A survey of mobile cloud computing: architecture, applications, and approaches
Download 1.54 Mb. Pdf ko'rish
|
dinh2011
Part A: Systems and Humans 2007; 37(2): 189.
1608 Wirel. Commun. Mob. Comput. 2013; 13:1587–1611 © 2011 John Wiley & Sons, Ltd. DOI: 10.1002/wcm H. T. Dinh et al. A survey of mobile cloud computing 76. Hunt GC, Scott ML. The Coign automatic distributed partitioning system, In Proceedings of the 3rd sym- posium on Operating systems design and implemen- tation (OSDI), 1999; 187–200. 77. Stoer M, Wagner F. A simple min-cut algorithm. Journal of the ACM (JACM) 1997; 4: 44. 78. Xian C, Lu YH, Li Z. Adaptive computation offload- ing for energy conservation on battery-powered systems, In International Conference on Parallel and Distributed Systems, 2009; 1. 79. Ou S, Yang K, Liotta A, Hu L. Performance analysis of offloading systems in mobile wireless environments, In Proceedings of the IEEE Interna- tional Conference on Communications (ICC), 2007; 1821. 80. Tang MH, Cao J. A dynamic mechanism for han- dling mobile computing environmental changes, In Proceedings of the 1st international conference on Scalable information systems (InfoScale), 2006; 1–9. 81. Chun B-G, Maniatis P. Dynamically partitioning applications between weak devices and clouds, In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS), 2010. 82. Oberheide J, Cooke E, Jahanian F. Rethinking antivirus: executable analysis in the network cloud, In Proceedings of the 2nd USENIX workshop on Hot topics in security (HOTSEC), 2007. 83. Oberheide J, Cooke E, Jahanian F. Cloudav: N- version antivirus in the network cloud, In Processing of the 17th USENIX Security Symposium, 2008. 84. Ogness J. Dazuko: an open solution to facilitate on- access scanning, In Proceedings of the 13th Virus Bulletin International Conference, 2003. 85. Portokalidis G, Homburg P, Anagnostakis K, Bos H. Paranoid Android: versatile protection for smart- phones, In Proceedings of the 26th Annual Computer Security Application Conference (ACSAC), 2010; 347–356. 86. Zhangwei H, Mingjun X. A distributed spatial cloak- ing protocol for location privacy, In Proceedings of the 2nd International Conference on Networks Secu- rity Wireless Communications and Trusted Comput- ing (NSWCTC), 2010; 468. 87. Sweeney L. K-anonymity: a model for protecting privacy. International Journal of Uncertainty Fuzzi- ness and Knowledge-Based Systems 2002; 10(5): 557–570. 88. Wang S, Wang XS. In-device spatial cloaking for mobile user privacy assisted by the cloud, In Proceed- ings of the 11th International Conference on Mobile Data Management (MDM), 2010; 381. 89. Chow C-Y, Mokbel MF, Aref WG. Casper*: query processing for location services without compromis- ing privacy. ACM Transactions on Database Systems (TODS) 2009; 34(4): 1–48. 90. Tanenbaum A, Van Steen M. Distributed Systems: Principles and Paradigms. Pearson Prentice Hall, 2007. 91. Wang W, Li Z, Owens R, Bhargava B. Secure and efficient access to outsourced data, In ACM Cloud Computing Security Workshop (CCSW), 2009; 55–66. 92. Itani W, Kayssi A, Chehab A. Energy-efficient incre- mental integrity for securing storage in mobile cloud computing, In International Conference on Energy Aware Computing (ICEAC), January 2011; 1. 93. Chow R, Jakobsson M, Masuoka R, et al. Authenti- cation in the clouds: a framework and its application to mobile users, In Proceedings of the 2010 ACM workshop on Cloud computing security workshop (CCSW), 2010; 1–6. 94. Song Z, Molina J, Lee S, Kotani S, Masuoka R. TrustCube: an infrastructure that builds trust in client, In Proceedings of the 1st International Conference on Future of Trust in Computing, 2009. 95. Jakobsson M, Shi E, Golle P, Chow R. Implicit authentication for mobile devices, In Processing of the 4th USENIX Workshop on Hot Topics in Security (HotSec), 2009. 