-
1
-
-
84865530894
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture, applications, and approaches," Wireless Communications and Mobile Computing, 2011.
-
(2011)
Wireless Communications and Mobile Computing
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
3
-
-
68249129760
-
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "Above the Clouds: A Berkeley View of Cloud Computing," 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
-
4
-
-
84883693001
-
Associated risks of cloud computing for SMEs
-
A. Azarnik, J. Shayan, M. Alizadeh, and S. Karamizadeh, "Associated Risks of Cloud Computing for SMEs," Open International Journal of Informatics, vol. 1, pp. 37-45, 2012.
-
(2012)
Open International Journal of Informatics
, vol.1
, pp. 37-45
-
-
Azarnik, A.1
Shayan, J.2
Alizadeh, M.3
Karamizadeh, S.4
-
6
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
B. P. Rimal, C. Eunmi, and I. Lumb, "A Taxonomy and Survey of Cloud Computing Systems," in INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on, 2009, pp. 44-51.
-
(2009)
INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on
, pp. 44-51
-
-
Rimal, B.P.1
Eunmi, C.2
Lumb, I.3
-
7
-
-
78049338474
-
A brief survey on the security model of cloud computing
-
in, DCABES 2010, August 10, 2010-August 12, Hong Kong, Hong kong, 2010
-
J. Xue and J.-J. Zhang, "A brief survey on the security model of cloud computing," in 9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, DCABES 2010, August 10, 2010-August 12, 2010, Hong Kong, Hong kong, 2010, pp. 475-478.
-
(2010)
9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science
, pp. 475-478
-
-
Xue, J.1
Zhang, J.-J.2
-
8
-
-
84857184370
-
A survey and analysis of cloud modelbased security for computing secure cloud bursting and aggregation in renal environment
-
in, December 11, 2011-December 14, Mumbai, India, 2011
-
P. Jain, D. Rane, and S. Patidar, "A survey and analysis of cloud modelbased security for computing secure cloud bursting and aggregation in renal environment," in 2011 World Congress on Information and Communication Technologies, WICT 2011, December 11, 2011-December 14, 2011, Mumbai, India, 2011, pp. 456-461.
-
(2011)
2011 World Congress on Information and Communication Technologies, WICT 2011
, pp. 456-461
-
-
Jain, P.1
Rane, D.2
Patidar, S.3
-
9
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
10
-
-
84055200868
-
Surveying and analyzing security, privacy and trust issues in cloud computing environments
-
D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments," Procedia Engineering, vol. 15, pp. 2852-2856, 2011.
-
(2011)
Procedia Engineering
, vol.15
, pp. 2852-2856
-
-
Sun, D.1
Chang, G.2
Sun, L.3
Wang, X.4
-
11
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
L. M. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: A survey on IaaS cloud security," Computing (Vienna/New York), vol. 91, pp. 93-118, 2011.
-
(2011)
Computing (Vienna/New York)
, vol.91
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Moran, D.3
-
12
-
-
80051572050
-
Cloud computing security issues and challenges: A survey
-
in, ACC 2011, July 22, 2011-July 24, 2011, Kochi, India
-
A. Verma and S. Kaushal, "Cloud computing security issues and challenges: A survey," in 1st International Conference on Advances in Computing and Communications, ACC 2011, July 22, 2011-July 24, 2011, Kochi, India, 2011, pp. 445-454.
-
(2011)
1st International Conference on Advances in Computing and Communications
, pp. 445-454
-
-
Verma, A.1
Kaushal, S.2
-
13
-
-
84883731865
-
-
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, "A survey on security issues and solutions at different layers of Cloud computing," pp. 1-32, 2012.
-
(2012)
A Survey on Security Issues and Solutions at Different Layers of Cloud Computing
, pp. 1-32
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, A.4
Rajarajan, M.5
-
14
-
-
84855993467
-
Building safe PaaS clouds: A survey on security in multitenant software platforms
-
L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, "Building safe PaaS clouds: A survey on security in multitenant software platforms," Computers & Security, vol. 31, pp. 96-108, 2012.
