Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building increasingly …
sophisticated and capable. As a result, developers worldwide are building increasingly …
Secure ranked keyword search over encrypted cloud data
As Cloud Computing becomes prevalent, sensitive information are being increasingly
centralized into the cloud. For the protection of data privacy, sensitive data has to be …
centralized into the cloud. For the protection of data privacy, sensitive data has to be …
Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing
We propose a new elastic application model that enables seamless and transparent use of
cloud resources to augment the capability of resource-constrained mobile devices. The …
cloud resources to augment the capability of resource-constrained mobile devices. The …
Applications, architectures, and protocol design issues for mobile social networks: A survey
The mobile social network (MSN) combines techniques in social science and wireless
communications for mobile networking. The MSN can be considered as a system which …
communications for mobile networking. The MSN can be considered as a system which …
Scavenger: Transparent development of efficient cyber foraging applications
MD Kristensen - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
Cyber foraging is a pervasive computing technique where small mobile devices offload
resource intensive tasks to stronger computing machinery in the vicinity. This paper presents …
resource intensive tasks to stronger computing machinery in the vicinity. This paper presents …
Towards an elastic application model for augmenting computing capabilities of mobile platforms
We propose a new elastic application model that enables the seamless and transparent use
of cloud resources to augment the capability of resource-constrained mobile devices. The …
of cloud resources to augment the capability of resource-constrained mobile devices. The …
Context information prediction for social-based routing in opportunistic networks
HA Nguyen, S Giordano - Ad Hoc Networks, 2012 - Elsevier
Context information can be used to streamline routing decisions in opportunistic networks.
We propose a novel social context-based routing scheme that considers both the spatial and …
We propose a novel social context-based routing scheme that considers both the spatial and …
Unleashing the power of mobile cloud computing using thinkair
Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building increasingly …
sophisticated and capable. As a result, developers worldwide are building increasingly …
Content distribution and protocol design issue for mobile social networks: a survey
Mobile social network (MSN) consists of a flavor of social science and wireless
communications for mobile networking. A mode to provide communication process between …
communications for mobile networking. A mode to provide communication process between …
Scheduling and development support in the scavenger cyber foraging system
Cyber foraging is a pervasive computing technique where small mobile devices offload
resource intensive tasks to stronger computing machinery in the vicinity. One of the main …
resource intensive tasks to stronger computing machinery in the vicinity. One of the main …