-
1
-
-
84880163487
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "Maui: Making smartphones last longer with code offload," in Proc. MobiSys '10.
-
Proc. MobiSys '10
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
2
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B. G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "Clonecloud: Elastic execution between mobile device and cloud," in Proc. EuroSys '11.
-
Proc. EuroSys '11
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
3
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading." in Proc. IEEE INFOCOM 2012.
-
(2012)
Proc.IEEE INFOCOM
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
4
-
-
84899832260
-
Can offloading save energy for popular apps?
-
A. Saarinen, M. Siekkinen, Y. Xiao, J. Nurminen, M. Kemppainen, and P. Hui, "Can offloading save energy for popular apps?" in Proc. ACM MobiArch '12.
-
Proc. ACM MobiArch '12
-
-
Saarinen, A.1
Siekkinen, M.2
Xiao, Y.3
Nurminen, J.4
Kemppainen, M.5
Hui, P.6
-
5
-
-
84860870225
-
Who killed my battery: Analyzing mobile browser energy consumption
-
N. Thiagarajan, G. Aggarwal, A. Nicoara, D. Boneh, and J. Singh, "Who killed my battery?: Analyzing mobile browser energy consumption," in Proc. WWW '12.
-
Proc. WWW '12
-
-
Thiagarajan, N.1
Aggarwal, G.2
Nicoara, A.3
Boneh, D.4
Singh, J.5
-
6
-
-
84904436779
-
Application design for wireless computing
-
T. Watson, "Application design for wireless computing," in Proc. HotMobile '94.
-
Proc. HotMobile '94
-
-
Watson, T.1
-
7
-
-
84864342363
-
Informed mobile prefetching
-
B. D. Higgins, J. Flinn, T. J. Giuli, B. Noble, C. Peplin, and D. Watson, "Informed mobile prefetching," in Proc. ACM MobiSys '12.
-
Proc. ACM MobiSys '12
-
-
Higgins, B.D.1
Flinn, J.2
Giuli, T.J.3
Noble, B.4
Peplin, C.5
Watson, D.6
-
8
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The case for vm-based cloudlets in mobile computing," Pervasive Computing, IEEE, vol. 8, no. 4, 2009.
-
(2009)
Pervasive Computing, IEEE
, vol.8
, Issue.4
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
9
-
-
84883128081
-
To offload or not to offload? the bandwidth and energy costs of mobile cloud computing
-
M. V. Barbera, S. Kosta, A. Mei, and J. Stefa, "To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing," in Proc. IEEE INFOCOM 2013.
-
(2013)
Proc.IEEE INFOCOM
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Stefa, J.4
-
10
-
-
84864241807
-
Cell phone cloning: A perspective on gsm security
-
July, Jul. 2007
-
R. Singh, P. Bhargava, and S. S. Kain, "Cell phone cloning: A perspective on gsm security," Ubiquity, vol. 2007, no. July, Jul. 2007.
-
(2007)
Ubiquity
-
-
Singh, R.1
Bhargava, P.2
Kain, S.S.3
-
11
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in Proc. OSDI '10.
-
Proc. OSDI '10
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
84904436783
-
Security versus energy tradeoffs in host-based mobile malware detection
-
J. Bickford, H. A. L.-Cavilla, A. Varshavsky, V. Ganapathy, and L. Iftode, "Security versus energy tradeoffs in host-based mobile malware detection," in Proc. ACM MobiSys '11.
-
Proc. ACM MobiSys '11
-
-
Bickford, J.1
Cavilla, H.A.2
Varshavsky, A.3
Ganapathy, V.4
Iftode, L.5
-
14
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proc. MobiVirt '08.
-
Proc. MobiVirt '08
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
18
-
-
84904436767
-
An architecture to provide cloud based security services for smartphones
-
L. Subramanian, G. Q. M. Jr, and P. Stephanow, "An architecture to provide cloud based security services for smartphones," in WWRF '11.
-
WWRF '11
-
-
Subramanian, L.1
Stephanow, P.2
-
19
-
-
84927663654
-
CDroid: Towards a cloud-integrated mobile operating system
-
M. V. Barbera, S. Kosta, A. Mei, V. C. Perta, and J. Stefa, "CDroid: Towards a Cloud-Integrated Mobile Operating System," in Proc. IEEE INFOCOM 2013.
-
(2013)
Proc.IEEE INFOCOM
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Perta, V.C.4
Stefa, J.5
-
20
-
-
85084163878
-
Clone2Clone (C2C): Peer-to-peer networking of smartphones on the cloud
-
S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, "Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud," in Proc. USENIX HotCloud 2013.
