-
1
-
-
85027244079
-
Location privacy in mobile edge clouds
-
T. He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, "Location privacy in mobile edge clouds," in Proc. IEEE ICDCS, Jun. 2017, pp. 2264-2269.
-
(2017)
Proc. IEEE ICDCS, Jun.
, pp. 2264-2269
-
-
He, T.1
Ciftcioglu, E.N.2
Wang, S.3
Chan, K.S.4
-
2
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. ACM/USENIX MobiSys, 2003, pp. 31-42.
-
(2003)
Proc. ACM/USENIX MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
3
-
-
34247389249
-
A framework for location privacy in wireless networks
-
Y.-C. Hu and H. J. Wang, "A framework for location privacy in wireless networks," in Proc. ACM SIGCOMM Asia Workshop, 2005, pp. 1-8.
-
(2005)
Proc. ACM SIGCOMM Asia Workshop
, pp. 1-8
-
-
Hu, Y.-C.1
Wang, H.J.2
-
4
-
-
35449007284
-
Preserving location privacy in wireless lans
-
T. Jiang, H. J. Wang, and Y.-C. Hu, "Preserving location privacy in wireless lans," in Proc. ACM/USENIX MobiSys, 2007, pp. 246-257.
-
(2007)
Proc. ACM/USENIX MobiSys
, pp. 246-257
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
5
-
-
84942694093
-
Dynamic service migration in mobile edge-clouds
-
May
-
S. Wang, R. Urgaonkar, M. Zafer, T. He, K. Chan, and K. K. Leung, "Dynamic service migration in mobile edge-clouds," in Proc. IFIP Netw., May 2015, pp. 1-9.
-
(2015)
Proc. IFIP Netw.
, pp. 1-9
-
-
Wang, S.1
Urgaonkar, R.2
Zafer, M.3
He, T.4
Chan, K.5
Leung, K.K.6
-
6
-
-
84881192292
-
The role of cloudlets in hostile environments
-
Oct
-
M. Satyanarayanan, G. Lewis, E. Morris, S. Simanta, J. Boleng, and K. Ha, "The role of cloudlets in hostile environments," IEEE Pervasive Comput., vol. 12, no. 4, pp. 40-49, Oct. 2013.
-
(2013)
IEEE Pervasive Comput.
, vol.12
, Issue.4
, pp. 40-49
-
-
Satyanarayanan, M.1
Lewis, G.2
Morris, E.3
Simanta, S.4
Boleng, J.5
Ha, K.6
-
7
-
-
85027530145
-
Dynamic service placement for mobile micro-clouds with predicted future costs
-
Apr
-
S. Wang, R. Urgaonkar, T. He, K. Chan, M. Zafer, and K. K. Leung, "Dynamic service placement for mobile micro-clouds with predicted future costs," IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 4, pp. 1002-1016, Apr. 2017.
-
(2017)
IEEE Trans. Parallel Distrib. Syst.
, vol.28
, Issue.4
, pp. 1002-1016
-
-
Wang, S.1
Urgaonkar, R.2
He, T.3
Chan, K.4
Zafer, M.5
Leung, K.K.6
-
8
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Aug.
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., Aug. 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
9
-
-
84885604063
-
Follow me cloud: Interworking federated clouds and distributed mobile networks
-
Sep./Oct
-
T. Taleb and A. Ksentini, "Follow me cloud: Interworking federated clouds and distributed mobile networks," IEEE Netw., vol. 27, no. 5, pp. 12-19, Sep./Oct. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.5
, pp. 12-19
-
-
Taleb, T.1
Ksentini, A.2
-
10
-
-
84925871178
-
An open ecosystem for mobile-cloud convergence
-
Mar
-
M. Satyanarayanan et al., "An open ecosystem for mobile-cloud convergence," IEEE Commun. Mag., vol. 53, no. 3, pp. 63-70, Mar. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.3
, pp. 63-70
-
-
Satyanarayanan, M.1
-
11
-
-
85017618492
-
-
Feb., IBM Corp., Armonk, NY, USA, IBM White Paper WSW14201USEN
-
(Feb. 2013). "Smarter wireless networks," IBM Corp., Armonk, NY, USA, IBM White Paper WSW14201USEN. [Online]. Available: https://www-935.ibm.com/services/multimedia/Smarter-wireless-networks.pdf
-
(2013)
Smarter Wireless Networks
-
-
-
12
-
-
85010384889
-
-
Apr., Defence Res. Develop. Canada, Contract Rep. DRDC-RDDC-2014-C69
-
A. Magar. (Apr. 2014). "Assessing the use of tactical clouds to enhance warfighter effectiveness," Defence Res. Develop. Canada, Contract Rep. DRDC-RDDC-2014-C69. [Online]. Available: http://cradpdf.drdcrddc.gc.ca/PDFS/unc198/p539325-A1b.pdf
-
(2014)
Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness
-
-
Magar, A.1
-
13
-
-
84978680412
-
Adaptive VM handoff across cloudlets
-
Tech. Rep. CMU-CS-15-113, Jun.
-
K. Ha et al., "Adaptive VM handoff across cloudlets," School Comput. Sci., Tech. Rep. CMU-CS-15-113, Jun. 2015. [Online]. Available: https://www.cs.cmu.edu/~satya/docdir/CMU-CS-15-113.pdf
-
(2015)
School Comput. Sci.
