A Survey of Fog Computing: Concepts, Applications and Issues
暂无分享,去创建一个
[1] Verena Kantere,et al. Optimal Service Pricing for a Cloud Cache , 2011, IEEE Transactions on Knowledge and Data Engineering.
[2] David Lillethun,et al. Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.
[3] George Danezis,et al. Privacy-preserving smart metering , 2011, WPES '11.
[4] Jie Wu,et al. Designing a Practical Access Point Association Protocol , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Maolin Tang,et al. A Taxonomy of Computation Offloading in Mobile Cloud Computing , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[6] Mario Gerla,et al. Software-Defined Mobile Cloud: Architecture, services and use cases , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[7] Tao Li,et al. A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[8] Bo Sheng,et al. Data storage placement in sensor networks , 2006, MobiHoc '06.
[9] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[10] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[11] Qun Li,et al. Snoogle: A Search Engine for Pervasive Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[12] Pan Hui,et al. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.
[13] H. Madsen,et al. Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).
[14] Marthony Taguinod,et al. Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).
[15] Mahadev Satyanarayanan,et al. Towards wearable cognitive assistance , 2014, MobiSys.
[16] Wolfgang Kellerer,et al. Applying NFV and SDN to LTE mobile core gateways, the functions placement problem , 2014, AllThingsCellular '14.
[17] Zhengping Qian,et al. TimeStream: reliable stream computation in the cloud , 2013, EuroSys '13.
[18] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[19] Bo Sheng,et al. A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.
[20] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[21] Kurt Rothermel,et al. RECEP: selection-based reuse for distributed complex event processing , 2014, DEBS '14.
[22] Rob Sherwood,et al. The controller placement problem , 2012, HotSDN@SIGCOMM.
[23] Hao Hu,et al. Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[24] XuHong,et al. Dynamic Cloud Pricing for Revenue Maximization , 2013 .
[25] Ivan Stojmenovic,et al. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[26] Xu Chen,et al. COMET: Code Offload by Migrating Execution Transparently , 2012, OSDI.
[27] Alec Wolman,et al. cTPM: A Cloud TPM for Cross-Device Trusted Applications , 2014, NSDI.
[28] Qun Li,et al. CacheKeeper: a system-wide web caching service for smartphones , 2013, UbiComp.
[29] Baochun Li,et al. Dynamic Cloud Pricing for Revenue Maximization , 2013, IEEE Transactions on Cloud Computing.
[30] Takayuki Nishio,et al. Adaptive resource discovery in mobile cloud computing , 2014, Comput. Commun..
[31] Qun Li,et al. Snoogle: A Search Engine for the Physical World , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[32] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[33] Alec Wolman,et al. Volley: Automated Data Placement for Geo-Distributed Cloud Services , 2010, NSDI.
[34] Kurt Rothermel,et al. MigCEP: operator migration for mobility driven distributed complex event processing , 2013, DEBS.
[35] Bo Sheng,et al. A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.
[36] Suman Banerjee,et al. ParaDrop: a multi-tenant platform for dynamically installed third party services on home gateways , 2014, DCC '14.
[37] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[38] B. Liang,et al. Mobile Edge Computing , 2020, Encyclopedia of Wireless Networks.
[39] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[40] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[41] K. K. Ramakrishnan,et al. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms , 2014, IEEE Transactions on Network and Service Management.
[42] Boris Koldehofe,et al. Opportunistic spatio-temporal event processing for mobile situation awareness , 2013, DEBS.
[43] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[44] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[45] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[46] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[47] Qun Li,et al. Preserving secondary users' privacy in cognitive radio networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[48] Qun Li,et al. SMOC: A secure mobile cloud computing platform , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[49] Roberto Bifulco,et al. ClickOS and the Art of Network Function Virtualization , 2014, NSDI.
[50] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[51] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[52] Claudio Soriente,et al. Smartphones as Practical and Secure Location Verification Tokens for Payments , 2014, NDSS.
[53] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[54] Xiaofei Wang,et al. Cache in the air: exploiting content caching and delivery techniques for 5G systems , 2014, IEEE Communications Magazine.
[55] Takayuki Nishio,et al. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud , 2013, MobileCloud '13.
[56] Qun Li,et al. Near-pri: Private, proximity based location sharing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.