-
(2013)
Proc. USENIX HotCloud
-
-
Kosta, S.1
Perta, V.C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
21
-
-
84890880868
-
StreamSmart: P2P video streaming for smartphones through the cloud
-
A. Gaeta, S. Kosta, J. Stefa, and A. Mei, "StreamSmart: P2P Video Streaming for Smartphones Through The Cloud," in Proc. IEEE SECON 2013.
-
(2013)
Proc.IEEE SECON
-
-
Gaeta, A.1
Kosta, S.2
Stefa, J.3
Mei, A.4
-
22
-
-
84927627458
-
CloneDoc: Exploiting the cloud to leverage secure group collaboration mechanisms for smartphones
-
S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones," in Proc. IEEE INFOCOM 2013.
-
(2013)
Proc.IEEE INFOCOM
-
-
Kosta, S.1
Perta, V.C.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
23
-
-
80053581300
-
Sociablesense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing
-
K. K. Rachuri, C. Mascolo, M. Musolesi, and P. J. Rentfrow, "Sociablesense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing," in Proc. Mobicom '11.
-
Proc. Mobicom '11
-
-
Rachuri, K.K.1
Mascolo, C.2
Musolesi, M.3
Rentfrow, P.J.4
-
24
-
-
84870312066
-
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud
-
M. V. Barbera, S. Kosta, J. Stefa, P. Hui, and A. Mei, "CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud," in Proc. IEEE P2P 2012.
-
(2012)
Proc.IEEE P2P
-
-
Barbera, M.V.1
Kosta, S.2
Stefa, J.3
Hui, P.4
Mei, A.5
-
25
-
-
84891384442
-
Preserving smartphone users' anonymity in cloudy days
-
C. A. Ardagna, M. Conti, M. Leone, and J. Stefa, "Preserving smartphone users' anonymity in cloudy days," in Proc. of 22nd International Conference on Computer Communications and Networks (ICCCN), 2013.
-
(2013)
Proc. of 22nd International Conference on Computer Communications and Networks (ICCCN
-
-
Ardagna, C.A.1
Conti, M.2
Leone, M.3
Stefa, J.4
-
26
-
-
77955866875
-
Give2Get: Forwarding in social mobile wireless networks of selfish individuals
-
A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals," in Proc. IEEE ICDCS 2010.
-
(2010)
Proc.IEEE ICDCS
-
-
Mei, A.1
Stefa, J.2
-
28
-
-
84861139529
-
Give2Get: Forwarding in social mobile wireless networks of selfish individuals
-
A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 569-582, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.4
, pp. 569-582
-
-
Mei, A.1
Stefa, J.2
-
29
-
-
80052438926
-
VIP Delegation: Enabling VIPs to offload data in wireless social mobile networks
-
M. Barbera, J. Stefa, A. Viana, M. D. Amorim, and M. Boc, "VIP Delegation: Enabling VIPs to Offload Data in Wireless Social Mobile Networks," in Proc. IEEE DCOSS 2011.
-
(2011)
Proc.IEEE DCOSS
-
-
Barbera, M.1
Stefa, J.2
Viana, A.3
Amorim, M.D.4
Boc, M.5
-
30
-
-
84919482478
-
Social-aware stateless routing in pocket switched networks
-
A. Mei, G. Morabito, P. Santi, and J. Stefa, "Social-Aware Stateless Routing in Pocket Switched Networks," IEEE Transactions on Parallel and Distributed Systems, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
-
-
Mei, A.1
Morabito, G.2
Santi, P.3
Stefa, J.4
-
31
-
-
78149291448
-
Stratus: Energy-efficient mobile communication using cloud support
-
B. Aggarwal, P. Chitnis, A. Dey, K. Jain, V. Navda, N. V. Padmanabhan, R. Ramjee, A. Schulman, and N. Spring, "Stratus: Energy-efficient mobile communication using cloud support," ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, 2011.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.4
-
-
Aggarwal, B.1
Chitnis, P.2
Dey, A.3
Jain, K.4
Navda, V.5
Padmanabhan, N.V.6
Ramjee, R.7
Schulman, A.8
Spring, N.9
-
33
-
-
84904436750
-
Abusing notification services on smartphones for phishing and spamming
-
Z. Xu and S. Zhu, "Abusing notification services on smartphones for phishing and spamming," in Proc. WOOT '12.
-
Proc. WOOT '12
-
-
Xu, Z.1
Zhu, S.2
-
37
-
-
85167534526
-
Characterizing radio resource allocation for 3G networks
-
F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck, "Characterizing radio resource allocation for 3G networks," in Proc. ACM IMC '10.
-
Proc. ACM IMC '10
-
-
Qian, F.1
Wang, Z.2
Gerber, A.3
Mao, Z.M.4
Sen, S.5
Spatscheck, O.6
-
38
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
|