<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p><br>
    </p>
    <div class="moz-forward-container"><font size="4"><b><span>
            <div><span style="font-weight:normal">​</span><span
                style="font-size:12pt"><span style="font-weight:normal">[Apologies
                  if you got multiple copies of this invitation]</span></span></div>
          </span></b></font><br>
      <font size="4"><b><span>
            <div><span style="font-size:12pt"></span></div>
          </span></b></font>
      <div dir="ltr">
        <div class="gmail_quote">
          <div dir="ltr">
            <div class="gmail_quote">
              <div class="m_710159365582774000gmail-HOEnZb">
                <div class="m_710159365582774000gmail-h5">
                  <div dir="ltr">
                    <div style="text-align:left"><font size="4"><b><span>
                            <div><span style="font-size:12pt"></span>​<font
                                size="4"><b><span></span></b></font><br>
                              <font size="4"><b><span></span></b></font></div>
                          </span></b></font></div>
                    <div style="text-align:center"><font size="4"><b><span>The
                            Third International Conference on Fog and
                            Mobile Edge Computing (</span><span
                            class="m_710159365582774000gmail-m_7157172971897381919gmail-il">FMEC</span><span> </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span><span>)</span></b></font></div>
                    <font size="4"><span>
                        <div style="text-align:center"><b><span>Barcelona,
                              Spain. </span><span
                              class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">April
                                23-26, <span
                                  class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span></b></div>
                        <div style="text-align:center"><b><span
                              class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ"><span
                                  class="m_710159365582774000gmail-m_7157172971897381919gmail-il"><br>
                                </span></span></span></b></div>
                      </span></font>
                    <div style="text-align:center;font-size:12.8px"><font
                        size="4"><a
                          href="http://emergingtechnet.org/FMEC2018/index.php"
                          rel="noreferrer" target="_blank"
                          moz-do-not-send="true">http://emergingtechnet.org/FME<wbr>C2018/index.php</a></font><a
href="http://emergingtechnet.org/FMEC2018/index.php" rel="noreferrer"
                        style="font-size:12.8px" target="_blank"
                        moz-do-not-send="true"><br>
                      </a></div>
                    <b><span
                        class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                        style="font-size:12.8px">
                        <div>​
                          <p style="font-family:"times new
                            roman";font-size:12.8px" align="left"><span
                              style="font-weight:normal"><font size="4">Co-located
                                with (SDS 2018): <a
                                  href="http://emergingtechnet.org/SDS2018/index.php"
                                  target="_blank" moz-do-not-send="true">http://emergingtechnet.org/<wbr>SDS2018/index.php</a></font></span></p>
                          ​</div>
                      </span></b></div>
                  <div dir="ltr"><u><b><span
                          class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                          style="font-size:12.8px">FMEC</span><span
                          style="font-size:12.8px"> </span><span
                          class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                          style="font-size:12.8px">2018</span><span
                          style="font-size:12.8px"> Call for Papers:</span></b></u><br
                      style="font-size:12.8px">
                    <br style="font-size:12.8px">
                    <span style="font-size:12.8px">Cloud computing
                      provides large range of services and virtually
                      unlimited available resources for users. New
                      applications, such as virtual reality and smart
                      building control, have emerged due to the large
                      number of resources and services brought by cloud
                      computing. However, the delay-sensitive
                      applications face the problem of large latency,
                      especially when several smart devices and objects
                      are getting involved in human’s life such as the
                      case of smart cities or Internet of Things.
