메뉴 건너뛰기




Volumn 14, Issue 2, 2015, Pages 22-

Mobile computations with surrounding devices: Proximity sensing and multilayered work stealing

Author keywords

Crowd computing; Mobile computations; Mobile infrastructure; Work stealing

Indexed keywords

BLUETOOTH; TOPOLOGY;

EID: 84923677679     PISSN: 15399087     EISSN: 15583465     Source Type: Journal    
DOI: 10.1145/2656214     Document Type: Article
Times cited : (37)

References (40)
  • 2
    • 84881570938 scopus 로고    scopus 로고
    • Mobile computing - A green computing resource
    • He Ba, Wendi Rabiner Heinzelman, Charles - Antoine Janssen, and Jiye Shi. 2013. Mobile computing-A green computing resource. In WCNC. 4451-4456.
    • (2013) WCNC , pp. 4451-4456
    • Ba, H.1    Heinzelman, W.R.2    Janssen, C.-A.3    Shi, J.4
  • 3
    • 79955554419 scopus 로고    scopus 로고
    • Energy consumption and execution time estimation of embedded system applications
    • June 2011
    • Gustavo Callou, Paulo Maciel, Eduardo Tavares, Ermeson Andrade, Bruno Nogueira, Carlos Araujo, and Paulo Cunha. 2011. Energy consumption and execution time estimation of embedded system applications. Microprocess. Microsyst. 35, 4 (June 2011), 426-440.
    • (2011) Microprocess. Microsyst. , vol.35 , Issue.4 , pp. 426-440
    • Callou, G.1    Maciel, P.2    Tavares, E.3    Andrade, E.4    Nogueira, B.5    Araujo, C.6    Cunha, P.7
  • 8
    • 33645311516 scopus 로고    scopus 로고
    • Reality mining: Sensing complex social systems
    • March 2006
    • Nathan Eagle and Alex (Sandy) Pentland. 2006. Reality mining: Sensing complex social systems. Personal Ubiquitous Comput. 10, 4 (March 2006), 255-268. DOI:http://dx.doi.org/10.1007/s00779-005-0046-3
    • (2006) Personal Ubiquitous Comput , vol.10 , Issue.4 , pp. 255-268
    • Eagle, N.1    Pentland, A.2
  • 10
    • 85025125856 scopus 로고    scopus 로고
    • Honeybee: A programming framework for mobile crowd computing
    • Niroshinie Fernando, Seng Wai Loke, and Wenny Rahayu. 2012a. Honeybee: A programming framework for mobile crowd computing. In MobiQuitous. 224-236.
    • (2012) MobiQuitous , pp. 224-236
    • Fernando, N.1    Loke, S.W.2    Rahayu, W.3
  • 11
    • 84870778362 scopus 로고    scopus 로고
    • Mobile crowd computing with work stealing
    • Niroshinie Fernando, Seng Wai Loke, and Wenny Rahayu. 2012b. Mobile crowd computing with work stealing. In NBiS. 660-665.
    • (2012) NBiS , pp. 660-665
    • Fernando, N.1    Loke, S.W.2    Rahayu, W.3
  • 12
    • 84862998994 scopus 로고    scopus 로고
    • Mobile cloud computing: A survey
    • Jan. 2013
    • Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. 2013. Mobile cloud computing: A survey. Future Gener. Comput. Syst. 29, 1 (Jan. 2013), 84-106. DOI:http://dx.doi.org/10.1016/j.future.2012.05.023
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.1 , pp. 84-106
    • Fernando, N.1    Loke, S.W.2    Rahayu, W.3
  • 15
    • 81355138524 scopus 로고    scopus 로고
    • Mobile crowdsensing: Current state and future challenges
    • 2011
    • Raghu K. Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Commun. Mag. 49, 11 (2011), 32-39.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.11 , pp. 32-39
    • Ganti, R.K.1    Ye, F.2    Lei, H.3
  • 16
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • March 2010
    • Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (March 2010), 97-105. DOI:http://dx.doi.org/10.1145/1666420.1666444
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 17
    • 84866951817 scopus 로고    scopus 로고
    • Vehicular cloud computing
    • Mario Gerla. 2012. Vehicular cloud computing. In Med-Hoc-Net. 152-155.
    • (2012) Med-Hoc-Net , pp. 152-155
    • Gerla, M.1
  • 18
    • 84874563457 scopus 로고    scopus 로고
    • Ediscovery: Energy efficient device discovery for mobile opportunistic communications
    • Bo Han and Aravind Srinivasan. 2012. Ediscovery: Energy efficient device discovery for mobile opportunistic communications. In ICNP. 1-10.
    • (2012) ICNP , pp. 1-10
    • Han, B.1    Srinivasan, A.2
  • 19
    • 84865080828 scopus 로고    scopus 로고
