-
2
-
-
85039842906
-
Efficient placement of multi-component applications in edge computing systems
-
October
-
T. Bahreini and D. Grosu. Efficient placement of multi-component applications in edge computing systems. In Proc. 2nd ACM/IEEE Symp. on Edge Computing, pages 5:1–5:11, October 2017.
-
(2017)
Proc. 2nd ACM/IEEE Symp. on Edge Computing
-
-
Bahreini, T.1
Grosu, D.2
-
3
-
-
84857355987
-
Vineyard: Virtual network embedding algorithms with coordinated node and link mapping
-
M. Chowdhury, M. R. Rahman, and R. Boutaba. Vineyard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. on Networking, 20(1):206–219, 2012.
-
(2012)
IEEE/ACM Trans. on Networking
, vol.20
, Issue.1
, pp. 206-219
-
-
Chowdhury, M.1
Rahman, M.R.2
Boutaba, R.3
-
4
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
ACM
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Proc. of the 6th Conf. on Computer Systems, pages 301–314. ACM, 2011.
-
(2011)
Proc. of The 6th Conf. on Computer Systems
, pp. 301-314
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
6
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In Proc. 8th ACM International Conf. on Mobile Systems, Applications, and Services, pages 49–62, 2010.
-
(2010)
Proc. 8th ACM International Conf. on Mobile Systems, Applications, and Services
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
7
-
-
84866707163
-
Embedding paths into trees: Vm placement to minimize congestion
-
Springer
-
D. Dutta, M. Kapralov, I. Post, and R. Shinde. Embedding paths into trees: Vm placement to minimize congestion. In European Symposium on Algorithms, pages 431–442. Springer, 2012.
-
(2012)
European Symposium on Algorithms
, pp. 431-442
-
-
Dutta, D.1
Kapralov, M.2
Post, I.3
Shinde, R.4
-
8
-
-
35448949581
-
Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords
-
March
-
B. Edelman, M. Ostrovsky, and M. Schwarz. Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. American Economic Review, 97(1):242–259, March 2007.
-
(2007)
American Economic Review
, vol.97
, Issue.1
, pp. 242-259
-
-
Edelman, B.1
Ostrovsky, M.2
Schwarz, M.3
-
9
-
-
84861147735
-
A survey of mobile cloud computing
-
X. Fan, J. Cao, and H. Mao. A survey of mobile cloud computing. zTE Communications, 9(1):4–8, 2011.
-
(2011)
zTE Communications
, vol.9
, Issue.1
, pp. 4-8
-
-
Fan, X.1
Cao, J.2
Mao, H.3
-
10
-
-
78649688336
-
Adaptive offloading inference for delivering applications in pervasive computing environments
-
X. Gu, K. Nahrstedt, A. Messer, I. Greenberg, and D. Milojicic. Adaptive offloading inference for delivering applications in pervasive computing environments. In Proc. 1st IEEE Int. Conf. on Pervasive Computing and Communications, pages 107–114, 2003.
-
(2003)
Proc. 1st IEEE Int. Conf. on Pervasive Computing and Communications
, pp. 107-114
-
-
Gu, X.1
Nahrstedt, K.2
Messer, A.3
Greenberg, I.4
Milojicic, D.5
-
12
-
-
85039158957
-
Toward hierarchical mobile edge computing: An auction-based profit maximization approach
-
A. Kiani and N. Ansari. Toward hierarchical mobile edge computing: An auction-based profit maximization approach. IEEE Internet of Things Journal, 4(6):2082–2091, 2017.
-
(2017)
IEEE Internet of Things Journal
, vol.4
, Issue.6
, pp. 2082-2091
-
-
Kiani, A.1
Ansari, N.2
-
13
-
-
80053135639
-
Mechanism design for stochastic virtual resource allocation in non-cooperative cloud systems
-
Z. Kong, C.-Z. Xu, and M. Guo. Mechanism design for stochastic virtual resource allocation in non-cooperative cloud systems. In Proc. IEEE Int. Conf. on Cloud Computing, pages 614–621, 2011.
-
(2011)
Proc. IEEE Int. Conf. on Cloud Computing
, pp. 614-621
-
-
Kong, Z.1
Xu, C.-Z.2
Guo, M.3
-
14
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar and Y.-H. Lu. Cloud computing for mobile users: Can offloading computation save energy? Computer, 43(4):51–56, 2010.
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.-H.2
-
16
-
-
84939243775
-
A PTAS mechanism for provisioning and allocation of heterogeneous cloud resources
-
L. Mashayekhy, M. M. Nejad, and D. Grosu. A PTAS mechanism for provisioning and allocation of heterogeneous cloud resources. IEEE Transactions on Parallel and Distributed Systems, 26(9):2386–2399, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.9
, pp. 2386-2399
-
-
Mashayekhy, L.1
Nejad, M.M.2
Grosu, D.3
-
17
-
-
84963768851
-
An online mechanism for resource allocation and pricing in clouds
-
L. Mashayekhy, M. M. Nejad, D. Grosu, and A. V. Vasilakos. An online mechanism for resource allocation and pricing in clouds. IEEE Transactions on Computers, 65(4):1172–1184, 2016.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.4
, pp. 1172-1184
-
-
Mashayekhy, L.1
Nejad, M.M.2
Grosu, D.3
Vasilakos, A.V.4
-
18
-
-
84926080684
-
-
Cambridge University Press, New York, NY, USA
-
N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani. Algorithmic Game Theory. Cambridge University Press, New York, NY, USA, 2007.
