-
1
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Univ. California, Berkeley, CA, Tech. Rep. UCB/EECS-2009-28
-
M.Armbrust,A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A Berkeley View of cloud computing," Dept. Elect. Eng. Comput. Sci., Univ. California, Berkeley, CA, Tech. Rep. UCB/EECS-2009-28, 2009.
-
(2009)
Dept. Elect. Eng. Comput. Sci.
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
78449236807
-
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication
-
D. Huang, X. Zhang, M. Kang, and J. Luo, "Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication," in Proc. 5th IEEE Int. Symp. Service-Oriented Syst. Eng., 2010, pp. 27-34.
-
(2010)
Proc. 5th IEEE Int. Symp. Service-Oriented Syst. Eng.
, pp. 27-34
-
-
Huang, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
3
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-K. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "MAUI: Making smartphones last longer with code offload," in Proc. ACM MobiSys, 2010, pp. 49-62.
-
(2010)
Proc. ACM MobiSys
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
4
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
Oct.-Dec.
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The case for VM-based cloudlets in mobile computing," IEEE Pervasive Comput., vol. 8, no. 4, pp. 14-23, Oct.-Dec. 2009.
-
(2009)
IEEE Pervasive Comput.
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
5
-
-
80052360867
-
Augmented smartphone applications through clone cloud execution
-
B. Chun and P. Maniatis, "Augmented smartphone applications through clone cloud execution," in Proc. USENIX HotOS XII, 2009, p. 8.
-
(2009)
Proc. USENIX HotOS
, vol.12
, pp. 8
-
-
Chun, B.1
Maniatis, P.2
-
6
-
-
2042463653
-
Quality of experience
-
Jan.-Mar.
-
R. Jain, "Quality of experience," IEEE Multimedia, vol. 11, no. 1, pp. 95-96, Jan.-Mar. 2004.
-
(2004)
IEEE Multimedia
, vol.11
, Issue.1
, pp. 95-96
-
-
Jain, R.1
-
7
-
-
84862552781
-
-
Secure Networking and Computing (SNACT) Research Group Mobicloud
-
Secure Networking and Computing (SNACT) Research Group, Mobicloud.
-
-
-
-
8
-
-
84862571577
-
-
[Online]. Available
-
[Online]. Available: http://mobicloud.asu.edu/
-
-
-
-
11
-
-
62749095223
-
-
3rd ed. Cambridge, MA: MIT Press
-
C. E. L. Thomas, H. Cormen, R. L. Rivest, and C. Stein, Introduction to Algorithms, 3rd ed. Cambridge, MA: MIT Press, 2009.
-
(2009)
Introduction to Algorithms
-
-
Thomas, C.E.L.1
Cormen, H.2
Rivest, R.L.3
Stein, C.4
-
12
-
-
71749106352
-
Deploying mobile computation in cloud service
-
X. H. Li, H. Zhang, and Y. F. Zhang, "Deploying mobile computation in cloud service," in Proc. 1st Int. Conf. CloudCom, 2009, pp. 301-311.
-
(2009)
Proc. 1st Int. Conf. CloudCom
, pp. 301-311
-
-
Li, X.H.1
Zhang, H.2
Zhang, Y.F.3
-
13
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobile devices for cloud computing," in Proc. ACM Workshop Cloud Comput. Security, 2009, pp. 127-134.
-
(2009)
Proc. ACM Workshop Cloud Comput. Security
, pp. 127-134
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
14
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proc. 1st Workshop Virtualization Mobile Comput., 2008, pp. 31-35.
-
(2008)
Proc. 1st Workshop Virtualization Mobile Comput.
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
15
-
-
21644486892
-
A lightweight secure cyber foraging infrastructure for resource-constrained devices
-
S. Goyal and J. Carter, "A lightweight secure cyber foraging infrastructure for resource-constrained devices," in Proc. 6th IEEE Workshop Mobile Comput. Syst. Appl. , 2004, pp. 186-195.
-
(2004)
Proc. 6th IEEE Workshop Mobile Comput. Syst. Appl.
, pp. 186-195
-
-
Goyal, S.1
Carter, J.2
-
16
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Sep
-
Q.Wang, C.Wang, J. Li, K. Ren, andW. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. ESORICS, Saint Malo, France, Sep 2009, pp. 355-370.
-
(2009)
Proc. ESORICS, Saint Malo, France
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
17
-
-
77954843911
-
Towards publicly auditably secure data storage services
-
Jul./Aug.
-
C. Wang, K. Ren, W. Lou, and J. Li, "Towards publicly auditably secure data storage services," IEEE Netw. Mag., vol. 24, no. 4, pp. 19-24, Jul./Aug. 2010.
-
(2010)
IEEE Netw. Mag.
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
18
-
-
62249162882
-
Resource management and qos provisioning for iptv over mmwave-basedwpans with directional antenna
-
Apr.
-
L. X. Cai, L. Cai, X. Shen, and J. W. Mark, "Resource management and QoS provisioning for IPTV over mmWave-basedWPANs with directional antenna," ACMMobile Netw. Appl., vol. 14, no. 2, pp. 210-219, Apr. 2009.
-
(2009)
ACMMobile Netw. Appl.
