<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <span
style="font-size:10.0pt;font-family:"Arial",sans-serif;color:black">[Apologies
      if you got multiple copies of this invitation]</span><span
      style="font-size:13.5pt;font-family:"Times New
      Roman",serif;color:black">
    </span><span style="font-size:12.0pt;font-family:"Times New
      Roman",serif"></span>
    <div class="moz-forward-container">
      <div dir="ltr">
        <div class="gmail_quote">
          <div dir="ltr">
            <div id="m_5900707609203122905divtagdefaultwrapper"
              dir="ltr"
style="font-size:12pt;color:rgb(0,0,0);font-family:Calibri,Helvetica,sans-serif,"EmojiFont","Apple
              Color Emoji","Segoe UI
              Emoji",NotoColorEmoji,"Segoe UI
              Symbol","Android Emoji",EmojiSymbols">
              <div>
                <p class="MsoNormal"
                  style="text-align:center;line-height:normal"
                  align="center">
                  <span style="font-size:13.5pt;font-family:"Times
                    New Roman",serif;color:black">The Fourth
                    International Conference on Fog and Mobile Edge
                    Computing
                    <br>
                    (FMEC 2019)<b> </b><br>
                    Rome, Italy. June 10-13, 2019 </span><span
                    style="font-size:12.0pt;font-family:"Times New
                    Roman",serif"></span></p>
                <p class="MsoNormal"
                  style="text-align:center;line-height:normal"
                  align="center">
                  <a
                    href="http://emergingtechnet.org/FMEC2019/index.php"
                    id="m_5900707609203122905LPlnk178431"
                    class="m_5900707609203122905OWAAutoLink"
                    target="_blank" moz-do-not-send="true"><span
                      style="font-size:13.5pt;font-family:"Times
                      New Roman",serif;color:#0563c1">http://emergingtechnet.org/FMEC2019/index.php</span></a><span
                    style="font-size:12.0pt;font-family:"Times New
                    Roman",serif"></span></p>
                <p class="MsoNormal"
                  style="text-align:center;line-height:normal"
                  align="center">
                  <span style="font-size:13.5pt;font-family:"Times
                    New Roman",serif;color:red">(Technically
                    Co-Sponsored by IEEE Italy Section)
                  </span><span
                    style="font-size:12.0pt;font-family:"Times New
                    Roman",serif"></span></p>
                <p class="MsoNormal" style="line-height:normal"><u><span
                      style="font-size:14.0pt;font-family:"Times
                      New Roman",serif">FMEC CFP</span></u><span></span></p>
                <p class="MsoNormal"
                  style="text-align:justify;line-height:normal"><span
                    style="font-family:"Times New
                    Roman",serif">Cloud computing provides large
                    range of services and virtually unlimited available
                    resources for users. New applications, such as
                    virtual reality and smart building control, have
                    emerged due to the large number of resources and
                    services brought by cloud computing. However, the
                    delay-sensitive applications face the problem of
                    large latency, especially when several smart devices
                    and objects are getting involved in human’s life
                    such as the case of smart cities or Internet of
                    Things. Therefore, cloud computing is unable to meet
                    the requirements of low latency, location awareness,
                    and mobility support. To solve this problem,
                    researchers have introduced a trusted and dependable
                    solution through the Fog and the Mobile Edge
                    Computing (FMEC) to put the services and resources
                    of the cloud closer to users, which facilitates the
                    leveraging of available services and resources in
                    the edge networks. By this, we are moving from the
                    core (cloud data centers) to the edge of the network
                    closer to the users. FMEC dependability is based on
                    providing user centric service. The purpose of Fog
                    and the Mobile Edge Computing is to run the heavy
                    real-time applications at the network edge directly
                    using the billions of connected mobile devices.