-
(2007)
Algorithmic Game Theory
-
-
Nisan, N.1
Roughgarden, T.2
Tardos, E.3
Vazirani, V.V.4
-
20
-
-
84939478779
-
Mobile-edge computing - Introductory technical white paper
-
European Telecommunications Standards Institute ETSI, September
-
M. Patel, B. Naughton, C. Chan, N. Sprecher, S. Abeta, A. Neal, et al. Mobile-edge computing - introductory technical white paper. European Telecommunications Standards Institute (ETSI), Mobile-edge Computing (MEC) industry initiative, September 2014.
-
(2014)
Mobile-Edge Computing (MEC) Industry Initiative
-
-
Patel, M.1
Naughton, B.2
Chan, C.3
Sprecher, N.4
Abeta, S.5
Neal, A.6
-
21
-
-
79961048093
-
Odessa: Enabling interactive perception applications on mobile devices
-
M.-R. Ra, A. Sheth, L. Mummert, P. Pillai, D. Wetherall, and R. Govin-dan. Odessa: enabling interactive perception applications on mobile devices. In Proc. 9th ACM Int. Conf. on Mobile Systems, Applications, and Services, pages 43–56, 2011.
-
(2011)
Proc. 9th ACM Int. Conf. on Mobile Systems, Applications, and Services
, pp. 43-56
-
-
Ra, M.-R.1
Sheth, A.2
Mummert, L.3
Pillai, P.4
Wetherall, D.5
Govindan, R.6
-
22
-
-
0036467861
-
Algorithm for optimal winner determination in combinatorial auctions
-
T. Sandholm. Algorithm for optimal winner determination in combinatorial auctions. Artificial intelligence, 135(1-2):1–54, 2002.
-
(2002)
Artificial Intelligence
, vol.135
, Issue.1-2
, pp. 1-54
-
-
Sandholm, T.1
-
23
-
-
84960116587
-
A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets
-
M. Satyanarayanan. A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Computing and Communications, 18(4):19–23, 2015.
-
(2015)
GetMobile: Mobile Computing and Communications
, vol.18
, Issue.4
, pp. 19-23
-
-
Satyanarayanan, M.1
-
24
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, 8(4):14–23, 2009.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
25
-
-
84987842183
-
Edge computing: Vision and challenges
-
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu. Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5):637–646, 2016.
-
(2016)
IEEE Internet of Things Journal
, vol.3
, Issue.5
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
27
-
-
85051430937
-
-
arXiv preprint
-
Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han. Edge computing resource management and pricing for mobile blockchain. arXiv preprint arXiv:1710.01567, 2017.
-
(2017)
Edge Computing Resource Management and Pricing for Mobile Blockchain
-
-
Xiong, Z.1
Feng, S.2
Niyato, D.3
Wang, P.4
Han, Z.5
-
28
-
-
84893672683
-
Combinatorial auction-based allocation of virtual machine instances in clouds
-
S. Zaman and D. Grosu. Combinatorial auction-based allocation of virtual machine instances in clouds. Journal of Parallel and Distributed Computing, 73(4):495–508, 2013.
-
(2013)
Journal of Parallel and Distributed Computing
, vol.73
, Issue.4
, pp. 495-508
-
-
Zaman, S.1
Grosu, D.2
-
29
-
-
85023175503
-
Combinational auction-based service provider selection in mobile edge computing networks
-
H. Zhang, F. Guo, H. Ji, and C. Zhu. Combinational auction-based service provider selection in mobile edge computing networks. IEEE Access, 5:13455–13464, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 13455-13464
-
-
Zhang, H.1
Guo, F.2
Ji, H.3
Zhu, C.4
-
30
-
-
84962128689
-
A framework for truthful online auctions in cloud computing with heterogeneous user demands
-
H. Zhang, H. Jiang, B. Li, F. Liu, A. V. Vasilakos, and J. Liu. A framework for truthful online auctions in cloud computing with heterogeneous user demands. IEEE Transactions on Computers, 65(3):805–818, 2016.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.3
, pp. 805-818
-
-
Zhang, H.1
Jiang, H.2
Li, B.3
Liu, F.4
Vasilakos, A.V.5
Liu, J.6
-
31
-
-
84904289472
-
Dynamic resource provisioning in cloud computing: A randomized auction approach
-
L. Zhang, Z. Li, and C. Wu. Dynamic resource provisioning in cloud computing: A randomized auction approach. In Proc. IEEE INFOCOM, pages 433–441, 2014.
-
(2014)
Proc. IEEE INFOCOM
, pp. 433-441
-
-
Zhang, L.1
Li, Z.2
Wu, C.3
-
32
-
-
84863977611
-
Incentive compatible moving target defense against vm-colocation attacks in clouds
-
Springer
-
Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang. Incentive compatible moving target defense against vm-colocation attacks in clouds. In IFIP International Information Security Conference, pages 388–399. Springer, 2012.
-
(2012)
IFIP International Information Security Conference
, pp. 388-399
-
-
Zhang, Y.1
Li, M.2
Bai, K.3
Yu, M.4
Zang, W.5
|