-
1
-
-
77954500986
-
The case for cyber foraging
-
R. Balan, J. Flinn, M. Satyanarayanan, S. Sinnamohideen, and H.-I. Yang. The case for cyber foraging. In Proceedings of the 10th workshop on ACM SIGOPS European workshop, page 87, 2002.
-
(2002)
Proceedings of the 10th Workshop on ACM SIGOPS European Workshop
, pp. 87
-
-
Balan, R.1
Flinn, J.2
Satyanarayanan, M.3
Sinnamohideen, S.4
Yang, H.-I.5
-
2
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In EuroSys '11, Proceedings of the sixth european conference on Computer systems, pages 301-314, 2011.
-
(2011)
EuroSys '11, Proceedings of the Sixth European Conference on Computer Systems
, pp. 301-314
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
3
-
-
84893475005
-
Augmented smartphone applications through clone cloud execution
-
B.-G. Chun and P. Maniatis. Augmented Smartphone Applications Through Clone Cloud Execution. In HotOS, 2009.
-
(2009)
HotOS
-
-
Chun, B.-G.1
Maniatis, P.2
-
4
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In MobiSys '10, pages 49-62, 2010.
-
(2010)
MobiSys '10
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
5
-
-
0035703687
-
Self-tuned remote execution for pervasive computing
-
J. Flinn, D. Narayanan, and M. Satyanarayanan. Self-tuned remote execution for pervasive computing. In HotOS'07, pages 61-66, 2007.
-
(2007)
HotOS'07
, pp. 61-66
-
-
Flinn, J.1
Narayanan, D.2
Satyanarayanan, M.3
-
6
-
-
0013133388
-
Energy-aware adaptation for mobile applications
-
J. Flinn and M. Satyanarayanan. Energy-aware adaptation for mobile applications. ACM SIGOPS Operating Systems Review, 33(5):48-63, Dec. 1999. (Pubitemid 129548347)
-
(1999)
Operating Systems Review (ACM)
, vol.33
, Issue.5
, pp. 48-63
-
-
Flinn, J.1
Satyanarayanan, M.2
-
7
-
-
0040272294
-
Adapting to network and client variability via on-demand dynamic distillation
-
Dec.
-
A. Fox, S. D. Gribble, E. A. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. ACM SIGOPS Operating Systems Review, 30(5):160-170, Dec. 1996.
-
(1996)
ACM SIGOPS Operating Systems Review
, vol.30
, Issue.5
, pp. 160-170
-
-
Fox, A.1
Gribble, S.D.2
Brewer, E.A.3
Amir, E.4
-
9
-
-
77949441598
-
Stealthy malware detection and monitoring through vmm-based out-of-the-box semantic view reconstruction
-
28, March
-
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection and monitoring through vmm-based out-of-the-box semantic view reconstruction. ACM Trans. Inf. Syst. Secur., 13:12:1-12:28, March 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.12
, pp. 1-12
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
11
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
MobiVirt '08
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized in-cloud security services for mobile devices. In Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt '08, pages 31-35, 2008.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
12
-
-
81055140273
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis and H. Bos. Paranoid Android: Versatile Protection For Smartphones. Network Security, 2008.
-
(2008)
Network Security
-
-
Portokalidis, G.1
Bos, H.2
-
14
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
M. Satyanarayanan, V. Bahl, R. Caceres, and N. Davies. The Case for VM-based Cloudlets in Mobile Computing. IEEE Pervasive Computing, 1, 2009.
-
IEEE Pervasive Computing
, vol.1
, pp. 2009
-
-
Satyanarayanan, M.1
Bahl, V.2
Caceres, R.3
Davies, N.4
-
15
-
-
70450170895
-
Transient customization of mobile computing infrastructure
-
MobiVirt '08
-
A. Wolbach, J. Harkes, S. Chellappa, and M. Satyanarayanan. Transient customization of mobile computing infrastructure. In Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt '08, pages 37-41, 2008.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 37-41
-
-
Wolbach, A.1
Harkes, J.2
Chellappa, S.3
Satyanarayanan, M.4
-
16
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong. Securing elastic applications on mobile devices for cloud computing. In Proceedings of the 2009 ACM workshop on Cloud computing security - CCSW '09, page 127, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security - CCSW '09
, pp. 127
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
17
-
-
80051861040
-
Reducing the delay and power consumption of web browsing on smartphones in 3G networks
-
B. Zhao, B. C. Tak, and G. Cao. Reducing the delay and power consumption of web browsing on smartphones in 3G networks. In ICDCS, 2011.
-
(2011)
ICDCS
-
-
Zhao, B.1
Tak, B.C.2
Cao, G.3
-
18
-
-
84890062709
-
Mirroring smartphones for good: A feasibility study
-
B. Zhao, Z. Xu, C. Chi, S. Zhu, and G. Cao. Mirroring Smartphones For Good: A Feasibility Study. In MobiQuitous, pages 1-12, 2010.
-
(2010)
MobiQuitous
, pp. 1-12
-
-
Zhao, B.1
Xu, Z.2
Chi, C.3
Zhu, S.4
Cao, G.5
|