                    Several features enable the Fog and the Mobile Edge
                    Computing to be a perfect paradigm to the
                    aforementioned purpose, which are the dense
                    geographical deployment of servers, supporting
                    mobility and the closeness to users. As in every new
                    technology, some challenges face the vision of the
                    Fog and the Mobile Edge Computing, which are the
                    administrative policies and security concerns (i.e.
                    secure data storage, secure computation, network
                    security, data privacy, usage privacy, location
                    privacy, etc). </span><span></span></p>
                <p class="MsoNormal"
                  style="text-align:justify;line-height:normal"><span
                    style="font-family:"Times New
                    Roman",serif">FMEC 2019 conference aims to
                    investigate the opportunities and requirements for
                    Mobile Edge Computing dominance. In addition, it
                    seeks for novel contributions that help mitigating
                    Mobile Edge Computing challenges. That is, the
                    objective of FMEC 2019 is to provide a forum for
                    scientists, engineers, and researchers to discuss
                    and exchange new ideas, novel results and experience
                    on all aspects of Fog and Mobile Edge Computing
                    (FMEC). Researchers are encouraged to submit
                    original research contributions in all major areas,
                    which include, but not limited to:</span><span></span></p>
                <p class="MsoNormal" style="line-height:normal"><span
                    style="font-size:12.0pt;font-family:"Times New
                    Roman",serif">*
                  </span><span style="font-family:"Times New
                    Roman",serif">Mobile Cloud Computing Systems.<br>
                    * FMEC Security and Privacy Issues.<br>
                    * FMEC Pricing and billing models.<br>
                    * FMEC support for VANETS and MANETS<br>
                    * Cloudlet based computing<br>
                    * Dew based computing<br>
                    * Lightweight authentication mechanisms in FMEC
                    architecture.<br>
                    * Access Control models in FMEC.<br>
                    * Identification of incentives for FMEC service
                    providers.<br>
                    * The future perspective for FMEC: Challenges and
                    Open Issues.<br>
                    * FMEC Quality of Service (QoS) improvements
                    techniques.<br>
                    * FMEC architecture features and evolution.<br>
                    * FMEC Real-time communication interfaces and
                    protocols.<br>
                    * FMEC Resource scheduling that enhances the
                    reliability and scalability.<br>
                    * FMEC Resources monitoring mechanism and
                    utilization measuring mechanism.<br>
                    * FMEC resources allocation and management.<br>
                    * Real-time load prediction model to optimize the
                    user satisfaction.<br>
                    * FMEC virtualization.<br>
                    * Data storage, processing, and management at FMEC
                    platform.<br>
                    * Cyber hacking, next generation fire wall of FMEC.<br>
                    * Deployment strategies of FMEC Servers<br>
                    * Admission control for FMEC.<br>
                    * Social engineering, insider threats, advance spear
                    phishing.<br>
                    * Incident Handling and Penetration Testing.<br>
                    * Forensics of Virtual and FMEC Environments.<br>
                    * Security protocols in FMEC.<br>
                    * Security and privacy of mobile cloud computing<br>
                    * Security, privacy and reliability issues of MCC
                    and IoT<br>
                    * Security and privacy of IoT<br>
                    * Security and privacy management in MCC<br>
                    * MCC intrusion detection systems<br>
                    * Security of pricing and billing for mobile cloud
                    computing services<br>
                    * Security of mobile, peer-to-peer and pervasive
                    services in clouds<br>
                    * Security of mobile commerce and mobile Internet of
                    Things<br>
                    * Security of mobile social networks<br>
                    * Security and privacy in smartphone devices<br>
                    * Security and privacy in social applications and
                    networks<br>
                    * Security of Mobile, peer-to-peer and pervasive
                    services in clouds<br>
                    * Security of Mobile commerce and mobile internet of
                    things<br>
                    * Security of Operating system and middleware
                    support for mobile computing<br>
                    * Security and privacy in sensor networks<br>
                    * Security and privacy in social applications and
                    networks<br>
                    * Web service security<br>
                    * Security of 3G/4G systems, Wi-MAX, Ad-hoc<br>
                    * Security of Mobile social networks<br>
                    * Near field communication services<br>