                      Therefore, cloud computing is unable to meet the
                      requirements of low latency, location awareness,
                      and mobility support.</span><br
                      style="font-size:12.8px">
                    <br style="font-size:12.8px">
                    <span style="font-size:12.8px">To solve this
                      problem, researchers have introduced a trusted and
                      dependable solution through the Fog and the Mobile
                      Edge Computing (</span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">) to put the services and
                      resources of the cloud closer to users, which
                      facilitates the leveraging of available services
                      and resources in the edge networks. By this, we
                      are moving from the core (cloud data centers) to
                      the edge of the network closer to the users. </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> dependability is based
                      on providing user centric service. The purpose of
                      Fog and the Mobile Edge Computing is to run the
                      heavy real-time applications at the network edge
                      directly using the billions of connected mobile
                      devices.</span><br style="font-size:12.8px">
                    <br style="font-size:12.8px">
                    <span style="font-size:12.8px">Several features
                      enable the Fog and the Mobile Edge Computing to be
                      a perfect paradigm to the aforementioned purpose,
                      which are the dense geographical deployment of
                      servers, supporting mobility and the closeness to
                      users. As in every new technology, some challenges
                      face the vision of the Fog and the Mobile Edge
                      Computing, which are the administrative policies
                      and security concerns (i.e. secure data storage,
                      secure computation, network security, data
                      privacy, usage privacy, location privacy, etc).</span><br
                      style="font-size:12.8px">
                    <span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">2018</span><span
                      style="font-size:12.8px"> conference aims to
                      investigate the opportunities and requirements for
                      Mobile Edge Computing dominance. In addition, it
                      seeks for novel contributions that help mitigating
                      Mobile Edge Computing challenges. That is, the
                      objective of </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">2018</span><span
                      style="font-size:12.8px"> is to provide a forum
                      for scientists, engineers, and researchers to
                      discuss and exchange new ideas, novel results and
                      experience on all aspects of Fog and Mobile Edge
                      Computing (</span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">). Researchers are
                      encouraged to submit original research
                      contributions in all major areas, which include,
                      but not limited to:</span><br
                      style="font-size:12.8px">
                    <br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Mobile Cloud
                      Computing Systems.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Security and Privacy
                      Issues.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Pricing and billing
                      models.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> support for VANETS and
                      MANETS</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Cloudlet based
                      computing</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Dew based computing</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Lightweight
                      authentication mechanisms in </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> architecture.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Access Control
                      models in </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Identification of
                      incentives for </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> service providers.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* The future
                      perspective for </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">: Challenges and Open
                      Issues.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Quality of Service (QoS)
                      improvements techniques.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> architecture features
                      and evolution.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Real-time communication
                      interfaces and protocols.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Resource scheduling that
                      enhances the reliability and scalability.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Resources monitoring
                      mechanism and utilization measuring mechanism.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> resources allocation and
                      management.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Real-time load
                      prediction model to optimize the user
                      satisfaction.</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> virtualization.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Data storage,
                      processing, and management at </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> platform.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Cyber hacking, next
                      generation fire wall of </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Deployment
                      strategies of </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Servers</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Admission control
                      for </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Social engineering,
                      insider threats, advance spear phishing.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Incident Handling
                      and Penetration Testing.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Forensics of
                      Virtual and </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px"> Environments.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security protocols
                      in </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                      style="font-size:12.8px">FMEC</span><span
                      style="font-size:12.8px">.</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy of mobile cloud computing</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security, privacy
                      and reliability issues of MCC and IoT</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy of IoT</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy management in MCC</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* MCC intrusion
                      detection systems</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of pricing
                      and billing for mobile cloud computing services</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of mobile,
                      peer-to-peer and pervasive services in clouds</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of mobile
                      commerce and mobile Internet of Things</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of mobile
                      social networks</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy in smartphone devices</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy in social applications and networks</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of Mobile,
                      peer-to-peer and pervasive services in clouds</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of Mobile
                      commerce and mobile internet of things</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of
                      Operating system and middleware support for mobile
                      computing</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy in sensor networks</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security and
                      privacy in social applications and networks</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Web service
                      security</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of 3G/4G
                      systems, Wi-MAX, Ad-hoc</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Security of Mobile
                      social networks</span><br style="font-size:12.8px">
                    <span style="font-size:12.8px">* Near field
                      communication services</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Service-oriented
                      architectures, service portability, P2P</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">* Network
                      virtualization and cloud-based radio access
                      networks</span><br style="font-size:12.8px">
                    <br style="font-size:12.8px">
                    <u><span style="font-size:12.8px"><b>Important
                          Dates:</b></span></u><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">Submission Date: </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
                      style="font-size:12.8px">15 December 2017</span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">Notification to
                      Authors: </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
                      style="font-size:12.8px"><span
                        class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">15
                        February <span
                          class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px">Camera Ready
                      Submission: </span><span
                      class="m_710159365582774000gmail-m_7157172971897381919gmail-aBn"
                      style="font-size:12.8px"><span
                        class="m_710159365582774000gmail-m_7157172971897381919gmail-aQJ">1
                        March <span
                          class="m_710159365582774000gmail-m_7157172971897381919gmail-il">2018</span></span></span><br
                      style="font-size:12.8px">
                    <span style="font-size:12.8px"><br>
                    </span>
                    <div><span style="font-size:12.8px"><br>
                      </span></div>
                    <div><u><span style="font-size:12.8px"><b>Submissions
                            Guidelines and Proceedings:</b></span></u><br
                        style="font-size:12.8px">
                      <span style="font-size:12.8px">Manuscripts should
                        be prepared in
                        <div>​ ​</div>
                        10-point font using the IEEE 8.5" x 11"
                        two-column format. All papers should be in PDF
                        format, and submitted electronically at Paper
                        Submission Link. A full paper must not exceed 
                        <div>​8 pages​</div>
                        (including all figures, tables and references).
