Optimizing, Testing, and Securing Mobile Cloud Computing Systems For Data Aggregation and Processing

[1]  Khaled El Emam,et al.  Protecting privacy using k-anonymity. , 2008, Journal of the American Medical Informatics Association : JAMIA.

[2]  Douglas C. Schmidt,et al.  Optimizing Mobile Application Performance with Model-Driven Engineering , 2009, SEUS.

[3]  Wayne H. Wolf,et al.  TGFF: task graphs for free , 1998, Proceedings of the Sixth International Workshop on Hardware/Software Codesign. (CODES/CASHE'98).

[4]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[5]  Koen Langendoen,et al.  Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[6]  H. R. Boveiri ACO-MTS: A new approach for multiprocessor task scheduling based on ant colony optimization , 2010, 2010 International Conference on Intelligent and Advanced Systems.

[7]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Nirwan Ansari,et al.  A Genetic Algorithm for Multiprocessor Scheduling , 1994, IEEE Trans. Parallel Distributed Syst..

[9]  Minho Shin,et al.  Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.

[10]  Sushil Jajodia,et al.  Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.

[11]  Hironori Kasahara,et al.  A standard task graph set for fair evaluation of multiprocessor scheduling algorithms , 2002 .

[12]  Albert Mo Kim Cheng,et al.  Assigning real-time tasks to heterogeneous processors by applying ant colony optimization , 2011, J. Parallel Distributed Comput..

[13]  Ramakrishnan Rajamony,et al.  An updated performance comparison of virtual machines and Linux containers , 2015, 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).

[14]  Mike Hibler,et al.  Automatic Online Validation of Network Configuration in the Emulab Network Testbed , 2006, 2006 IEEE International Conference on Autonomic Computing.

[15]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Sushil Jajodia,et al.  ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[17]  Ladislau Bölöni,et al.  A Comparison of Eleven Static Heuristics for Mapping a Class of Independent Tasks onto Heterogeneous Distributed Computing Systems , 2001, J. Parallel Distributed Comput..

[18]  Y.-K. Kwok,et al.  Static scheduling algorithms for allocating directed task graphs to multiprocessors , 1999, CSUR.

[19]  Yaron Caspi,et al.  Under the supervision of , 2003 .

[20]  Gregory D. Abowd,et al.  Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.

[21]  Jason Liu,et al.  PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI , 2011, 2011 IEEE Workshop on Principles of Advanced and Distributed Simulation.

[22]  Koen Langendoen,et al.  Pogo, a Middleware for Mobile Phone Sensing , 2012, Middleware.

[23]  Mohamed Mokbel,et al.  Challenges in Preserving Location Privacy in Peer-to-Peer Environments , 2006, 2006 Seventh International Conference on Web-Age Information Management Workshops.

[24]  Marco Dorigo,et al.  Distributed Optimization by Ant Colonies , 1992 .

[25]  James A. Landay,et al.  UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits , 2009, CHI.

[26]  Matt Welsh,et al.  MoteLab: a wireless sensor network testbed , 2005, IPSN '05.

[27]  Ramachandran Ramjee,et al.  PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.

[28]  Albert Mo Kim Cheng,et al.  Applying Ant Colony Optimization to the partitioned scheduling problem for heterogeneous multiprocessors , 2005, SIGBED Rev..

[29]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[30]  Hironori Kasahara,et al.  Practical Multiprocessor Scheduling Algorithms for Efficient Parallel Processing , 1984, IEEE Transactions on Computers.

[31]  Z Liu,et al.  Scheduling Theory and its Applications , 1997 .

[32]  David E. Culler,et al.  PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.

[33]  Jan Karel Lenstra,et al.  Complexity of Scheduling under Precedence Constraints , 1978, Oper. Res..

[34]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[35]  C. D. Gelatt,et al.  Optimization by Simulated Annealing , 1983, Science.

[36]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[37]  Valérie Gay,et al.  Personal Heart Monitoring and Rehabilitation System using Smart Phones , 2006, 2006 International Conference on Mobile Business.

[38]  Demetrios Zeinalipour-Yazti,et al.  Demo: a programming cloud of smartphones , 2012, MobiSys '12.

[39]  Jean-Marc Vincent,et al.  Random graph generation for scheduling simulations , 2010, SimuTools.

[40]  Paul Turner,et al.  CPU bandwidth control for CFS , 2010 .

[41]  Aruna Balasubramanian,et al.  DOME: a diverse outdoor mobile testbed , 2009, HotPlanet '09.

[42]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[43]  Yueh-Min Huang,et al.  Multiprocessor system scheduling with precedence and resource constraints using an enhanced ant colony system , 2008, Expert Syst. Appl..

[44]  A. P. Shanthi,et al.  Tasks Scheduling using Ant Colony Optimization , 2012 .

[45]  Jiejun Kong,et al.  Formal Notions of Anonymity for Peer-to-peer Networks , 2005, IACR Cryptol. ePrint Arch..

[46]  Marco Gruteser,et al.  USENIX Association , 1992 .

[47]  Marc E. Posner,et al.  Generating Experimental Data for Computational Testing with Machine Scheduling Applications , 2001, Oper. Res..

[48]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.

[49]  Jorge-Arnulfo Quiané-Ruiz,et al.  Runtime measurements in the cloud , 2010, Proc. VLDB Endow..

[50]  Luca Maria Gambardella,et al.  Ant colony system: a cooperative learning approach to the traveling salesman problem , 1997, IEEE Trans. Evol. Comput..