Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading

S Kosta, A Aucinas, P Hui, R Mortier… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building increasingly …

Secure ranked keyword search over encrypted cloud data

C Wang, N Cao, J Li, K Ren… - 2010 IEEE 30th …, 2010 - ieeexplore.ieee.org
As Cloud Computing becomes prevalent, sensitive information are being increasingly
centralized into the cloud. For the protection of data privacy, sensitive data has to be …

Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing

X Zhang, A Kunjithapatham, S Jeong… - Mobile Networks and …, 2011 - Springer
We propose a new elastic application model that enables seamless and transparent use of
cloud resources to augment the capability of resource-constrained mobile devices. The …

Applications, architectures, and protocol design issues for mobile social networks: A survey

N Kayastha, D Niyato, P Wang… - Proceedings of the …, 2011 - ieeexplore.ieee.org
The mobile social network (MSN) combines techniques in social science and wireless
communications for mobile networking. The MSN can be considered as a system which …

Scavenger: Transparent development of efficient cyber foraging applications

MD Kristensen - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
Cyber foraging is a pervasive computing technique where small mobile devices offload
resource intensive tasks to stronger computing machinery in the vicinity. This paper presents …

Towards an elastic application model for augmenting computing capabilities of mobile platforms

X Zhang, S Jeong, A Kunjithapatham… - … Conference on Mobile …, 2010 - Springer
We propose a new elastic application model that enables the seamless and transparent use
of cloud resources to augment the capability of resource-constrained mobile devices. The …

Context information prediction for social-based routing in opportunistic networks

HA Nguyen, S Giordano - Ad Hoc Networks, 2012 - Elsevier
Context information can be used to streamline routing decisions in opportunistic networks.
We propose a novel social context-based routing scheme that considers both the spatial and …

Unleashing the power of mobile cloud computing using thinkair

S Kosta, A Aucinas, P Hui, R Mortier… - arxiv preprint arxiv …, 2011 - arxiv.org
Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building increasingly …

Content distribution and protocol design issue for mobile social networks: a survey

R Akhtar, Y Shengua, Z Zhiyu, ZA Khan… - EURASIP Journal on …, 2019 - Springer
Mobile social network (MSN) consists of a flavor of social science and wireless
communications for mobile networking. A mode to provide communication process between …

Scheduling and development support in the scavenger cyber foraging system

MD Kristensen, NO Bouvin - Pervasive and Mobile Computing, 2010 - Elsevier
Cyber foraging is a pervasive computing technique where small mobile devices offload
resource intensive tasks to stronger computing machinery in the vicinity. One of the main …