-
-
Ha, K.1
-
16
-
-
85038924315
-
Open edge computing: From vision to reality
-
Berlin, Germany, Tech. Rep., Jun.
-
R. Schuster and P. Ramchandran, "Open edge computing: From vision to reality," OPNFV Des. Summit, Berlin, Germany, Tech. Rep., Jun. 2016.
-
(2016)
OPNFV Des. Summit
-
-
Schuster, R.1
Ramchandran, P.2
-
17
-
-
70450278755
-
Hiding stars with fireworks: Location privacy through camouflage
-
Sep.
-
J. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: Location privacy through camouflage," in Proc. ACM MobiCom, Sep. 2009, pp. 345-356.
-
(2009)
Proc. ACM MobiCom
, pp. 345-356
-
-
Meyerowitz, J.1
Choudhury, R.R.2
-
18
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
-
Apr
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments," Geoinformatica, vol. 15, no. 2, pp. 351-380, Apr. 2011.
-
(2011)
Geoinformatica
, vol.15
, Issue.2
, pp. 351-380
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
19
-
-
84863456257
-
Providing k-anonymity in location based services
-
Jun
-
A. Gkoulalas-Divanis, P. Kalnis, and V. S. Verykios, "Providing k-anonymity in location based services," ACM SIGKDD Explorations Newslett., vol. 12, no. 1, pp. 3-10, Jun. 2010.
-
(2010)
ACM SIGKDD Explorations Newslett.
, vol.12
, Issue.1
, pp. 3-10
-
-
Gkoulalas-Divanis, A.1
Kalnis, P.2
Verykios, V.S.3
-
20
-
-
84898925546
-
Power-aware traffic cover mode to prevent traffic analysis in wireless ad hoc networks
-
Apr.
-
S. Jiang, N. H. Vaidya, and W. Zhao, "Power-aware traffic cover mode to prevent traffic analysis in wireless ad hoc networks," in Proc. IEEE INFOCOM, Apr. 2001, pp. 1-11.
-
(2001)
Proc. IEEE INFOCOM
, pp. 1-11
-
-
Jiang, S.1
Vaidya, N.H.2
Zhao, W.3
-
21
-
-
77949574715
-
Maximum throughput of clandestine relay
-
Sep.
-
T. He, L. Tong, and A. Swami, "Maximum throughput of clandestine relay," in Proc. Allerton, Sep. 2009, pp. 1082-1089.
-
(2009)
Proc. Allerton
, pp. 1082-1089
-
-
He, T.1
Tong, L.2
Swami, A.3
-
22
-
-
84864275237
-
Fog computing: Mitigating insider data theft attacks in the cloud
-
May
-
S. J. Stolfo, M. B. Salem, and A. D. Keromytis, "Fog computing: Mitigating insider data theft attacks in the cloud," in Proc. IEEE Symp. Secur. Privacy Workshops, May 2012, pp. 125-128.
-
(2012)
Proc. IEEE Symp. Secur. Privacy Workshops
, pp. 125-128
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
23
-
-
84929908535
-
Computational decoys for cloud security
-
New York, NY, USA: Springer, Dec.
-
G. Kontaxis, M. Polychronakis, and A. D. Keromytis, "Computational decoys for cloud security," in Secure Cloud Computing. New York, NY, USA: Springer, Dec. 2013, pp. 261-270.
-
(2013)
Secure Cloud Computing
, pp. 261-270
-
-
Kontaxis, G.1
Polychronakis, M.2
Keromytis, A.D.3
-
24
-
-
84906996769
-
A Markov decision process-based service migration procedure for Follow Me cloud
-
Jun.
-
A. Ksentini, T. Taleb, and M. Chen, "A Markov decision process-based service migration procedure for Follow Me cloud," in Proc. IEEE ICC, Jun. 2014, pp. 1350-1354.
-
(2014)
Proc. IEEE ICC
, pp. 1350-1354
-
-
Ksentini, A.1
Taleb, T.2
Chen, M.3
-
25
-
-
84912525198
-
Mobility-induced service migration in mobile micro-clouds
-
Oct.
-
S. Wang, R. Urgaonkar, T. He, M. Zafer, K. Chan, and K. K. Leung, "Mobility-induced service migration in mobile micro-clouds," in Proc. IEEE MILCOM, Oct. 2014, pp. 835-840.
-
(2014)
Proc. IEEE MILCOM
, pp. 835-840
-
-
Wang, S.1
Urgaonkar, R.2
He, T.3
Zafer, M.4
Chan, K.5
Leung, K.K.6
-
27
-
-
85029783445
-
Final report from the NSF workshop on future directions in wireless networking
-
Arlington VA, USA, Tech. Rep., Nov.
-
S. Banerjee and D. O. Wu, "Final report from the NSF workshop on future directions in wireless networking," Nat. Sci. Found., Arlington VA, USA, Tech. Rep., Nov. 2013.
-
(2013)
Nat. Sci. Found.
-
-
Banerjee, S.1
Wu, D.O.2
-
28
-
-
34047144703
-
-
Providence, RI, USA: AMS
-
D. A. Levin, Y. Peres, and E. L. Wilmer, Markov Chains and Mixing Times. Providence, RI, USA: AMS, 2009.
-
(2009)
Markov Chains and Mixing Times
-
-
Levin, D.A.1
Peres, Y.2
Wilmer, E.L.3
|