-
1
-
-
85184380711
-
-
"Harris RF-3590-RT. " [Online]. Available: http: //rf. harris. com/ capabilities/c4isr/ruggedizedtablet. Asp
-
Harris RF-3590-RT
-
-
-
2
-
-
85184366150
-
-
"MIL-STD-810G. " [Online]. Available: http: //everyspec. com/MIL-STD/ MIL-STD-0800-0899/MIL-STD-810G 12306
-
MIL-STD-810G
-
-
-
3
-
-
77955323949
-
-
DTIC Document, Tech. Rep.
-
M. T. Flynn, M. F. Pottinger, and P. D. Batchelor, "Fixing intel: A blueprint for making intelligence relevant in afghanistan, " DTIC Document, Tech. Rep., 2010.
-
(2010)
Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan
-
-
Flynn, M.T.1
Pottinger, M.F.2
Batchelor, P.D.3
-
4
-
-
77954993714
-
MAUI: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "MAUI: Making smartphones last longer with code offload, " in Proc. of ACM MobiSys, 2010, pp. 49-62.
-
(2010)
Proc. of ACM MobiSys
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
5
-
-
79955951954
-
CloneCloud: Elastic execution between mobile device and cloud
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "CloneCloud: Elastic execution between mobile device and cloud, " in Proc. of ACM EuroSys, 2011, pp. 301-314.
-
(2011)
Proc. of ACM EuroSys
, pp. 301-314
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
6
-
-
84894666247
-
A survey of mobile cloud computing application models
-
First
-
A. Khan, M. Othman, S. Madani, and S. Khan, "A survey of mobile cloud computing application models, " Communications Surveys Tutorials, IEEE, vol. 16, no. 1, pp. 393-413, First 2014.
-
(2014)
Communications Surveys Tutorials, IEEE
, vol.16
, Issue.1
, pp. 393-413
-
-
Khan, A.1
Othman, M.2
Madani, S.3
Khan, S.4
-
7
-
-
35448930755
-
Simplifying cyber foraging for mobile devices
-
R. K. Balan, D. Gergle, M. Satyanarayanan, and J. Herbsleb, "Simplifying cyber foraging for mobile devices, " in Proc. of ACM MobiSys, 2007, pp. 272-285.
-
(2007)
Proc. of ACM MobiSys
, pp. 272-285
-
-
Balan, R.K.1
Gergle, D.2
Satyanarayanan, M.3
Herbsleb, J.4
-
9
-
-
85184383876
-
Mobile crowd computing with work stealing
-
Melbourne, Australia, Sept.
-
N. Fernando, S. Loke, and W. Rahayu, "Mobile crowd computing with work stealing, " in Proc. of NBiS, Melbourne, Australia, Sept. 2012.
-
(2012)
Proc. of NBiS
-
-
Fernando, N.1
Loke, S.2
Rahayu, W.3
-
10
-
-
84949923147
-
Transient clouds: Assignment and collaborative execution of tasks on mobile devices
-
Dec.
-
T. Penner, A. Johnson, B. Van Slyke, M. Guirguis, and Q. Gu, "Transient clouds: Assignment and collaborative execution of tasks on mobile devices, " in Prof. of IEEE GLOBECOM, Dec. 2014, pp. 2801-2806.
-
(2014)
Prof. of IEEE GLOBECOM
, pp. 2801-2806
-
-
Penner, T.1
Johnson, A.2
Van Slyke, B.3
Guirguis, M.4
Gu, Q.5
-
11
-
-
84949922171
-
Extending volunteer computing through mobile ad hoc networking
-
Dec.
-
C. Funai, C. Tapparello, H. Ba, B. Karaoglu, and W. Heinzelman, "Extending volunteer computing through mobile ad hoc networking, " in Prof. of IEEE GLOBECOM, Dec. 2014, pp. 32-38.
-
(2014)
Prof. of IEEE GLOBECOM
, pp. 32-38
-
-
Funai, C.1
Tapparello, C.2
Ba, H.3
Karaoglu, B.4
Heinzelman, W.5
-
12
-
-
84863537855
-
Serendipity: Enabling remote computing among intermittently connected mobile devices
-
C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, "Serendipity: Enabling remote computing among intermittently connected mobile devices, " in Proc. of ACM MobiHoc, 2012, pp. 145-154.
-
(2012)
Proc. of ACM MobiHoc
, pp. 145-154
-
-
Shi, C.1
Lakafosis, V.2
Ammar, M.H.3
Zegura, E.W.4
-
13
-
-
39049118503
-
MaxProp: Routing for vehicle-based disruption-tolerant networks
-
Apr.
-
J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, "MaxProp: Routing for vehicle-based disruption-tolerant networks. " in Proc. of IEEE INFOCOM, Apr. 2006, pp. 1-11.
-
(2006)
Proc. of IEEE INFOCOM
, pp. 1-11
-
-
Burgess, J.1
Gallagher, B.2
Jensen, D.3
Levine, B.N.4
-
14
-
-
51249166327
-
Non-destructive testing and evaluation for structural integrity
-
B. Raj, T. Jayakumar, and B. Rao, "Non-destructive testing and evaluation for structural integrity, " Sadhana, vol. 20, no. 1, pp. 5-38, 1995.
-
(1995)
Sadhana
, vol.20
, Issue.1
, pp. 5-38
-
-
Raj, B.1
Jayakumar, T.2
Rao, B.3
-
17
-
-
85015451492
-
-
ArXiv e-prints, Dec.
-
C. Casetti, C. F. Chiasserini, L. Curto Pelle, C. Del Valle, Y. Duan, and P. Giaccone, "Content-centric routing in Wi-Fi Direct multi-group networks, " ArXiv e-prints, Dec. 2014.
-
(2014)
Content-centric Routing in Wi-Fi Direct Multi-group Networks
-
-
Casetti, C.1
Chiasserini, C.F.2
Curto Pelle, L.3
Del Valle, C.4
Duan, Y.5
Giaccone, P.6
-
18
-
-
84958023367
-
-
"Asus Nexus 7 (2013). " [Online]. Available: http: //www. Asus. com/ Tablets Mobile/Nexus 7 2013/
-
(2013)
Asus Nexus 7
-
-
-
19
-
-
0017919233
-
An augmenting path method for solving linear bottleneck assignment problems
-
D.-M. U. Derigs and U. Zimmermann, "An augmenting path method for solving linear bottleneck assignment problems, " Computing, vol. 19, no. 4, pp. 285-295, 1978.
-
(1978)
Computing
, vol.19
, Issue.4
, pp. 285-295
-
-
Derigs, D.-M.U.1
Zimmermann, U.2
-
20
-
-
0042317471
-
Weakly admissible transformations for solving algebraic assignment and transportation problems
-
Springer
-
R. E. Burkard and U. Zimmermann, "Weakly admissible transformations for solving algebraic assignment and transportation problems, " in Combinatorial Optimization. Springer, 1980, pp. 1-18.
-
(1980)
Combinatorial Optimization
, pp. 1-18
-
-
Burkard, R.E.1
Zimmermann, U.2
|