A Reference Architecture for Mobile Code Offload in Hostile Environments
暂无分享,去创建一个
Mahadev Satyanarayanan | Soumya Simanta | Grace A. Lewis | Edwin J. Morris | Kiryong Ha | M. Satyanarayanan | Kiryong Ha | E. Morris | S. Simanta | G. Lewis
[1] Hao Zhang,et al. Deploying Mobile Computation in Cloud Service , 2009, CloudCom.
[2] Eugene Marinelli,et al. Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .
[3] Andy Hopper,et al. Virtual Network Computing , 1998, IEEE Internet Comput..
[4] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[5] Mahmut T. Kandemir,et al. Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices , 2004, IEEE Transactions on Parallel and Distributed Systems.
[6] Mahadev Satyanarayanan,et al. Fundamental challenges in mobile computing , 1996, PODC '96.
[7] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[8] Myong-Soon Park,et al. A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing , 2007, NBiS.
[9] Willy Zwaenepoel,et al. Puppeteer: component-based adaptation for mobile computing (Poster Session) , 2000, OPSR.
[10] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[11] Mahadev Satyanarayanan,et al. Balancing performance, energy, and quality in pervasive computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[12] Mads Darø Kristensen,et al. Execution plans for cyber foraging , 2008, MobMid '08.
[13] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[14] Mahadev Satyanarayanan,et al. The case for cyber foraging , 2002, EW 10.
[15] Jason Maassen,et al. eyeDentify: Multimedia Cyber Foraging from a Smartphone , 2009, 2009 11th IEEE International Symposium on Multimedia.
[16] Mahadev Satyanarayanan,et al. Self-tuned remote execution for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[17] Lee W. McKnight,et al. Wireless Internet access: 3G vs. WiFi? , 2003 .
[18] Paul Watson,et al. Secure & Rapid Composition of Infrastructure Services in the Cloud , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[19] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[20] James D. Herbsleb,et al. Simplifying cyber foraging for mobile devices , 2007, MobiSys '07.
[21] Eyal de Lara,et al. Puppeteer: component-based adaptation for mobile computing , 2000, OPSR.
[22] Adam Wolbach. Improving the Deployability of Diamond , 2008 .
[23] Henri E. Bal,et al. Ibis for mobility: solving challenges of mobile computing using grid techniques , 2009, HotMobile '09.
[24] John Carter,et al. A lightweight secure cyber foraging infrastructure for resource-constrained devices , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.
[25] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[26] Jason H. Christensen,et al. Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.