-
(2012)
Computers & Security
, vol.31
, pp. 96-108
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Caron, E.3
Muresan, A.4
Desprez, F.5
-
15
-
-
84862998994
-
Mobile cloud computing: A survey
-
1
-
N. Fernando, S. W. Loke, and W. Rahayu, "Mobile cloud computing: A survey," Future Generation Computer Systems, vol. 29, pp. 84-106, 1//2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, pp. 84-106
-
-
Fernando, N.1
Loke, S.W.2
Rahayu, W.3
-
16
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, pp. 599-616, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
17
-
-
78649302229
-
Cloud computing: State-of-The-art and research challenges
-
2010/05/01
-
Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, pp. 7-18, 2010/05/01 2010.
-
(2010)
Journal of Internet Services and Applications
, vol.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
18
-
-
67049116276
-
A tale of clouds: Paradigm comparisons and some thoughts on research issues
-
APSCC '08. IEEE, 2008
-
M. Lijun, W. K. Chan, and T. H. Tse, "A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues," in Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE, 2008, pp. 464-469.
-
(2008)
Asia-Pacific Services Computing Conference
, pp. 464-469
-
-
Lijun, M.1
Chan, W.K.2
Tse, T.H.3
-
19
-
-
84883696403
-
Enhancing security in mobile cloud computing
-
February 2012 New Delhi, India
-
J. Singh, K. S. Mathur, and V. Kumar, "Enhancing Security in Mobile Cloud Computing," Proceedings of M4D 2012 28-29 February 2012 New Delhi, India, vol. 28, p. 460, 2012.
-
(2012)
Proceedings of M4D 2012 28-29
, vol.28
, pp. 460
-
-
Singh, J.1
Mathur, K.S.2
Kumar, V.3
-
20
-
-
84883686657
-
Mobile cloud computing security considerations
-
S. K. V. Ko, J. H. Lee, and S. W. Kim, "Mobile Cloud Computing Security Considerations,"(Journal of Security Engineering), vol. 9, 2012.
-
(2012)
Journal of Security Engineering
, vol.9
-
-
Ko, S.K.V.1
Lee, J.H.2
Kim, S.W.3
-
21
-
-
81255210704
-
SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
-
J. J. Park, H. Arabnia, H.-B. Chang, and T. Shon, Eds., ed: Springer Netherlands
-
J. Park, K. Yi, and J. Park, "SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing," in IT Convergence and Services. vol. 107, J. J. Park, H. Arabnia, H.-B. Chang, and T. Shon, Eds., ed: Springer Netherlands, 2011, pp. 165-172.
-
(2011)
IT Convergence and Services
, vol.107
, pp. 165-172
-
-
Park, J.1
Yi, K.2
Park, J.3
-
22
-
-
79960227077
-
Smartphone threats and security technology
-
D. Kang, J. Han, Y. Lee, Y. Cho, S. Han, J. Kim, et al., "Smartphone Threats and Security Technology," Analysis on the Trend in Electronic Communication, vol. 25, p. 6, 2010.
-
(2010)
Analysis on the Trend in Electronic Communication
, vol.25
, pp. 6
-
-
Kang, D.1
Han, J.2
Lee, Y.3
Cho, Y.4
Han, S.5
Kim, J.6
-
23
-
-
84883736634
-
Security and performance evaluation of lightweight cryptographic algorithms in RFID
-
in, Greece
-
M. Alizadeh, M. Salleh, M. Zamani, J. Shayan, and S. Karamizadeh, "Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID," in WSEAS International of Communications, Greece, 2012.
-
(2012)
WSEAS International of Communications
-
-
Alizadeh, M.1
Salleh, M.2
Zamani, M.3
Shayan, J.4
Karamizadeh, S.5
-
24
-
-
84875420118
-
A survey on attacks in RFID networks
-
M. Alizadeh, M. Zamani, A. Rafiei Shahemabadi, J. Shayan, and A. Azarnik, "A Survey on Attacks in RFID Networks," Open International Journal of Informatics, vol. 1, pp. 15-24, 2012.
