-
1
-
-
84872244063
-
Energy efficiency of mobile clients in cloud computing
-
Berkeley, CA, USA: USENIX Association [Online]. Available
-
A. P. Miettinen and J. K. Nurminen, "Energy efficiency of mobile clients in cloud computing," in Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, ser. HotCloud'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 4-4. [Online]. Available: http://portal.acm.org/citation. cfm?id=1863103.1863107
-
(2010)
Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, ser. HotCloud'10
, pp. 4-4
-
-
Miettinen, A.P.1
Nurminen, J.K.2
-
2
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
New York, NY, USA: ACM [Online]. Available: http://doi.acm.org/10.1145/ 1814433.1814441
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "Maui: making smartphones last longer with code offload," in Proceedings of the 8th international conference on Mobile systems, applications, and services, ser. MobiSys '10. New York, NY, USA: ACM, 2010, pp. 49-62. [Online]. Available: http://doi.acm.org/10.1145/1814433.1814441
-
(2010)
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '10
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
4
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
October [Online]. Available
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The case for vm-based cloudlets in mobile computing," IEEE Pervasive Computing, vol. 8, pp. 14-23, October 2009. [Online]. Available: http://portal.acm.org/citation. cfm?id=1638591.1638731
-
(2009)
IEEE Pervasive Computing
, vol.8
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
5
-
-
78549281152
-
Tracking semantic relationships for effective data management in home networks
-
New York, NY, USA: ACM [Online]. Available: http://doi.acm.org/10.1145/ 1851307.1851320
-
A. Anand, A. Gember, A. Akella, and V. Sekar, "Tracking semantic relationships for effective data management in home networks," in Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, ser. HomeNets '10. New York, NY, USA: ACM, 2010, pp. 49-54. [Online]. Available: http://doi.acm.org/10.1145/1851307.1851320
-
(2010)
Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, ser. HomeNets '10
, pp. 49-54
-
-
Anand, A.1
Gember, A.2
Akella, A.3
Sekar, V.4
-
6
-
-
77949794774
-
Path-analytic distributed object prefetching
-
International Symposium on
-
Y. Luo, K. T. Lam, and C.-L. Wang, "Path-analytic distributed object prefetching," Parallel Architectures, Algorithms, and Networks, International Symposium on, vol. 0, pp. 98-103, 2009.
-
(2009)
Parallel Architectures, Algorithms, and Networks
, pp. 98-103
-
-
Luo, Y.1
Lam, K.T.2
Wang, C.-L.3
-
7
-
-
0037275314
-
Resource-aware speculative prefetching in wireless networks
-
January [Online]. Available: http://dx.doi.org/10.1023/A:1020829124143
-
N. J. Tuah, M. Kumar, and S. Venkatesh, "Resource-aware speculative prefetching in wireless networks," Wirel. Netw., vol. 9, pp. 61-72, January 2003. [Online]. Available: http://dx.doi.org/10.1023/A:1020829124143
-
(2003)
Wirel. Netw.
, vol.9
, pp. 61-72
-
-
Tuah, N.J.1
Kumar, M.2
Venkatesh, S.3
-
8
-
-
20844445934
-
Energy-efficient data caching and prefetching for mobile devices based on utility
-
DOI 10.1007/s11036-005-1559-8, Mobile Services and Wireless Sensor Networks
-
H. Shen, M. Kumar, S. K. Das, and Z. Wang, "Energy-efficient data caching and prefetching for mobile devices based on utility," Mob. Netw. Appl., vol. 10, pp. 475-486, August 2005. [Online]. Available: http://dx.doi.org/10.1145/1160162.1160171 (Pubitemid 40859659)
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.4
, pp. 475-486
-
-
Shen, H.1
Kumar, M.2
Das, S.K.3
Wang, Z.4
-
9
-
-
34547625533
-
Achieving flexible cache consistency for pervasive internet access
-
IEEE International Conference on
-
Y. Huang, J. Cao, Z. Wang, B. Jin, and Y. Feng, "Achieving flexible cache consistency for pervasive internet access," Pervasive Computing and Communications, IEEE International Conference on, vol. 0, pp. 239-250, 2007.