96. Shi E, Niu Y, Jakobsson M, Chow R. Implicit authentication through learning user behavior, In Proceedings of the Implicit authentication Security Conference (ISC), 2010. 97. Nam YJ, Park YK, Lee JT, Ishengoma F. Cost-aware virtual USB drive: providing cost-effective block i/o management commercial cloud storage for mobile devices, In Proceedings of the 13th IEEE Interna- tional Conference on Computational Science and Engineering (CSE), 2011; 427. 98. Rosenblum M, Ousterhout JK. The design and imple- mentation of a log-structured file system. ACM Trans- actions on Computer Systems (TOCS) 1992; 10(1): 26–52. 99. Shen J, Yan S, Hua X-S. The e-recall environment for cloud based mobile rich media data management, In Proceedings of the 2010 ACM multimedia workshop on Mobile cloud media computing, 2010; 31–34. 100. Kennedy L, Chang SF, Natsev A. Query-adaptive fusion for multimodal search. Proceedings of the IEEE Magazine 2008; 96(4): 567–588. 101. Koukoumidis E, Lymberopoulos D, Strauss K, Liu J, Burger D. Pocket cloudlets, In Proceedings of the 16th international conference on Architectural sup- port for programming languages and operating sys- tems (ASPLOS), 2011; 171–184. Wirel. Commun. Mob. Comput. 2013; 13:1587–1611 © 2011 John Wiley & Sons, Ltd. 1609 DOI: 10.1002/wcm A survey of mobile cloud computing H. T. Dinh et al. 102. Dong Y, Peng J, Wang D, et al. RFS: a network file system for mobile devices and the cloud. ACM SIGOPS Operating Systems Review 2011; 45(1): 101–111. 103. Eaton RP. Improving Access to Remote Storage for Weakly Connected Users. University of California at Berkeley: Berkeley, 2007. 104. Samimi FA, Mckinley PK, Sadjadi SM. Mobile ser- vice clouds: a self-managing infrastructure for auto- nomic mobile computing services, In Proceedings of the 2nd International Workshop on Self-Managed Networks,Systems & Services (SelfMan),vol. 3996, 2006; 130–141. 105. McKinley PK, Samimi FA, Shapiro JK, Tang C. Ser- vice Clouds: A Distributed Infrastructure For Con- structing Autonomic Communication Services, In Proceedings of the 2nd IEEE International Sympo- sium on Dependable,Autonomic and Secure Comput- ing, 2006; 341. 106. Samimi FA, McKinley PK, Sadjadi SM, Ge P. Kernel-middleware interaction to support adaptation in pervasive computing environments, In Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing (MPAC), 2004; 140–145. 107. La HH, Kim SD. A Conceptual framework for provi- sioning context-aware mobile cloud services, In Pro- ceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD), 2010; 466. 108. Papakos P, Capra L, Rosenblum DS. VOLARE: context-aware adaptive cloud service discovery for mobile systems, In Proceedings of the 9th Interna- tional Workshop on Adaptive and Reflective Middle- ware (ARM), 2010; 32–38. 109. Rahman M, Mir FAM. Fourth Generation (4G) mobile networks - features,technologies & issues, In Proceedings of the 6th IEEE International Confer- ence on 3G and Beyond, 2007; 1. 110. Varshney U, Jain R. Issues in emerging 4G wireless networks. Computer 2002; 34(6): 94–96. 111. Boccuzzi J, Ruggiero M. Femtocells: Design & Application. McGraw-Hill, 2011. 112. http://www.haysystems.com/. 113. Yucek T, Arslan H. A survey of spectrum sens- ing algorithms for cognitive radio applications, In IEEE Communications Surveys & Tutorials, 2009; 116–130. 114. Ge F, Lin H, Khajeh A. Cognitive radio rides on the cloud, In Military Communications Conference (MILCOM), 2011; 1448. 115. Chun BG, Ihm S, Maniatis P, Naik M, Patti A. CloneCloud: elastic execution between mobile device and cloud, In Proceedings of the 6th conference on Computer systems (EuroSys), 2011; 301–314. 116. Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing 2009; 8(4): 14–23. 117. Keahey K, Tsugawa M, Matsunaga A, Fortes J. Sky Computing. IEEE Internet Computing Magazine 2009; 13(5): 43. Download 1.54 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling