiple copies of this invitation]</span></span></div>
</span></b></font><br>
<font size="4"><b><span>
<div><span style="font-size:12pt"></span></div>
</span></b></font>
<div dir="ltr">
<div class="gmail_quote">
<div dir="ltr">
<div class="gmail_quote">
<div class="m_710159365582774000gmail-HOEnZb">
<div class="m_710159365582774000gmail-h5">
<div dir="ltr">
<div style="text-align:left"><font size="4"><b><span>
<div><span style="font-size:12pt"></span><font
size="4"><b><span></span></b></font><br>
<font size="4"><b><span></span></b></font></div>
</span></b></font></div>
<div style="text-align:center"><font size="4"><b><span>The
Third International Conference on Fog and
Mobile Edge Computing (</span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">FMEC</span><span> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span><span>)</span></b></font></div>
<font size="4"><span>
<div style="text-align:center"><b><span>Barcelona,
Spain. </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">April
23-26, <span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span></b></div>
<div style="text-align:center"><b><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"><br>
</span></span></span></b></div>
</span></font>
<div style="text-align:center;font-size:12.8px"><font
size="4"><a
href="http://emergingtechnet.org/FMEC2018/index.php"
rel="noreferrer" target="_blank"
moz-do-not-send="true">http://emergingtechnet.org/FME<wbr>C2018/index.php</a></font><a
href="http://emergingtechnet.org/FMEC2018/index.php" rel="noreferrer"
style="font-size:12.8px" target="_blank"
moz-do-not-send="true"><br>
</a></div>
<b><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">
<div>
<p style="font-family:"times new
roman";font-size:12.8px" align="left"><span
style="font-weight:normal"><font size="4">Co-located
with (SDS 2018): <a
href="http://emergingtechnet.org/SDS2018/index.php"
target="_blank" moz-do-not-send="true">http://emergingtechnet.org/<wbr>SDS2018/index.php</a></font></span></p>
</div>
</span></b></div>
<div dir="ltr"><u><b><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">2018</span><span
style="font-size:12.8px"> Call for Papers:</span></b></u><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">Cloud computing
provides large range of services and virtually
unlimited available resources for users. New
applications, such as virtual reality and smart
building control, have emerged due to the large
number of resources and services brought by cloud
computing. However, the delay-sensitive
applications face the problem of large latency,
especially when several smart devices and objects
are getting involved in human’s life such as the
case of smart cities or Internet of Things.
Therefore, cloud computing is unable to meet the
requirements of low latency, location awareness,
and mobility support.</span><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">To solve this
problem, researchers have introduced a trusted and
dependable solution through the Fog and the Mobile
Edge Computing (</span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">) to put the services and
resources of the cloud closer to users, which
facilitates the leveraging of available services
and resources in the edge networks. By this, we
are moving from the core (cloud data centers) to
the edge of the network closer to the users. </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> dependability is based
on providing user centric service. The purpose of
Fog and the Mobile Edge Computing is to run the
heavy real-time applications at the network edge
directly using the billions of connected mobile
devices.</span><br style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">Several features
enable the Fog and the Mobile Edge Computing to be
a perfect paradigm to the aforementioned purpose,
which are the dense geographical deployment of
servers, supporting mobility and the closeness to
users. As in every new technology, some challenges
face the vision of the Fog and the Mobile Edge
Computing, which are the administrative policies
and security concerns (i.e. secure data storage,
secure computation, network security, data
privacy, usage privacy, location privacy, etc).</span><br
style="font-size:12.8px">
<span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">2018</span><span
style="font-size:12.8px"> conference aims to
investigate the opportunities and requirements for
Mobile Edge Computing dominance. In addition, it
seeks for novel contributions that help mitigating
Mobile Edge Computing challenges. That is, the
objective of </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">2018</span><span
style="font-size:12.8px"> is to provide a forum
for scientists, engineers, and researchers to
discuss and exchange new ideas, novel results and
experience on all aspects of Fog and Mobile Edge
Computing (</span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">). Researchers are
encouraged to submit original research
contributions in all major areas, which include,
but not limited to:</span><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">* Mobile Cloud
Computing Systems.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Security and Privacy
Issues.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Pricing and billing
models.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> support for VANETS and
MANETS</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Cloudlet based
computing</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Dew based computing</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Lightweight
authentication mechanisms in </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> architecture.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Access Control
models in </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Identification of
incentives for </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> service providers.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* The future
perspective for </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">: Challenges and Open
Issues.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Quality of Service (QoS)
improvements techniques.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> architecture features
and evolution.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Real-time communication
interfaces and protocols.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Resource scheduling that
enhances the reliability and scalability.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Resources monitoring
mechanism and utilization measuring mechanism.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> resources allocation and
management.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Real-time load
prediction model to optimize the user
satisfaction.</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> virtualization.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Data storage,
processing, and management at </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> platform.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Cyber hacking, next
