{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:50:17Z","timestamp":1725594617898},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219368"},{"type":"electronic","value":"9783642219375"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21937-5_34","type":"book-chapter","created":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T06:25:51Z","timestamp":1309501551000},"page":"358-367","source":"Crossref","is-referenced-by-count":0,"title":["A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment"],"prefix":"10.1007","author":[{"given":"Somayeh","family":"Kafaie","sequence":"first","affiliation":[]},{"given":"Omid","family":"Kashefi","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Sharifi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 94\u2013104 (September 1991)","DOI":"10.1038\/scientificamerican0991-94"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communicatin\u00a08 (August 2001)","DOI":"10.1109\/98.943998"},{"key":"34_CR3","unstructured":"Kolos-Mazuryk, L., et al.: Development of a Requirements Engineering Method for Pervasive Services. In: RE 2005 Doctoral Consortium, Paris,France (2005)"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Balan, R.K., et al.: Simplifying Cyber Foraging for Mobile Devices. In: 5th USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), San Juan (2007)","DOI":"10.1145\/1247660.1247692"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Flinn, J., et al.: Balancing Performance, Energy, and Quality in Pervasive Computing. In: 22nd International Conference on Distributed Computing Systems, ICDCS 2002 (2002)","DOI":"10.1109\/ICDCS.2002.1022259"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Murarasu, A.F., Magedanz, T.: Mobile Middleware Solution for Automatic Reconfiguration of Applications. In: 6th International IEEE Conference on Information Technology (2009)","DOI":"10.1109\/ITNG.2009.194"},{"key":"34_CR7","unstructured":"Chun, B.G., Maniatis, P.: Augmented Smartphone Applications through Clone Cloud Execution. In: 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita (2009)"},{"key":"34_CR8","unstructured":"Balan, R.K.: Simplifying Cyber Foraging. PhD Thesis, Carnegie Mellon University, Pittsburgh (2006)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Balan, R.K., et al.: Tactics-Based Remote Execution for Mobile Computing. In: 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273\u2013286 (2003)","DOI":"10.1145\/1066116.1066125"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Gu, X., et al.: Adaptive Offloading for Pervasive Computing. IEEE Pervasive Computing Magazine\u00a03 (July 2004)","DOI":"10.1109\/MPRV.2004.1269117"},{"key":"34_CR11","unstructured":"Ou, S., et al.: An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 2006 (2006)"},{"key":"34_CR12","unstructured":"Ou, S., et al.: An Efficient Runtime Offloading Approach for Pervasive Services. In: IEEE Wireless Communications & Networking Conference, WCNC 2006, Las Vegas (2006)"},{"key":"34_CR13","unstructured":"Song, X.: Seamless Mobility in Ubiquitous Computing Environments. PhD Thesis, Georgia Institute of Technology (2008)"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Song, X., Ramachandran, U.: MobiGo: A Middleware for Seamless Mobility. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, pp. 249\u2013256 (2007)","DOI":"10.1109\/RTCSA.2007.48"},{"key":"34_CR15","unstructured":"Kristensen, M.D.: Empowering Mobile Devices Through Cyber Foraging:The Development of Scavenger, an Open Mobile Cyber Foraging System. PhD Thesis, Department of Computer Science, Aarhus University, Denmark (2010)"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/584007.584008","volume":"2","author":"M. Othrnan","year":"1998","unstructured":"Othrnan, M., Hailes, S.: Power Conservation Strategy for Mobile Computers Using load sharing. Mobile Computing and Communications Review\u00a02, 19\u201326 (1998)","journal-title":"Mobile Computing and Communications Review"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Cuervo, E., et al.: MAUI: Making Smartphones Last Longer with Code Offload. In: ACM MobiSys, San Francisco (2010)","DOI":"10.1145\/1814433.1814441"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Kemp, R., et al.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (ISM 2009), San Diego (2009)","DOI":"10.1109\/ISM.2009.21"},{"key":"34_CR19","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MPRV.2005.88","volume":"4","author":"M. Satyanarayanan","year":"2005","unstructured":"Satyanarayanan, M.: Avoiding Dead Batteries. IEEE Pervasive Computing\u00a04, 2\u20133 (2005)","journal-title":"IEEE Pervasive Computing"},{"key":"34_CR20","unstructured":"Zhang, J., Figueiredo, R.J.: Application Classification through Monitoring and Learning of Resource Consumption Patterns. In: 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS (2006)"},{"key":"34_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1007\/978-3-540-73549-6_78","volume-title":"Ubiquitous Intelligence and Computing","author":"E. Park","year":"2007","unstructured":"Park, E., Shin, H., Kim, S.J.: Selective Grid Access for Energy-Aware Mobile Computing. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.\u00a04611, pp. 798\u2013807. Springer, Heidelberg (2007)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21937-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T12:31:00Z","timestamp":1560342660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21937-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219368","9783642219375"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21937-5_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}