    • Energy consumption in android phones when using wireless communication technologies
    • Goran Kalic, Iva Bojic, and Mario Kusek. 2012. Energy consumption in android phones when using wireless communication technologies. In MIPRO. 754-759.
    • (2012) MIPRO , pp. 754-759
    • Kalic, G.1    Bojic, I.2    Kusek, M.3
  • 20
    • 77956055129 scopus 로고    scopus 로고
    • Power law and exponential decay of intercontact times between mobile devices
    • Oct. 2010
    • Thomas Karagiannis, Jean-Yves Le Boudec, and Milan Vojnovic. 2010. Power law and exponential decay of intercontact times between mobile devices. IEEE Trans. Mob. Comput. 9, 10 (Oct. 2010), 1377-1390. DOI:http://dx.doi.org/10.1109/TMC.2010.99
    • (2010) IEEE Trans. Mob. Comput. , vol.9 , Issue.10 , pp. 1377-1390
    • Karagiannis, T.1    Le Boudec, J.-Y.2    Vojnovic, M.3
  • 21
    • 84878499314 scopus 로고    scopus 로고
    • Asurvey of computation offloading for mobile systems
    • Feb.2013
    • Karthik Kumar, Jibang Liu, Yung-Hsiang Lu, and Bharat Bhargava. 2013. Asurvey of computation offloading for mobile systems. Mob. Netw. Appl. 18, 1 (Feb. 2013), 129-140.
    • (2013) Mob. Netw. Appl. , vol.18 , Issue.1 , pp. 129-140
    • Kumar, K.1    Liu, J.2    Lu, Y.-H.3    Bhargava, B.4
  • 22
    • 74449093250 scopus 로고    scopus 로고
    • Energy constrained resource allocation optimization for mobile grids
    • 2010
    • Chunlin Li and Layuan Li. 2010. Energy constrained resource allocation optimization for mobile grids. J. Parallel Distrib. Comput. 70, 3 (2010), 245-258.
    • (2010) J. Parallel Distrib. Comput. , vol.70 , Issue.3 , pp. 245-258
    • Li, C.1    Li, L.2
  • 23
    • 84863156561 scopus 로고    scopus 로고
    • An efficient clustering method for unstructured mobile peer-to- peer networks
    • ACM, New York, NY, USA
    • He Li, Kyoung Soo Bok, and Jae Soo Yoo. 2011. An efficient clustering method for unstructured mobile peer-to- peer networks. In Proceedings of the 2011 ACM Symposium on Research in Applied Computation (RACS'11). ACM, New York, NY, USA, 124-129. DOI:http://dx.doi.org/10.1145/2103380.2103407
    • (2011) Proceedings of the 2011 ACM Symposium on Research in Applied Computation (RACS'11) , pp. 124-129
    • Li, H.1    Bok, K.S.2    Yoo, J.S.3
  • 24
    • 84885656807 scopus 로고    scopus 로고
    • When mobile terminals meet the cloud: Computation offloading as the bridge
    • 2013
    • Xiaoqiang Ma, Yuan Zhao, Lei Zhang, Haiyang Wang, and Limei Peng. 2013. When mobile terminals meet the cloud: Computation offloading as the bridge. IEEE Network 27, 5 (2013), 28-33.
    • (2013) IEEE Network , vol.27 , Issue.5 , pp. 28-33
    • Ma, X.1    Zhao, Y.2    Zhang, L.3    Wang, H.4    Peng, L.5
  • 27
    • 84881036781 scopus 로고    scopus 로고
    • Phoenix: Storage using an autonomous mobile infrastructure
    • 2013
    • Rajesh Krishna Panta, Rittwik Jana, Fan Cheng, Yih-Farn Robin Chen, and Vinay A. Vaishampayan. 2013. Phoenix: Storage using an autonomous mobile infrastructure. IEEE Trans. Parallel Distrib. Syst. 24, 9 (2013), 1863-1873. http://dblp.uni-trier.de/db/journals/tpds/tpds24.html#PantaJCCV13.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.9 , pp. 1863-1873
    • Panta, R.K.1    Jana, R.2    Cheng, F.3    Chen, Y.-F.R.4    Vaishampayan, V.A.5
  • 33
    • 84894103891 scopus 로고    scopus 로고
    • Energy-efficient job stealing for cpu-intensive processing in mobile devices
    • 2014
    • Juan Manuel Rodriguez, Cristian Mateos, and Alejandro Zunino. 2014. Energy-efficient job stealing for cpu-intensive processing in mobile devices. Computing 96, 2 (2014), 87-117.
    • (2014) Computing , vol.96 , Issue.2 , pp. 87-117
    • Rodriguez, J.M.1    Mateos, C.2    Zunino, A.3
  • 40
    • 84879285531 scopus 로고    scopus 로고
    • Security challenges in vehicular cloud computing
    • 2013
    • Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle. 2013. Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14, 1 (2013), 284-294.
    • (2013) IEEE Trans. Intell. Transp. Syst. , vol.14 , Issue.1 , pp. 284-294
    • Yan, G.1    Wen, D.2    Olariu, S.3    Weigle, M.C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.