, vol.14
, Issue.2
, pp. 210-219
-
-
Cai, L.X.1
Cai, L.2
Shen, X.3
Mark, J.W.4
-
19
-
-
61349091199
-
Novel packet-level resource allocation with effective qos provisioning for wireless mesh networks
-
Feb
-
H. T. Cheng andW. Zhuang, "Novel packet-level resource allocation with effective QoS provisioning for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 694-700, Feb 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.2
, pp. 694-700
-
-
Cheng, H.T.1
Zhuang, W.2
-
20
-
-
67651083321
-
Efficientmacprotocol for ultrawideband networks
-
Jun.
-
L. X. Cai, X. Shen, and J.W. Mark, "EfficientMACprotocol for ultrawideband networks," IEEE Commun. Mag., vol. 47, no. 6, pp. 179-185, Jun. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.6
, pp. 179-185
-
-
Cai, L.X.1
Shen, X.2
Mark, J.W.3
-
21
-
-
77958088003
-
Distributed reinforcement learning frameworks for cooperative retransmission in wireless networks
-
Oct.
-
G. Naddafzadeh-Shirazi, P.-Y. Kong, and C.-K. Tham, "Distributed reinforcement learning frameworks for cooperative retransmission in wireless networks," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 4157-4162, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 4157-4162
-
-
Naddafzadeh-Shirazi, G.1
Kong, P.-Y.2
Tham, C.-K.3
-
22
-
-
82155193069
-
Online learning in autonomic multihop wireless networks for transmitting mission-critical applications
-
Jun.
-
H.-P. Shiang and M. van der Schaar, "Online learning in autonomic multihop wireless networks for transmitting mission-critical applications," IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 728-741, Jun. 2010.
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.5
, pp. 728-741
-
-
Shiang, H.-P.1
Van Der Schaa, M.2
-
23
-
-
77952257273
-
Adaptive admission control and channel allocation policy in cooperative ad hoc opportunistic spectrum networks
-
May
-
A. Alshamrani, L. Xie, and X. Shen, "Adaptive admission control and channel allocation policy in cooperative ad hoc opportunistic spectrum networks," IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1618-1629, May 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.4
, pp. 1618-1629
-
-
Alshamrani, A.1
Xie, L.2
Shen, X.3
-
24
-
-
33645241305
-
Optimal resource allocation and adaptive call admission control for voice/data integrated cellular networks
-
Mar.
-
C. Leong, W. Zhuang, Y. Cheng, and L. Wang, "Optimal resource allocation and adaptive call admission control for voice/data integrated cellular networks," IEEE Trans. Veh. Technol., vol. 55, no. 2, pp. 654-669, Mar. 2006.
-
(2006)
IEEE Trans. Veh. Technol.
, vol.55
, Issue.2
, pp. 654-669
-
-
Leong, C.1
Zhuang, W.2
Cheng, Y.3
Wang, L.4
-
25
-
-
29044448431
-
Medium access control in ultrawideband wireless networks
-
Sep. (Invited Paper)
-
X. Shen, W. Zhuang, H. Jiang, and J. Cai, "Medium access control in ultrawideband wireless networks," IEEE Trans. Veh. Technol., vol. 54, no. 5, pp. 1663-1677, Sep. 2005. (Invited Paper).
-
(2005)
IEEE Trans. Veh. Technol.
, vol.54
, Issue.5
, pp. 1663-1677
-
-
Shen, X.1
Zhuang, W.2
Jiang, H.3
Cai, J.4
-
26
-
-
79960616314
-
On economic mobile cloud computing model
-
H. Liang, D. Huang, and D. Peng, "On economic mobile cloud computing model," in Proc. Int. Workshop Mobile Comput. Clouds (MobiCloud in conjunction with MobiCASE), 2010, pp. 1-12.
-
(2010)
Proc. Int. Workshop Mobile Comput. Clouds (MobiCloud in conjunction with MobiCASE)
, pp. 1-12
-
-
Liang, H.1
Huang, D.2
Peng, D.3
-
27
-
-
84862552787
-
-
HP Integrity Non-Stop Computing. [Online]. Available:
-
HP, Integrity Non-Stop Computing, 2011. [Online]. Available: http://h20223.www2.hp.com/nonstopcomputing/cache/76385-0-0-0-121.html
-
(2011)
-
-
-
28
-
-
84862518786
-
-
Citrix Xen Server High Availability. [Online]. Available:
-
Citrix, Xen Server High Availability, 2011. [Online]. Available: http://support . citrix . com/servlet/KbServlet/download/21018-102-479340/HA-de ep-2.pdf
-
(2011)
-
-
-
29
-
-
84862571580
-
-
VMWare Inc. Vmware High Availability. [Online]. Available:
-
VMWare Inc., Vmware High Availability, 2011. [Online]. Available: http://www.vmware.com/products/high-availability/overview.html
-
(2011)
-
-
-
30
-
-
84898487969
-
A game-theoretic method of fair resource allocation for cloud computing services
-
G. Wei, A. V. Vasilakos, Y. Zheng, and N. Xiong, "A game-theoretic method of fair resource allocation for cloud computing services," J. Supercomput., vol. 54, no. 2, pp. 252-269, 2009.
-
(2009)
J. Supercomput.
, vol.54
, Issue.2
, pp. 252-269
-
-
Wei, G.1
Vasilakos, A.V.2
Zheng, Y.3
Xiong, N.4
|