-
(2012)
Open International Journal of Informatics
, vol.1
, pp. 15-24
-
-
Alizadeh, M.1
Zamani, M.2
Rafiei Shahemabadi, A.3
Shayan, J.4
Azarnik, A.5
-
26
-
-
77954322780
-
Cloud computing: Issues and challenges
-
T. Dillon, W. Chen, and E. Chang, "Cloud Computing: Issues and Challenges," in Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33.
-
(2010)
Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on
, pp. 27-33
-
-
Dillon, T.1
Chen, W.2
Chang, E.3
-
27
-
-
79959557055
-
Addressing cloud computing security issues
-
3
-
D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, pp. 583-592, 3// 2012.
-
(2012)
Future Generation Computer Systems
, vol.28
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
29
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE, vol. 9, pp. 50-57, 2011.
-
(2011)
Security & Privacy, IEEE
, vol.9
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
30
-
-
84869598750
-
Mobile-cloud: A framework of cloud computing for mobile application
-
in, Bangalore, India, January 2-4, Tiergartenstrasse 17, Heidelberg, D-69121, Germany, 2012
-
J. Mishra, S. K. Dash, and S. Dash, "Mobile-cloud: A framework of cloud computing for mobile application," in Advances in Computer Science and Information Technology. Computer Science and Information Technology: Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012., Tiergartenstrasse 17, Heidelberg, D-69121, Germany, 2012, pp. 347-356.
-
(2012)
Advances in Computer Science and Information Technology. Computer Science and Information Technology: Second International Conference, CCSIT 2012
, pp. 347-356
-
-
Mishra, J.1
Dash, S.K.2
Dash, S.3
-
31
-
-
77956385334
-
-
A Practical Approach: McGraw-Hill, Inc
-
T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing, A Practical Approach: McGraw-Hill, Inc., 2010.
-
(2010)
Cloud Computing
-
-
Velte, T.1
Velte, A.2
Elsenpeter, R.3
-
32
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," Security & Privacy, IEEE, vol. 8, pp. 24-31, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
35
-
-
77955177377
-
Mobile community cloud computing: Emerges and evolves
-
D. Kovachev, D. Renzel, R. Klamma, and Y. Cao, "Mobile Community Cloud Computing: Emerges and Evolves," in Mobile Data Management (MDM), 2010 Eleventh International Conference on, 2010, pp. 393-395.
-
(2010)
Mobile Data Management (MDM), 2010 Eleventh International Conference on
, pp. 393-395
-
-
Kovachev, D.1
Renzel, D.2
Klamma, R.3
Cao, Y.4
-
36
-
-
84869595674
-
Can a mobile cloud be more trustworthy than a traditional cloud?
-
in, MobiSec, May 17, 2011-May 19, 2011, Aalborg, Denmark, 2012
-
M. Ali, "Can a mobile cloud be more trustworthy than a traditional cloud?," in 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, May 17, 2011-May 19, 2011, Aalborg, Denmark, 2012, pp. 125-135.
-
(2011)
3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems
, pp. 125-135
-
-
Ali, M.1
-
37
-
-
80055106772
-
Mobile cloud computing as future for mobile applications-Implementation methods and challenging issues
-
in, CCIS2011, September 15, 2011-September 17, Beijing, China, 2011
-
S. S. Qureshi, T. Ahmad, K. Rafique, and I. Shuja Ul, "Mobile cloud computing as future for mobile applications-Implementation methods and challenging issues," in 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS2011, September 15, 2011-September 17, 2011, Beijing, China, 2011, pp. 467-471.
