Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy
暂无分享,去创建一个
[1] Siddhartha S. Srinivasa,et al. Object recognition and full pose registration from a single image for robotic manipulation , 2009, 2009 IEEE International Conference on Robotics and Automation.
[2] Eric Horvitz,et al. Predestination: Where Do You Want to Go Today? , 2007, Computer.
[3] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[4] Ariel J. Feldman,et al. SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.
[5] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[6] Patrick Th. Eugster,et al. Practical Confidentiality Preserving Big Data Analysis , 2014, HotCloud.
[7] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[8] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[9] Pi-Cheng Hsiu,et al. A Cloud-Based Offloading Service for Computation-Intensive Mobile Applications , 2015, 2015 IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications.
[10] Chandramohan A. Thekkath,et al. StarTrack: a framework for enabling track-based applications , 2009, MobiSys '09.
[11] Tim Verbelen,et al. Cloudlets: bringing the cloud to the mobile user , 2012, MCS '12.
[12] Victor C. M. Leung,et al. Enabling technologies for future data center networking: a primer , 2013, IEEE Network.
[13] S. Salhi,et al. A survey of effective heuristics and their application to a variety of knapsack problems , 2007 .
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[16] Anwitaman Datta,et al. Towards secure outsourcing of collaborative sensing and analytic applications to the cloud - the pCloud approach , 2013, MCS '13.
[17] Kun Yang,et al. On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications , 2008, IEEE Communications Magazine.
[18] Ravi Kumar,et al. Pig latin: a not-so-foreign language for data processing , 2008, SIGMOD Conference.
[19] Ramón Cáceres,et al. Towards synchronization of live virtual machines among mobile devices , 2013, HotMobile '13.
[20] Roksana Boreli,et al. Information leakage through mobile analytics services , 2014, HotMobile.
[21] Pan Hui,et al. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.
[22] Ramesh Govindan,et al. Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.
[23] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[24] Gary R. Bradski,et al. Learning OpenCV 3: Computer Vision in C++ with the OpenCV Library , 2016 .
[25] Michael J. Carey,et al. The PigMix Benchmark on Pig, MapReduce, and HPCC Systems , 2015, 2015 IEEE International Congress on Big Data.
[26] Paramvir Bahl,et al. Advancing the state of mobile cloud computing , 2012, MCS '12.
[27] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[28] Rahul Sukthankar,et al. SLIPstream: scalable low-latency interactive perception on streaming data , 2009, NOSSDAV '09.
[29] Weiqing Zhao,et al. Improving computer basis teaching through mobile communication and cloud computing technology , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[30] Hari Balakrishnan,et al. Code in the air: simplifying sensing and coordination tasks on smartphones , 2012, HotMobile '12.
[31] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[32] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[33] Deborah Estrin,et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.
[34] Li Xu,et al. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design , 2015, Ad Hoc Networks.
[35] Aleksandar Kuzmanovic,et al. Measuring serendipity: connecting people, locations and interests in a mobile 3G network , 2009, IMC '09.
[36] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[37] Patrick Stuedi,et al. WhereStore: location-based data storage for mobile devices interacting with the cloud , 2010, MCS '10.
[38] Martin Schulz,et al. Exploiting Redundancy and Application Scalability for Cost-Effective, Time-Constrained Execution of HPC Applications on Amazon EC2 , 2016, IEEE Transactions on Parallel and Distributed Systems.
[39] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[40] Pan Hui,et al. Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud , 2013, HotCloud.
[41] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[42] Adel M. Alimi,et al. Towards an Offloading Framework based on Big Data Analytics in Mobile Cloud Computing Environments , 2015, INNS Conference on Big Data.
[43] Catherine C. Marshall,et al. Cimbiosys: a platform for content-based partial replication , 2009, NSDI 2009.