-
1
-
-
84878499314
-
A survey of computation offloading for mobile systems
-
Kumar, K., Liu, J., Lu, Y.-H., Bhargava, B.: A survey of computation offloading for mobile systems. Mobile Networks and Applications 18(1), 129–140 (2013)
-
(2013)
Mobile Networks and Applications
, vol.18
, Issue.1
, pp. 129-140
-
-
Kumar, K.1
Liu, J.2
Lu, Y.-H.3
Bhargava, B.4
-
2
-
-
0035570935
-
An infrastructure approach to context-aware computing
-
Hong, J.I., Landay, J.A.: An infrastructure approach to context-aware computing. Human-Computer Interaction 16(2), 287–303 (2001)
-
(2001)
Human-Computer Interaction
, vol.16
, Issue.2
, pp. 287-303
-
-
Hong, J.I.1
Landay, J.A.2
-
3
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: Can offloading computation save energy? Computer (4), 51–56 (2010)
-
(2010)
Computer
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.-H.2
-
4
-
-
84923934257
-
Reducing task completion time in mobile offloading systems through online adaptive local restart
-
ACM, New York
-
Wang, Q., Wolter, K.: Reducing task completion time in mobile offloading systems through online adaptive local restart. In: Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, ICPE 2015, pp. 3–13. ACM, New York (2015)
-
(2015)
Proceedings of the 6Th ACM/SPEC International Conference on Performance Engineering, ICPE 2015
, pp. 3-13
-
-
Wang, Q.1
Wolter, K.2
-
5
-
-
51049120295
-
Using bandwidth data to make computation offloading decisions
-
IEEE
-
Wolski, R., Gurun, S., Krintz, C., Nurmi, D.: Using bandwidth data to make computation offloading decisions. In: IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, pp. 1–8. IEEE (2008)
-
(2008)
IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008
, pp. 1-8
-
-
Wolski, R.1
Gurun, S.2
Krintz, C.3
Nurmi, D.4
-
6
-
-
70350160087
-
Energy efficient content-based image retrieval for mobile systems
-
IEEE
-
Hong, Y.-J., Kumar, K., Lu, Y.-H.: Energy efficient content-based image retrieval for mobile systems. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 1673–1676. IEEE (2009)
-
(2009)
IEEE International Symposium on Circuits and Systems, ISCAS 2009
, pp. 1673-1676
-
-
Hong, Y.-J.1
Kumar, K.2
Lu, Y.-H.3
-
7
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
IEEE
-
Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Thinkair: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In: 2012 Proceedings IEEE INFOCOM, pp. 945–953. IEEE (2012)
-
(2012)
2012 Proceedings IEEE INFOCOM
, pp. 945-953
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
8
-
-
84890886003
-
Enabling energy-aware collaborative mobile data offloading for smartphones
-
IEEE
-
Ding, A.Y., Han, B., Xiao, Y., Hui, P., Srinivasan, A., Kojo, M., Tarkoma, S.: Enabling energy-aware collaborative mobile data offloading for smartphones. In: 2013 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 487–495. IEEE (2013)
-
(2013)
2013 10Th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
, pp. 487-495
-
-
Ding, A.Y.1
Han, B.2
Xiao, Y.3
Hui, P.4
Srinivasan, A.5
Kojo, M.6
Tarkoma, S.7
-
9
-
-
18844454571
-
Remote timing attacks are practical
-
Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48(5), 701–716 (2005)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
10
-
-
77955305810
-
Efficient solutions of a PEPA model of a key distribution centre
-
Zhao, Y., Thomas, N.: Efficient solutions of a PEPA model of a key distribution centre. Performance Evaluation 67(8), 740–756 (2010)