-
(2011)
2011 IEEE International Conference on Cloud Computing and Intelligence Systems
, pp. 467-471
-
-
Qureshi, S.S.1
Ahmad, T.2
Rafique, K.3
Shuja Ul, I.4
-
38
-
-
80055117886
-
Mobile cloud computing: Devices, trends, issues, and the enabling technologies
-
P. Cox, "Mobile cloud computing: devices, trends, issues, and the enabling technologies," IBM developer Works, 2011.
-
(2011)
IBM Developer Works
-
-
Cox, P.1
-
40
-
-
79951795708
-
Cloud service portal for mobile device management
-
L. Liu, R. Moulic, and D. Shea, "Cloud Service Portal for Mobile Device Management," in e-Business Engineering (ICEBE), 2010 IEEE 7th International Conference on, 2010, pp. 474-478.
-
(2010)
E-Business Engineering (ICEBE), 2010 IEEE 7th International Conference on
, pp. 474-478
-
-
Liu, L.1
Moulic, R.2
Shea, D.3
-
41
-
-
34547335279
-
Secure function evaluation with ordered binary decision diagrams
-
Alexandria, Virginia, USA
-
L. Kruger, S. Jha, E.-J. Goh, and D. Boneh, "Secure function evaluation with ordered binary decision diagrams," presented at the Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2006.
-
(2006)
Presented at the Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Kruger, L.1
Jha, S.2
Goh, E.-J.3
Boneh, D.4
-
42
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
GCE '08
-
I. Foster, Z. Yong, I. Raicu, and S. Lu, "Cloud Computing and Grid Computing 360-Degree Compared," in Grid Computing Environments Workshop, 2008. GCE '08, 2008, pp. 1-10.
-
(2008)
Grid Computing Environments Workshop, 2008
, pp. 1-10
-
-
Foster, I.1
Yong, Z.2
Raicu, I.3
Lu, S.4
-
43
-
-
79953769770
-
Framework for building a low-cost, scalable, and secured platform for Web-delivered business services
-
Y. Huang, H. Su, W. Sun, J. M. Zhang, C. J. Guo, J. M. Xu, et al., "Framework for building a low-cost, scalable, and secured platform for Web-delivered business services," IBM Journal of Research and Development, vol. 54, pp. 4:1-4:14, 2010.
-
(2010)
IBM Journal of Research and Development
, vol.54
, pp. 1-14
-
-
Huang, Y.1
Su, H.2
Sun, W.3
Zhang, J.M.4
Guo, C.J.5
Xu, J.M.6
-
44
-
-
77955284155
-
Service-oriented cloud computing architecture
-
T. Wei-Tek, S. Xin, and J. Balasooriya, "Service-Oriented Cloud Computing Architecture," in Information Technology: New Generations (ITNG), 2010 Seventh International Conference on, 2010, pp. 684-689.
-
(2010)
Information Technology: New Generations (ITNG), 2010 Seventh International Conference on
, pp. 684-689
-
-
Wei-Tek, T.1
Xin, S.2
Balasooriya, J.3
-
47
-
-
0037250184
-
Low-power chips for high-powered handhelds
-
L. D. Paulson, "Low-power chips for high-powered handhelds," Computer, vol. 36, pp. 21-23, 2003.
-
(2003)
Computer
, vol.36
, pp. 21-23
-
-
Paulson, L.D.1
-
48
-
-
0027154508
-
Power benchmark strategy for systems employing power management
-
J. W. Davis, "Power benchmark strategy for systems employing power management," in Electronics and the Environment, 1993., Proceedings of the 1993 IEEE International Symposium on, 1993, pp. 117-119.
-
(1993)
Electronics and the Environment, 1993., Proceedings of the 1993 IEEE International Symposium on
, pp. 117-119
-
-
Davis, J.W.1
-
49
-
-
35048900504
-
Energy consumption in mobile devices: Why future systems need requirements-aware energy scale-down
-
B. Falsafi and T. N. Vijay Kumar, Eds., ed: Springer Berlin Heidelberg
-
R. Mayo and P. Ranganathan, "Energy Consumption in Mobile Devices: Why Future Systems Need Requirements-Aware Energy Scale-Down," in Power-Aware Computer Systems. vol. 3164, B. Falsafi and T. N. Vijay Kumar, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 26-40.
