ECOS: Leveraging Software-Defined Networks to support mobile application offloading
暂无分享,去创建一个
[1] Byung-Gon Chun,et al. Dynamically partitioning applications between weak devices and clouds , 2010, MCS '10.
[2] Mahadev Satyanarayanan,et al. Tactics-based remote execution for mobile computing , 2003, MobiSys '03.
[3] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[4] Bernardo A. Huberman,et al. E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations , 2005, Inf. Soc..
[5] Liviu Iftode,et al. Leveraging smart phones to reduce mobility footprints , 2009, MobiSys '09.
[6] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[7] References , 1971 .
[8] Lawrence O Gostin,et al. Health information privacy. , 1995, Cornell law review.
[9] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[10] Bernardo A. Huberman,et al. Email as spectroscopy: automated discovery of community structure within organizations , 2003 .
[11] Anna Wu,et al. Detecting professional versus personal closeness using an enterprise social network site , 2010, CHI.
[12] Diana K. Smetters,et al. User experiences with sharing and access control , 2006, CHI EA '06.
[13] Martín Casado,et al. Ethane: taking control of the enterprise , 2007, SIGCOMM '07.
[14] Mahadev Satyanarayanan,et al. Balancing performance, energy, and quality in pervasive computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[15] Alan Messer,et al. Towards a distributed platform for resource-constrained devices , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[16] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[17] Nick Feamster,et al. Securing Enterprise Networks Using Traffic Tainting , 2009 .
[18] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[19] Arun Venkataramani,et al. Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.
[20] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[21] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[22] Hong Yan,et al. A clean slate 4D approach to network control and management , 2005, CCRV.
[23] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[24] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[25] Hong Yan,et al. Tesseract: A 4D Network Control Plane , 2007, NSDI.