-
1
-
-
84871302554
-
-
Ai enters the mainstream. http://www.domain-b.com/infotech/itfeature/ 20070430-Intelligence.htm/.
-
Ai Enters the Mainstream
-
-
-
3
-
-
84871286998
-
-
Cmu sphinx. http://cmusphinx.sourceforge.net.
-
-
-
-
5
-
-
84871302684
-
-
Google android. http://android.com.
-
-
-
-
10
-
-
84871284201
-
Energy consumption in mobile phones: Implications for network applications
-
N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy consumption in mobile phones: implications for network applications. In IMC, 2009.
-
(2009)
IMC
-
-
Balasubramanian, N.1
Balasubramanian, A.2
Venkataramani, A.3
-
11
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: taking control of the enterprise. In SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
12
-
-
84893475005
-
Augmented smartphone applications through clone cloud execution
-
B. Chun and P. Maniatis. Augmented smartphone applications through clone cloud execution. In HotOS, 2009.
-
(2009)
HotOS
-
-
Chun, B.1
Maniatis, P.2
-
13
-
-
79955951954
-
CloneCloud: Elastic execution between mobile device and cloud
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: elastic execution between mobile device and cloud. In EuroSys, 2011.
-
(2011)
EuroSys
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
14
-
-
77954967725
-
Dynamically partitioning applications between weak devices and clouds
-
B.-G. Chun and P. Maniatis. Dynamically partitioning applications between weak devices and clouds. In MCS, 2010.
-
(2010)
MCS
-
-
Chun, B.-G.1
Maniatis, P.2
-
15
-
-
77954993714
-
MAUI: Making Smartphones Last Longer with Code Offload
-
E. Cuervo, A. Balasubramanian, D. ki Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. MAUI: Making Smartphones Last Longer with Code Offload. In MobiSys, 2010.
-
(2010)
MobiSys
-
-
Cuervo, E.1
Balasubramanian, A.2
Ki Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
16
-
-
79959868798
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
18
-
-
0036360836
-
Balancing performance, energy, and quality in pervasive computing
-
J. Flinn, S. Park, and M. Satyanarayanan. Balancing performance, energy, and quality in pervasive computing. In ICDCS, 2002.
-
(2002)
ICDCS
-
-
Flinn, J.1
Park, S.2
Satyanarayanan, M.3
-
19
-
-
77952175956
-
A clean slate 4D approach to network control and management
-
A. Greenberg, G. Hjalmtysson, D. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. ACM SIGCOMM CCR, 2005.
-
(2005)
ACM SIGCOMM CCR
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
20
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar and Y.-H. Lu. Cloud computing for mobile users: Can offloading computation save energy? Computer, 99, 2010.
-
(2010)
Computer
, vol.99
-
-
Kumar, K.1
Lu, Y.-H.2
-
21
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM CCR, 2008.
-
(2008)
ACM SIGCOMM CCR
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
22
-
-
0036361284
-
Towards a distributed platform for resource-constrained devices
-
A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, D. Chen, T. Giuli, and X. Gu. Towards a distributed platform for resource-constrained devices. In ICDCS, volume 22, 2002.
-
(2002)
ICDCS
, vol.22
-
-
Messer, A.1
Greenberg, I.2
Bernadat, P.3
Milojicic, D.4
Chen, D.5
Giuli, T.6
Gu, X.7
-
24
-
-
78649330053
-
-
Technical Report GT-CS-09-15, GaTech, October
-
A. Ramachandran, Y. Mundada, M. B. Tariq, and N. Feamster. Securing enterprise networks using traffic tainting. Technical Report GT-CS-09-15, GaTech, October 2009.
-
(2009)
Securing Enterprise Networks Using Traffic Tainting
-
-
Ramachandran, A.1
Mundada, Y.2
Tariq, M.B.3
Feamster, N.4
-
26
-
-
70450230503
-
Leveraging smart phones to reduce mobility footprints
-
S. Smaldone, B. Gilbert, N. Bila, L. Iftode, E. de Lara, and M. Satyanarayanan. Leveraging smart phones to reduce mobility footprints. In MobiSys, 2009.
-
(2009)
MobiSys
-
-
Smaldone, S.1
Gilbert, B.2
Bila, N.3
Iftode, L.4
De Lara, E.5
Satyanarayanan, M.6
-
27
-
-
10844281465
-
Email as spectroscopy: Automated discovery of community structure within organizations
-
J. R. Tyler, D. M. Wilkinson, and B. A. Huberman. Email as spectroscopy: automated discovery of community structure within organizations. Communities and technologies, pages 81-96, 2003.
-
(2003)
Communities and Technologies
, pp. 81-96
-
-
Tyler, J.R.1
Wilkinson, D.M.2
Huberman, B.A.3
-
28
-
-
84869107944
-
User experiences with sharing and access control
-
T. Whalen, D. Smetters, and E. F. Churchill. User experiences with sharing and access control. In CHI, 2006.
-
(2006)
CHI
-
-
Whalen, T.1
Smetters, D.2
Churchill, E.F.3
-
29
-
-
77953989937
-
Detecting professional versus personal closeness using an enterprise social network site
-
A. Wu, J. M. DiMicco, and D. R. Millen. Detecting professional versus personal closeness using an enterprise social network site. In CHI, 2010.
-
(2010)
CHI
-
-
Wu, A.1
DiMicco, J.M.2
Millen, D.R.3
-
30
-
-
85094324897
-
Tesseract: A 4D network control plane
-
H. Yan, D. A. Maltz, T. S. E. Ng, H. Gogineni, H. Zhang, and Z. Cai. Tesseract: A 4D network control plane. In NSDI, 2007.
-
(2007)
NSDI
-
-
Yan, H.1
Maltz, D.A.2
Ng, T.S.E.3
Gogineni, H.4
Zhang, H.5
Cai, Z.6
-
31
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. Dick, Z. Mao, and L. Yang. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In CODES+ISSS, 2010.
-
(2010)
CODES+ISSS
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.5
Mao, Z.6
Yang, L.7
-
32
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong. Securing elastic applications on mobile devices for cloud computing. In Workshop on Cloud computing security, 2009.
-
Workshop on Cloud Computing Security, 2009
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
|