-
(2005)
Power-Aware Computer Systems
, vol.3164
, pp. 26-40
-
-
Mayo, R.1
Ranganathan, P.2
-
50
-
-
0002828775
-
Saving portable computer battery power through remote process execution
-
A. Rudenko, P. Reiher, G. J. Popek, and G. H. Kuenning, "Saving portable computer battery power through remote process execution," SIGMOBILE Mob. Comput. Commun. Rev., vol. 2, pp. 19-26, 1998.
-
(1998)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.2
, pp. 19-26
-
-
Rudenko, A.1
Reiher, P.2
Popek, G.J.3
Kuenning, G.H.4
-
52
-
-
35248859715
-
A compilation framework for power and energy management on mobile computers
-
H. Dietz, Ed., ed: Springer Berlin Heidelberg
-
U. Kremer, J. Hicks, and J. Rehg, "A Compilation Framework for Power and Energy Management on Mobile Computers," in Languages and Compilers for Parallel Computing. vol. 2624, H. Dietz, Ed., ed: Springer Berlin Heidelberg, 2003, pp. 115-131.
-
(2003)
Languages and Compilers for Parallel Computing
, vol.2624
, pp. 115-131
-
-
Kremer, U.1
Hicks, J.2
Rehg, J.3
-
53
-
-
77954993714
-
MAUI: Making smartphones last longer with code offload
-
California, USA
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, et al., "MAUI: making smartphones last longer with code offload," presented at the Proceedings of the 8th international conference on Mobile systems, applications, and services, San Francisco, California, USA, 2010.
-
(2010)
Presented at the Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, San Francisco
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
-
54
-
-
84055190116
-
A survey of research on mobile cloud computing
-
L. Guan, X. Ke, M. Song, and J. Song, "A Survey of Research on Mobile Cloud Computing," in Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on, 2011, pp. 387-392.
-
(2011)
Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on
, pp. 387-392
-
-
Guan, L.1
Ke, X.2
Song, M.3
Song, J.4
-
55
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The Case for VM-Based Cloudlets in Mobile Computing," Pervasive Computing, IEEE, vol. 8, pp. 14-23, 2009.
-
(2009)
Pervasive Computing, IEEE
, vol.8
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
56
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
Chicago, Illinois, USA
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobile devices for cloud computing," presented at the Proceedings of the 2009 ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009.
-
(2009)
Presented at the Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
57
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008, pp. 31-35.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
58
-
-
77954305998
-
Phosphor: A cloud based DRM scheme with sim card
-
Z. Peng, W. Chaokun, L. Zhang, and B. Dalei, "Phosphor: A Cloud Based DRM Scheme with Sim Card," in Web Conference (APWEB), 2010 12th International Asia-Pacific, 2010, pp. 459-463.
-
(2010)
Web Conference (APWEB), 2010 12th International Asia-Pacific
, pp. 459-463
-
-
Peng, Z.1
Chaokun, W.2
Zhang, L.3
Dalei, B.4
-
59
-
-
0036204131
-
Providing database as a service
-
H. Hacigumus, B. Iyer, and S. Mehrotra, "Providing database as a service," in Data Engineering, 2002. Proceedings. 18th International Conference on, 2002, pp. 29-38.
-
(2002)
Data Engineering, 2002. Proceedings. 18th International Conference on
, pp. 29-38
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
60
-
-
84883733088
-
-
AMAZON SimpleDB
-
AMAZON SimpleDB Available: www.aws.amazon.com/simpledb/
-
-
-
-
61
-
-
84883706858
-
-
Microsoft Azure
-
Microsoft Azure Available: www.windowsazure.com
-
-
-
-
63
-
-
84867247869
-
Secure private cloud architecture for mobile infrastructure as a service
-
in, June 24, 2012-June 29, Honolulu, HI, United states, 2012
-
S. Horrow, S. Gupta, A. Sardana, and A. Abraham, "Secure private cloud architecture for mobile infrastructure as a service," in 2012 IEEE 8th World Congress on Services, SERVICES 2012, June 24, 2012-June 29, 2012, Honolulu, HI, United states, 2012, pp. 149-154.