                    * Service-oriented architectures, service
                    portability, P2P<br>
                    * Network virtualization and cloud-based radio
                    access networks</span><span></span></p>
                <span style="font-family:"Palatino
                  Linotype",serif"></span>
                <p class="MsoNormal"
style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;background:white"><u><span
                      style="font-family:"Times New
                      Roman",serif"><span
                        style="text-decoration:none"><br>
                      </span></span></u></p>
                <p class="MsoNormal"
style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;background:white"><b><u><span
                        style="font-family:"Times New
                        Roman",serif">Submission</span></u></b></p>
                <p class="MsoNormal"
                  style="line-height:normal;background:white"><span
                    style="font-family:"Times New
                    Roman",serif">Papers selected for presentation
                    will appear in the FMEC Proceedings, which will be
                    submitted to IEEE Xplore for inclusion. Papers must
                    be 8 pages in IEEE format, 10pt font using the IEEE
                    8.5" x 11" two-column format, single space, A4
                    format. All papers should be in PDF format, and
                    submitted electronically at Paper Submission Link. A
                    full paper must not exceed the stated length
                    (including all figures, tables and references). </span><span></span></p>
                <p class="MsoNormal"
                  style="line-height:normal;background:white"><span
                    style="font-family:"Times New
                    Roman",serif">Submitted papers must present
                    original unpublished research that is not currently
                    under review for any other conference or journal.
                    Papers not following these guidelines may be
                    rejected without review. Also submissions received
                    after the due date, exceeding length limit, or not
                    appropriately structured may also not be considered.
                    Authors may contact the Program Chair for further
                    information or clarification.
                  </span><span></span></p>
                <p class="MsoNormal"
style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;background:white"><b><u><span
                        style="font-family:"Times New
                        Roman",serif">Keynote Speakers:</span></u></b><b><span></span></b></p>
                <ul>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">Omer Rana, Cardiff
                      University, UK</span></li>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">Gennaro Boggia, Politecnico
                      di Bari, Italy</span></li>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">Vincenzo Piuri, University
                      of Milan, Italy</span></li>
                </ul>
                <p class="MsoNormal"
style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;background:white"><b><u><span
                        style="font-size:12.0pt;font-family:"Times
                        New Roman",serif">Journals Special Issues:</span></u></b><span
                    style="font-size:12.0pt;font-family:"Times New
                    Roman",serif"></span></p>
                <ul>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">Cluster Computing Journal
                      (IF: 1.6)
                    </span></li>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">Transactions on Emerging
                      Telecommunications Technologies (IF: 1.6)</span></li>
                  <li><span style="font-family:"Palatino
                      Linotype",serif">The concurrency and
                      computation: practice and experience (IF: 1.1)</span></li>
                </ul>
                <p class="MsoNormal"
style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;background:white"><b><u><span
                        style="font-family:"Times New
                        Roman",serif">Important Dates:</span></u></b></p>
                <p class="MsoNormal"
                  style="line-height:normal;background:white"><b><span
                      style="font-family:"Times New
                      Roman",serif;color:red">Submission Date: 15
                      February 2019 (Extended)</span></b><span
                    style="font-family:"Times New
                    Roman",serif"><br>
                    Notification to Authors: 1 April 2019<br>
                    Camera Ready Submission: 20 April 2019 </span><span></span></p>
                <p class="MsoNormal" style="line-height:106%"><span>Please
                    send any inquiry on FMEC 2019 to the Emerging Tech.
                    Network Team at:
                  </span><a href="mailto:emergingtechnetwork@gmail.com"
                    id="m_5900707609203122905LPlnk392355"
                    class="m_5900707609203122905OWAAutoLink"
                    target="_blank" moz-do-not-send="true"><span
                      style="color:blue">emergingtechnetwork@gmail.com</span></a><span></span></p>
                <p class="MsoNormal"> <br>
                </p>
              </div>
            </div>
          </div>
        </div>
      </div>
    </div>
  </body>
</html>