-
(2010)
Performance Evaluation
, vol.67
, Issue.8
, pp. 740-756
-
-
Zhao, Y.1
Thomas, N.2
-
11
-
-
84891522105
-
Using network security index system to evaluate network security
-
In: Qi, E., Shen, J., Dou, R. (eds.), Springer, Heidelberg
-
Zhang, J.-F., Liu, F., Zheng, L.-M., Jia, Y., Zou, P.: Using network security index system to evaluate network security. In: Qi, E., Shen, J., Dou, R. (eds.) The 19th International Conference on Industrial Engineering and Engineering Management, pp. 989–1000. Springer, Heidelberg (2013)
-
(2013)
The 19Th International Conference on Industrial Engineering and Engineering Management
, pp. 989-1000
-
-
Zhang, J.-F.1
Liu, F.2
Zheng, L.-M.3
Jia, Y.4
Zou, P.5
-
12
-
-
84881309609
-
Security risk assessment of cloud carrier
-
IEEE
-
Lenkala, S.R., Shetty, S., Xiong, K.: Security risk assessment of cloud carrier. In: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 442–449. IEEE (2013)
-
(2013)
2013 13Th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid)
, pp. 442-449
-
-
Lenkala, S.R.1
Shetty, S.2
Xiong, K.3
-
13
-
-
84943777863
-
An introduction to timing attacks
-
Springer
-
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S.: An introduction to timing attacks. In: Timing Channels in Cryptography, pp. 1–11. Springer (2015)
-
(2015)
Timing Channels in Cryptography
, pp. 1-11
-
-
Rebeiro, C.1
Mukhopadhyay, D.2
Bhattacharya, S.3
-
14
-
-
79951833702
-
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
-
Köpf, B., Basin, D.: Automatically deriving information-theoretic bounds for adaptive side-channel attacks. Journal of Computer Security 19(1), 1–31 (2011)
-
(2011)
Journal of Computer Security
, vol.19
, Issue.1
, pp. 1-31
-
-
Köpf, B.1
Basin, D.2
-
15
-
-
80052996390
-
Remote timing attacks are still practical
-
In: Atluri, V., Diaz, C. (eds.), Springer, Heidelberg
-
Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355–371. Springer, Heidelberg (2011)
-
(2011)
ESORICS 2011. LNCS
, vol.6879
, pp. 355-371
-
-
Brumley, B.B.1
Tuveri, N.2
-
16
-
-
84865833121
-
A cache timing attack on AES in virtualization environments
-
Springer
-
Weiss, M., Heinz, B., Stumpf, F.: A cache timing attack on AES in virtualization environments. In: Financial Cryptography and Data Security, pp. 314–328. Springer (2012)
-
(2012)
Financial Cryptography and Data Security
, pp. 314-328
-
-
Weiss, M.1
Heinz, B.2
Stumpf, F.3
-
18
-
-
84937419268
-
Model-based quantitative security analysis of mobile offloading systems under timing attacks
-
In: Remke, A., Manini, D., Gribaudo, M. (eds.), Springer, Heidelberg
-
Meng, T., Wang, Q., Wolter, K.: Model-based quantitative security analysis of mobile offloading systems under timing attacks. In: Remke, A., Manini, D., Gribaudo, M. (eds.) ASMTA 2015. LNCS, vol. 9081, pp. 143–157. Springer, Heidelberg (2015)
-
(2015)
ASMTA 2015. LNCS
, vol.9081
, pp. 143-157
-
-
Meng, T.1
Wang, Q.2
Wolter, K.3
-
19
-
-
84884896925
-
Phase-type fitting using hyperstar
-
In: Balsamo, M.S., Knottenbelt, W.J., Marin, A. (eds.), Springer, Heidelberg
-
Reinecke, P., Krauß, T., Wolter, K.: Phase-type fitting using hyperstar. In: Balsamo, M.S., Knottenbelt, W.J., Marin, A. (eds.) EPEW 2013. LNCS, vol. 8168, pp. 164–175. Springer, Heidelberg (2013)
-
(2013)
EPEW 2013. LNCS
, vol.8168
, pp. 164-175
-
-
Reinecke, P.1
Krauß, T.2
Wolter, K.3
|