                        Submitted papers must present original
                        unpublished research that is not currently under
                        review for any other conference or journal.
                        Papers not following these guidelines may be
                        rejected without review. Also submissions
                        received after the due date, exceeding length
                        limit, or not appropriately structured may also
                        not be considered. Authors may contact the
                        Program Chair for further information or
                        clarification.</span><br
                        style="font-size:12.8px">
                      <br style="font-size:12.8px">
                      <span style="font-size:12.8px">All submissions are
                        peer-reviewed by at least three reviewers.
                        Accepted papers will appear in the </span><span
class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                        style="font-size:12.8px">FMEC</span><span
                        style="font-size:12.8px"> Proceedings, and be
                        published by the IEEE Computer Society
                        Conference Publishing Services and be submitted
                        to IEEE Xplore for inclusion.</span><br
                        style="font-size:12.8px">
                      <br style="font-size:12.8px">
                      <span style="font-size:12.8px">Submitted papers
                        must include original work, and must not be
                        under consideration for another conference or
                        journal. Submission of regular papers must not
                        exceed 8 pages and must follow the IEEE paper
                        format. Please include up to 7 keywords,
                        complete postal and e-mail address, and fax and
                        phone numbers of the corresponding author.
                        Authors of accepted papers are expected to
                        present their work at the conference. Submitted
                        papers that are deemed of good quality but that
                        could not be accepted as regular papers will be
                        accepted as short papers. Length of short papers</span><br
                        style="font-size:12.8px">
                      <br style="font-size:12.8px">
                      <span style="font-size:12.8px"><b>Journal Special
                          Issues:</b></span><br style="font-size:12.8px">
                      <span style="font-size:12.8px">Selected papers
                        from the will be invited to submit an extended
                        version to the following journal. Papers will be
                        selected based on their reviewers’ scores and
                        appropriateness to the Journal’s theme.</span></div>
                    <div><span style="font-size:12.8px"><br>
                      </span></div>
                    <div><span style="font-size:12.8px">
                        <div><font size="2">* Cluster Computing Journal
                            (IF: 2.04) - Springer<br>
                            * Concurrency and Computation: Practice and
                            Experience Journal (IF: 1.13) - Wiley</font><font
                            style="font-family:"times new
                            roman"" size="4">
                            <p><span
id="m_710159365582774000gmail-m_-7045669195837326435gmail-m_-6903077965003768750m_-5029099693768526863footer-copyright"></span></p>
                          </font>​<br style="font-size:12.8px">
                        </div>
                      </span><span style="font-size:12.8px">Please send
                        any inquiry on </span><span
                        class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                        style="font-size:12.8px">FMEC</span><span
                        style="font-size:12.8px"> </span><span
                        class="m_710159365582774000gmail-m_7157172971897381919gmail-il"
                        style="font-size:12.8px">2018</span><span
                        style="font-size:12.8px"> to the Emerging Tech.
                        Network Team at: </span><a
                        href="mailto:emergingtechnetwork@gmail.com"
                        style="font-size:12.8px" target="_blank"
                        moz-do-not-send="true">emergingtechnetwork@gmail.<wbr>com</a></div>
                  </div>
                </div>
              </div>
            </div>
            <br>
          </div>
        </div>
      </div>
    </div>
  </body>
</html>