Workload management for dynamic mobile device clusters in edge femtoclouds
暂无分享,去创建一个
Khaled A. Harras | Karim Habak | Ellen W. Zegura | Mostafa H. Ammar | M. Ammar | E. Zegura | Karim Habak
[1] Ishfaq Ahmad,et al. Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors , 1996, IEEE Trans. Parallel Distributed Syst..
[2] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[3] Khaled A. Harras,et al. Towards Computational Offloading in Mobile Device Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[4] Ivan Stojmenovic,et al. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[5] Khaled A. Harras,et al. Femto Clouds: Leveraging Mobile Devices to Provide Cloud Service at the Edge , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[6] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[7] Rajkumar Buyya,et al. A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments , 2017, Concurr. Comput. Pract. Exp..
[8] Khaled A. Harras,et al. Elastic Mobile Device Clouds , 2017 .
[9] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[10] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[11] Carlo Curino,et al. Apache Hadoop YARN: yet another resource negotiator , 2013, SoCC.
[12] Khaled A. Harras,et al. Cumulus: A distributed and flexible computing testbed for edge cloud computational offloading , 2016, 2016 Cloudification of the Internet of Things (CIoT).
[13] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[14] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[15] Karim Habak,et al. COSMOS: computation offloading as a service for mobile devices , 2014, MobiHoc '14.
[16] Rajeev Gandhi,et al. The Case for Mobile Edge-Clouds , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[17] Xu Chen,et al. COMET: Code Offload by Migrating Execution Transparently , 2012, OSDI.
[18] John A. Sharp,et al. Data flow computing: theory and practice , 1992 .
[19] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[20] Khaled A. Harras,et al. Vision: The Case for Symbiosis in the Internet of Things , 2015, MCS '15.
[21] Vitaly Shmatikov,et al. Rethinking Security of Web-Based System Applications , 2015, WWW.
[22] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[23] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[24] D Chitra Devi,et al. Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks , 2016, TheScientificWorldJournal.
[25] Salim Hariri,et al. Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..
[26] Aakanksha Chowdhery,et al. The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.
[27] Takayuki Nishio,et al. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud , 2013, MobileCloud '13.
[28] Ellen W. Zegura,et al. Serendipity: enabling remote computing among intermittently connected mobile devices , 2012, MobiHoc '12.
[29] Qingbo Wu,et al. Workflow scheduling in cloud: a survey , 2015, The Journal of Supercomputing.
[30] Mahadev Satyanarayanan,et al. The case for cyber foraging , 2002, EW 10.
[31] Mahadev Satyanarayanan,et al. Just-in-time provisioning for cyber foraging , 2013, MobiSys '13.
[32] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[33] Elaine Shi,et al. TRUESET: Faster Verifiable Set Computations , 2014, USENIX Security Symposium.
[34] Min Chen,et al. On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.
[35] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[36] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.