-
(2012)
2012 IEEE 8th World Congress on Services, SERVICES 2012
, pp. 149-154
-
-
Horrow, S.1
Gupta, S.2
Sardana, A.3
Abraham, A.4
-
64
-
-
79956268427
-
Inter cloud: Utility-oriented federation of cloud computing environments for scaling of application services
-
C.-H. Hsu, L. Yang, J. Park, and S.-S. Yeo, Eds., ed: Springer Berlin Heidelberg
-
R. Buyya, R. Ranjan, and R. Calheiros, "Inter Cloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services," in Algorithms and Architectures for Parallel Processing. vol. 6081, C.-H. Hsu, L. Yang, J. Park, and S.-S. Yeo, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 13-31.
-
(2010)
Algorithms and Architectures for Parallel Processing
, vol.6081
, pp. 13-31
-
-
Buyya, R.1
Ranjan, R.2
Calheiros, R.3
-
65
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, et al., "Xen and the art of virtualization," SIGOPS Oper. Syst. Rev., vol. 37, pp. 164-177, 2003.
-
(2003)
SIGOPS Oper. Syst. Rev.
, vol.37
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
-
66
-
-
78149314657
-
An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming
-
S. Y. Yang, C. L. Hsu, and D. L. Lee, "An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming," in Ninth International Conference on Machine Learning and Cybernetics, 2010, pp. 2971-2978.
-
(2010)
Ninth International Conference on Machine Learning and Cybernetics
, pp. 2971-2978
-
-
Yang, S.Y.1
Hsu, C.L.2
Lee, D.L.3
-
67
-
-
33750592891
-
Handoffs in fourth generation heterogeneous networks
-
N. Nasser, A. Hasswa, and H. Hassanein, "Handoffs in fourth generation heterogeneous networks," Communications Magazine, IEEE, vol. 44, pp. 96-103, 2006.
-
(2006)
Communications Magazine, IEEE
, vol.44
, pp. 96-103
-
-
Nasser, N.1
Hasswa, A.2
Hassanein, H.3
-
68
-
-
84869179184
-
SAMI: Service-based arbitrated multi-tier infrastructure for mobile cloud computing
-
in, August 15, 2012-August 17, Beijing, China, 2012
-
Z. Sanaei, S. Abolfazli, A. Gani, and M. Shiraz, "SAMI: Service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing," in 2012 1st IEEE International Conference on Communications in China Workshops, ICCC 2012, August 15, 2012-August 17, 2012, Beijing, China, 2012, pp. 14-19.
-
(2012)
2012 1st IEEE International Conference on Communications in China Workshops, ICCC 2012
, pp. 14-19
-
-
Sanaei, Z.1
Abolfazli, S.2
Gani, A.3
Shiraz, M.4
-
70
-
-
38349062625
-
Interactive resource-intensive applications made easy
-
R. Cerqueira and R. Campbell, Eds., ed: Springer Berlin Heidelberg
-
H. A. Lagar-Cavilla, N. Tolia, E. Lara, M. Satyanarayanan, and D. O'Hallaron, "Interactive Resource-Intensive Applications Made Easy," in Middleware 2007. vol. 4834, R. Cerqueira and R. Campbell, Eds., ed: Springer Berlin Heidelberg, 2007, pp. 143-163.
-
(2007)
Middleware 2007
, vol.4834
, pp. 143-163
-
-
Lagar-Cavilla, H.A.1
Tolia, N.2
Lara, E.3
Satyanarayanan, M.4
O'Hallaron, D.5
-
71
-
-
84883373790
-
Architecture of mobile application, security issues and services involved in mobile cloud computing environment
-
S. S. I. Saini, R. Bagga, D. Singh, and T. Jangwal, "Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment," IJCER, vol. 1, pp. 58-67, 2012.
-
(2012)
IJCER
, vol.1
, pp. 58-67
-
-
Saini, S.S.I.1
Bagga, R.2
Singh, D.3
Jangwal, T.4
|