Pervasive Computing on Fictional Farms

Columnist Charles Day uses popular British radio drama "The Archers" to discuss the use of computer technology in agriculture.

[1]  Zhou Yuezhi CSDT:Method for Data Transfer Between Client Devices of Transparent Computing Systems , 2008 .

[2]  Yaoxue Zhang,et al.  TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..

[3]  Yan Wang,et al.  A Dynamic Rebuild Strategy of Multi-host System Volume on Transparence Computing Mode , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[4]  Yaoxue Zhang,et al.  A remote resource management method for Transparent Computing , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[5]  Yang Hua-jie RBIS: Security Enhancement for MRBP and MRBP2 Using Integrity Check , 2007 .

[6]  Yuezhi Zhou Transparent computing: From concept to implementation , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.

[7]  David Borsook,et al.  The Challenges and Opportunities , 2010 .

[8]  Xiaohong Jiang,et al.  On Delivery Delay-Constrained Throughput and End-to-End Delay in MANETs , 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS).

[9]  Zhou Yuezhi A Multimedia I/O Access Control Policy for Transparent Computing , 2013 .

[10]  Min Wu,et al.  Shared Resource and Service Management for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[11]  Yaoxue Zhang,et al.  Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services , 2013 .

[12]  Wu Ming Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..

[13]  Xu Peng-zhi MRBP2: a Transparence Computing Based Remote Booting Protocol , 2006 .

[14]  Wang Yong,et al.  A Customizable Boot Protocol for Network Computing , 2003 .

[15]  Laurence T. Yang,et al.  Receiving Buffer Adaptation for High-Speed Data Transfer , 2013, IEEE Transactions on Computers.

[16]  Naixue Xiong,et al.  A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization , 2014, IEEE Transactions on Services Computing.

[17]  Gary Anthes,et al.  HTML5 leads a web revolution , 2012, Commun. ACM.

[18]  Laurence T. Yang,et al.  Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[19]  Yaoxue Zhang,et al.  Leveraging the Tail Time for Saving Energy in Cellular Networks , 2014, IEEE Transactions on Mobile Computing.

[20]  Wang Yang,et al.  NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[21]  Yaoxue Zhang,et al.  Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments , 2015, IEEE Transactions on Cloud Computing.

[22]  Yaoxue Zhang,et al.  4VP: A Novel Meta OS Approach for Streaming Programs in Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[23]  Gao Yuan NSAP—A network storage access protocol for transparent computing , 2009 .

[24]  Wang Yang,et al.  Wireless Multicast for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[25]  Laurence T. Yang,et al.  TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services , 2014, IEEE Transactions on Network and Service Management.

[26]  Xiaohong Jiang,et al.  A Delay Constrained Two-Hop Relay Algorithm for Transparent Computing in MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[27]  Chen Chengcai Design and implementation of a virtual machine-based transparent computing system , 2008 .

[28]  Wei Liang,et al.  A Cross Platform Computing Method and Its Application for Mobile Device in Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[29]  Yaoxue Zhang,et al.  Building a Virtual Machine-Based Network Storage System for Transparent Computing , 2012, 2012 International Conference on Computer Science and Service System.

[30]  Richard Branch,et al.  Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives , 2014 .

[31]  Zhou Yuezhi Block-based data consistency method for transparent computing , 2009 .