메뉴 건너뛰기




Volumn , Issue , 2014, Pages 2355-2363

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMMUNICATION; EXPERIMENTS;

EID: 84904431134     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2014.6848180     Document Type: Conference Paper
Times cited : (47)

References (38)
  • 3
    • 84861596582 scopus 로고    scopus 로고
    • Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
    • S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading." in Proc. IEEE INFOCOM 2012.
    • (2012) Proc.IEEE INFOCOM
    • Kosta, S.1    Aucinas, A.2    Hui, P.3    Mortier, R.4    Zhang, X.5
  • 6
    • 84904436779 scopus 로고    scopus 로고
    • Application design for wireless computing
    • T. Watson, "Application design for wireless computing," in Proc. HotMobile '94.
    • Proc. HotMobile '94
    • Watson, T.1
  • 9
    • 84883128081 scopus 로고    scopus 로고
    • To offload or not to offload? the bandwidth and energy costs of mobile cloud computing
    • M. V. Barbera, S. Kosta, A. Mei, and J. Stefa, "To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing," in Proc. IEEE INFOCOM 2013.
    • (2013) Proc.IEEE INFOCOM
    • Barbera, M.V.1    Kosta, S.2    Mei, A.3    Stefa, J.4
  • 10
    • 84864241807 scopus 로고    scopus 로고
    • Cell phone cloning: A perspective on gsm security
    • July, Jul. 2007
    • R. Singh, P. Bhargava, and S. S. Kain, "Cell phone cloning: A perspective on gsm security," Ubiquity, vol. 2007, no. July, Jul. 2007.
    • (2007) Ubiquity
    • Singh, R.1    Bhargava, P.2    Kain, S.S.3
  • 15
    • 84904436765 scopus 로고    scopus 로고
    • Thinav: Truly lightweight mobile cloud-based anti-malware
    • C. Jarabek, D. Barrera, and J. Aycock, "Thinav: Truly lightweight mobile cloud-based anti-malware," in Proc. ACSAC '12.
    • Proc. ACSAC '12
    • Jarabek, C.1    Barrera, D.2    Aycock, J.3
  • 18
    • 84904436767 scopus 로고    scopus 로고
    • An architecture to provide cloud based security services for smartphones
    • L. Subramanian, G. Q. M. Jr, and P. Stephanow, "An architecture to provide cloud based security services for smartphones," in WWRF '11.
    • WWRF '11
    • Subramanian, L.1    Stephanow, P.2
  • 21
    • 84890880868 scopus 로고    scopus 로고
    • StreamSmart: P2P video streaming for smartphones through the cloud
    • A. Gaeta, S. Kosta, J. Stefa, and A. Mei, "StreamSmart: P2P Video Streaming for Smartphones Through The Cloud," in Proc. IEEE SECON 2013.
    • (2013) Proc.IEEE SECON
    • Gaeta, A.1    Kosta, S.2    Stefa, J.3    Mei, A.4
  • 22
    • 84927627458 scopus 로고    scopus 로고
    • CloneDoc: Exploiting the cloud to leverage secure group collaboration mechanisms for smartphones
    • S. Kosta, V. C. Perta, J. Stefa, P. Hui, and A. Mei, "CloneDoc: Exploiting the Cloud to Leverage Secure Group Collaboration Mechanisms for Smartphones," in Proc. IEEE INFOCOM 2013.
    • (2013) Proc.IEEE INFOCOM
    • Kosta, S.1    Perta, V.C.2    Stefa, J.3    Hui, P.4    Mei, A.5
  • 23
    • 80053581300 scopus 로고    scopus 로고
    • Sociablesense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing
    • K. K. Rachuri, C. Mascolo, M. Musolesi, and P. J. Rentfrow, "Sociablesense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing," in Proc. Mobicom '11.
    • Proc. Mobicom '11
    • Rachuri, K.K.1    Mascolo, C.2    Musolesi, M.3    Rentfrow, P.J.4
  • 24
    • 84870312066 scopus 로고    scopus 로고
    • CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud
    • M. V. Barbera, S. Kosta, J. Stefa, P. Hui, and A. Mei, "CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud," in Proc. IEEE P2P 2012.
    • (2012) Proc.IEEE P2P
    • Barbera, M.V.1    Kosta, S.2    Stefa, J.3    Hui, P.4    Mei, A.5
  • 26
    • 77955866875 scopus 로고    scopus 로고
    • Give2Get: Forwarding in social mobile wireless networks of selfish individuals
    • A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals," in Proc. IEEE ICDCS 2010.
    • (2010) Proc.IEEE ICDCS
    • Mei, A.1    Stefa, J.2
  • 27
    • 79960883441 scopus 로고    scopus 로고
    • Social-aware stateless forwarding in pocket switched networks
    • A. Mei, G. Morabito, P. Santi, and J. Stefa, "Social-Aware Stateless Forwarding in Pocket Switched Networks," in Proc. IEEE INFOCOM 2011.
    • (2011) Proc.IEEE INFOCOM
    • Mei, A.1    Morabito, G.2    Santi, P.3    Stefa, J.4
  • 28
    • 84861139529 scopus 로고    scopus 로고
    • Give2Get: Forwarding in social mobile wireless networks of selfish individuals
    • A. Mei and J. Stefa, "Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 569-582, 2012.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.4 , pp. 569-582
    • Mei, A.1    Stefa, J.2
  • 29
    • 80052438926 scopus 로고    scopus 로고
    • VIP Delegation: Enabling VIPs to offload data in wireless social mobile networks
    • M. Barbera, J. Stefa, A. Viana, M. D. Amorim, and M. Boc, "VIP Delegation: Enabling VIPs to Offload Data in Wireless Social Mobile Networks," in Proc. IEEE DCOSS 2011.
    • (2011) Proc.IEEE DCOSS
    • Barbera, M.1    Stefa, J.2    Viana, A.3    Amorim, M.D.4    Boc, M.5
  • 33
    • 84904436750 scopus 로고    scopus 로고
    • Abusing notification services on smartphones for phishing and spamming
    • Z. Xu and S. Zhu, "Abusing notification services on smartphones for phishing and spamming," in Proc. WOOT '12.
    • Proc. WOOT '12
    • Xu, Z.1    Zhu, S.2
  • 38
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.