-
(2007)
Pervasive Computing and Communications
, pp. 239-250
-
-
Huang, Y.1
Cao, J.2
Wang, Z.3
Jin, B.4
Feng, Y.5
-
10
-
-
77953991824
-
Self-evolving applications over opportunistic communication systems
-
PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings
-
I. Carreras and D. Linner, "Self-evolving applications over opportunistic communication systems," in Eigth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings, 2010, pp. 153-158.
-
(2010)
Eigth Annual IEEE International Conference on Pervasive Computing and Communications
, pp. 153-158
-
-
Carreras, I.1
Linner, D.2
-
11
-
-
50249119600
-
Opportunistic data dissemination using real-world user mobility traces
-
Washington, DC, USA: IEEE Computer Society [Online]. Available
-
A. Heinemann, J. Kangasharju, and M. Muehlhaeuser, "Opportunistic data dissemination using real-world user mobility traces," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1715-1720. [Online]. Available: http://portal.acm.org/citation.cfm?id=1395080. 1395410
-
(2008)
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
, pp. 1715-1720
-
-
Heinemann, A.1
Kangasharju, J.2
Muehlhaeuser, M.3
-
12
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
New York, NY, USA: ACM [Online]. Available: http://doi.acm.org/10.1145/ 1655008.1655026
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobile devices for cloud computing," in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW '09. New York, NY, USA: ACM, 2009, pp. 127-134. [Online]. Available: http://doi.acm.org/10.1145/1655008.1655026
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ser. CCSW '09
, pp. 127-134
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
13
-
-
38349062625
-
Interactive resource-intensive applications made easy
-
Berlin, Heidelberg: Springer-Verlag [Online]. Available
-
H. A. Lagar-Cavilla, N. Tolia, E. De Lara, M. Satyanarayanan, and D. O'Hallaron, "Interactive resource-intensive applications made easy," in Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware, ser. MIDDLEWARE2007. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 143-163. [Online]. Available: http://portal.acm.org/citation.cfm?id=1785080. 1785091
-
(2007)
Proceedings of the 8th ACM/IFIP/USENIX International Conference on Middleware, ser. MIDDLEWARE 2007
, pp. 143-163
-
-
Lagar-Cavilla, H.A.1
Tolia, N.2
De Lara, E.3
Satyanarayanan, M.4
O'Hallaron, D.5
-
14
-
-
33750084748
-
Quantifying interactive user experience on thin clients
-
March [Online]. Available
-
N. Tolia, D. G. Andersen, and M. Satyanarayanan, "Quantifying interactive user experience on thin clients," Computer, vol. 39, pp. 46-52, March 2006. [Online]. Available: http://portal.acm.org/citation.cfm?id=1128587. 1128640
-
(2006)
Computer
, vol.39
, pp. 46-52
-
-
Tolia, N.1
Andersen, D.G.2
Satyanarayanan, M.3
-
15
-
-
84902097787
-
Privacy of home telemedicine: Encryption is not enough
-
April design of Medical Devices Conference Abstracts. [Online]. Available
-
M. Salajegheh, A. Molina, and K. Fu, "Privacy of home telemedicine: Encryption is not enough," Journal of Medical Devices, vol. 3, no. 2, April 2009, design of Medical Devices Conference Abstracts. [Online]. Available: http://www.cs.umass.edu/~kevinfu/papers/salajegheh-DMD09-abstract.pdf
-
(2009)
Journal of Medical Devices
, vol.3
, Issue.2
-
-
Salajegheh, M.1
Molina, A.2
Fu, K.3
-
16
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
2009 4th International Conference on
-
A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. Clausen, S. Camtepe, S. Albayrak, and C. Yildizli, "Smartphone malware evolution revisited: Android next target?" in Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, 2009, pp. 1-7.
-
(2009)
Malicious and Unwanted Software (MALWARE)
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.4
Camtepe, S.5
Albayrak, S.6
Yildizli, C.7
-
17
-
-
0001853125
-
The computer for the 21st century
-
January [Online]. Available
-
M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, no. 3, pp. 66-75, January 1991. [Online]. Available: http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 66-75
-
-
Weiser, M.1
-
18
-
-
79958058953
-
On-demand detection of malicious software
-
February
-
A. Comparatives, "On-demand detection of malicious software," Antivirus Comparatives, vol. 15, February 2010.
-
(2010)
Antivirus Comparatives
, vol.15
-
-
Comparatives, A.1
|