generation fire wall of </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Deployment
strategies of </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Servers</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Admission control
for </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Social engineering,
insider threats, advance spear phishing.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Incident Handling
and Penetration Testing.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Forensics of
Virtual and </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Environments.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security protocols
in </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px">.</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy of mobile cloud computing</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security, privacy
and reliability issues of MCC and IoT</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy of IoT</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy management in MCC</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* MCC intrusion
detection systems</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of pricing
and billing for mobile cloud computing services</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of mobile,
peer-to-peer and pervasive services in clouds</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of mobile
commerce and mobile Internet of Things</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of mobile
social networks</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy in smartphone devices</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy in social applications and networks</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of Mobile,
peer-to-peer and pervasive services in clouds</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of Mobile
commerce and mobile internet of things</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of
Operating system and middleware support for mobile
computing</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy in sensor networks</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security and
privacy in social applications and networks</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Web service
security</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Security of 3G/4G
systems, Wi-MAX, Ad-hoc</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Security of Mobile
social networks</span><br style="font-size:12.8px">
<span style="font-size:12.8px">* Near field
communication services</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Service-oriented
architectures, service portability, P2P</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">* Network
virtualization and cloud-based radio access
networks</span><br style="font-size:12.8px">
<br style="font-size:12.8px">
<u><span style="font-size:12.8px"><b>Important
Dates:</b></span></u><br
style="font-size:12.8px">
<span style="font-size:12.8px">Submission Date: </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
style="font-size:12.8px">15 December 2017</span><br
style="font-size:12.8px">
<span style="font-size:12.8px">Notification to
Authors: </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
style="font-size:12.8px"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">15
February <span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span><br
style="font-size:12.8px">
<span style="font-size:12.8px">Camera Ready
Submission: </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
style="font-size:12.8px"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">1
March <span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span><br
style="font-size:12.8px">
<span style="font-size:12.8px"><br>
</span>
<div><span style="font-size:12.8px"><br>
</span></div>
<div><u><span style="font-size:12.8px"><b>Submissions
Guidelines and Proceedings:</b></span></u><br
style="font-size:12.8px">
<span style="font-size:12.8px">Manuscripts should
be prepared in
<div> </div>
10-point font using the IEEE 8.5" x 11"
two-column format. All papers should be in PDF
format, and submitted electronically at Paper
Submission Link. A full paper must not exceed
<div>8 pages</div>
(including all figures, tables and references).
Submitted papers must present original
unpublished research that is not currently under
review for any other conference or journal.
Papers not following these guidelines may be
rejected without review. Also submissions
received after the due date, exceeding length
limit, or not appropriately structured may also
not be considered. Authors may contact the
Program Chair for further information or
clarification.</span><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">All submissions are
peer-reviewed by at least three reviewers.
Accepted papers will appear in the </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> Proceedings, and be
published by the IEEE Computer Society
Conference Publishing Services and be submitted
to IEEE Xplore for inclusion.</span><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px">Submitted papers
must include original work, and must not be
under consideration for another conference or
journal. Submission of regular papers must not
exceed 8 pages and must follow the IEEE paper
format. Please include up to 7 keywords,
complete postal and e-mail address, and fax and
phone numbers of the corresponding author.
Authors of accepted papers are expected to
present their work at the conference. Submitted
papers that are deemed of good quality but that
could not be accepted as regular papers will be
accepted as short papers. Length of short papers</span><br
style="font-size:12.8px">
<br style="font-size:12.8px">
<span style="font-size:12.8px"><b>Journal Special
Issues:</b></span><br style="font-size:12.8px">
<span style="font-size:12.8px">Selected papers
from the will be invited to submit an extended
version to the following journal. Papers will be
selected based on their reviewers’ scores and
appropriateness to the Journal’s theme.</span></div>
<div><span style="font-size:12.8px"><br>
</span></div>
<div><span style="font-size:12.8px">
<div><font size="2">* Cluster Computing Journal
(IF: 2.04) - Springer<br>
* Concurrency and Computation: Practice and
Experience Journal (IF: 1.13) - Wiley</font><font
style="font-family:"times new
roman"" size="4">
<p><span
id="m_710159365582774000gmail-m_-7045669195837326435gmail-m_-6903077965003768750m_-5029099693768526863footer-copyright"></span></p>
</font><br style="font-size:12.8px">
</div>
</span><span style="font-size:12.8px">Please send
any inquiry on </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">FMEC</span><span
style="font-size:12.8px"> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
style="font-size:12.8px">2018</span><span
style="font-size:12.8px"> to the Emerging Tech.
Network Team at: </span><a
href="mailto:emergingtechnetwork@gmail.com"
style="font-size:12.8px" target="_blank"
moz-do-not-send="true">emergingtechnetwork@gmail.<wbr>com</a></div>
</div>
</div>
</div>
</div>
<br>
</div>
</div>
</div>
</div>
</body>
</html>