The Role of Cloudlets in Hostile Environments
暂无分享,去创建一个
Mahadev Satyanarayanan | Soumya Simanta | Jeff Boleng | Grace Lewis | Kiryong Ha | Edwin Morris | M. Satyanarayanan | Kiryong Ha | E. Morris | S. Simanta | G. Lewis | Jeff Boleng
[1] Mahadev Satyanarayanan,et al. Just-in-time provisioning for cyber foraging , 2013, MobiSys '13.
[2] Mahadev Satyanarayanan,et al. Lowering the barriers to large-scale mobile crowdsensing , 2013, HotMobile '13.
[3] Jason Flinn,et al. Cyber Foraging: Bridging Mobile and Cloud Computing , 2012, Cyber Foraging: Bridging Mobile and Cloud Computing.
[4] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[5] Susan W. Brenner,et al. Cyberthreats: The Emerging Fault Lines of the Nation State , 2009 .
[6] Jon Eisenberg,et al. Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery , 2007 .
[7] Xiaoyan Hong,et al. A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[8] Matthew J. Zieniewicz,et al. The Evolution of Army Wearable Computers , 2002, IEEE Pervasive Comput..
[9] Mahadev Satyanarayanan,et al. Categories and Subject Descriptors: D.4.3 [Software]: File Systems Management—Distributed , 2022 .
[10] James J. Kistler,et al. Disconnected operation in the Coda file system , 1991, SOSP '91.
[11] Mahadev Satyanarayanan,et al. Andrew: a distributed personal computing environment , 1986, CACM.
[12] Mahadev Satyanarayanan,et al. The ITC distributed file system: principles and design , 1985, SOSP '85.
[13] B. H. Rosenberg. Biological and chemical warfare. , 1985, Science.
[14] HERBERT A. SIMON,et al. The Architecture of Complexity , 1991 .