{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:49:54Z","timestamp":1773762594811,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642293351","type":"print"},{"value":"9783642293368","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29336-8_4","type":"book-chapter","created":{"date-parts":[[2012,4,20]],"date-time":"2012-04-20T06:27:14Z","timestamp":1334903234000},"page":"59-79","source":"Crossref","is-referenced-by-count":193,"title":["Cuckoo: A Computation Offloading Framework for Smartphones"],"prefix":"10.1007","author":[{"given":"Roelof","family":"Kemp","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Palmer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thilo","family":"Kielmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henri","family":"Bal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Android, \n                    \n                      http:\/\/developer.android.com\/"},{"key":"4_CR2","unstructured":"iPhone OS, \n                    \n                      http:\/\/developer.apple.com\/iphone\/"},{"key":"4_CR3","unstructured":"Symbian, \n                    \n                      http:\/\/developer.symbian.org\/"},{"key":"4_CR4","unstructured":"Windows Phone 7 Series, \n                    \n                      http:\/\/www.windowsphone7.com\/"},{"key":"4_CR5","unstructured":"iPhone App Store, \n                    \n                      http:\/\/www.apple.com\/iphone\/appstore"},{"key":"4_CR6","unstructured":"Android Market, \n                    \n                      http:\/\/www.android.com\/market\/"},{"key":"4_CR7","unstructured":"Raging Thunder, \n                    \n                      http:\/\/www.polarbit.com\/our-games\/raging-thunder-2\/"},{"key":"4_CR8","unstructured":"Motorola MOTOBLUR, \n                    \n                      http:\/\/www.motorola.com\/Consumers\/US-EN\/Consumer-Product-and-Services\/MOTOBLUR\/Meet-MOTOBLUR"},{"key":"4_CR9","unstructured":"Google Maps Navigation, \n                    \n                      http:\/\/www.google.com\/mobile\/navigation\/"},{"key":"4_CR10","unstructured":"Health to Go, \n                    \n                      http:\/\/www.healthymagination.com\/"},{"key":"4_CR11","unstructured":"Data gathered from: \n                    \n                      http:\/\/www.gsmarena.com"},{"key":"4_CR12","unstructured":"iPhone 3G on Sale Tomorrow, \n                    \n                      http:\/\/www.apple.com\/pr\/library\/2008\/07\/10iphone.html"},{"key":"4_CR13","unstructured":"Steve Jobs. Thoughts on Flash, \n                    \n                      http:\/\/www.apple.com\/hotnews\/thoughts-on-flash\/"},{"key":"4_CR14","unstructured":"IEEE Standard for Information technology\u2013Telecommunications and information exchange between systems\u2013Local and metropolitan area networks\u2013Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Enhancements for Higher Throughput. IEEE Std 802.11n-2009 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, and IEEE Std 802.11w-2009), 29 (2009)"},{"key":"4_CR15","unstructured":"Bluetooth High Speed. Product Zone, Bluetooth High Speed Technology, \n                    \n                      http:\/\/bluetooth.com\/"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Kumar, K., Lu, Y.-H.: Cloud computing for mobile users. Computer\u00a099 (2010)","DOI":"10.1109\/MC.2010.89"},{"key":"4_CR17","unstructured":"Chun, B.-G., Maniatis, P.: Augmented smart phone applications through clone cloud execution. In: Proceedings of the 12th Workshop on Hot Topics in Operating Systems, HotOS XII (2009)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kemp, R., Palmer, N., Kielmann, T., Seinstra, F., Drost, N., Maassen, J., Bal, H.E.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (2009)","DOI":"10.1109\/ISM.2009.21"},{"key":"4_CR19","unstructured":"AIDL, \n                    \n                      http:\/\/developer.android.com\/guide\/developing\/tools\/aidl.html"},{"key":"4_CR20","unstructured":"Eclipse, \n                    \n                      http:\/\/www.eclipse.org\/"},{"key":"4_CR21","unstructured":"ADT Eclipse plugin, \n                    \n                      http:\/\/developer.android.com\/sdk\/eclipse-adt.html"},{"key":"4_CR22","unstructured":"AIDL, \n                    \n                      http:\/\/developer.android.com\/guide\/topics\/fundamentals.html"},{"key":"4_CR23","unstructured":"Apach Ant, \n                    \n                      http:\/\/ant.apache.org\/"},{"key":"4_CR24","unstructured":"Amazon Elastic Computing, \n                    \n                      http:\/\/aws.amazon.com\/ec2\/"},{"key":"4_CR25","unstructured":"Denso Wave\u2019s QR website, \n                    \n                      http:\/\/www.denso-wave.com\/qrcode\/index-e.html"},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/514183.514185","volume":"2","author":"R.T. Fielding","year":"2002","unstructured":"Fielding, R.T., Taylor, R.N.: Principled design of the modern web architecture. ACM Transactions on Internet Technology\u00a02(2), 115\u2013150 (2002)","journal-title":"ACM Transactions on Internet Technology"},{"issue":"7-8","key":"4_CR27","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1002\/cpe.860","volume":"17","author":"R.V. Nieuwpoort van","year":"2005","unstructured":"van Nieuwpoort, R.V., Maassen, J., Wrzesi\u0144ska, G., Hofman, R.F.H., Jacobs, C.J.H., Kielmann, T., Bal, H.E.: Ibis: a flexible and efficient Java-based Grid programming environment. Concurrency and Computation: Practice and Experience\u00a017(7-8), 1079\u20131107 (2005)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Kemp, R., Palmer, N., Kielmann, T., Bal, H.: Opportunistic Communication for Multiplayer Mobile Gaming: Lessons Learned from PhotoShoot. In: MobiOpp 2010: Proceedings of the Second International Workshop on Mobile Opportunistic Networking, pp. 182\u2013184. ACM (2010)","DOI":"10.1145\/1755743.1755780"},{"key":"4_CR29","unstructured":"Google Goggles, \n                    \n                      http:\/\/www.google.com\/mobile\/goggles\/"},{"key":"4_CR30","unstructured":"Android Developer Challenge 2, \n                    \n                      http:\/\/code.google.com\/android\/adc"},{"key":"4_CR31","unstructured":"Schneiderman, H., Kanade, T.: A Statistical Model for 3D Object Detection Applied to Faces and Cars. In: IEEE Conference on Computer Vision and Pattern Recognition. IEEE (June 2000)"},{"key":"4_CR32","unstructured":"Open Source Computer Vision library, \n                    \n                      http:\/\/opencv.willowgarage.com\/wiki\/"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M. Satyanarayanan","year":"2001","unstructured":"Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications\u00a08, 10\u201317 (2001)","journal-title":"IEEE Personal Communications"},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2008.4427231","volume":"46","author":"K. Yang","year":"2008","unstructured":"Yang, K., Ou, S., Chen, H.H.: On Effective Offloading Services for Resource-Constrained Mobile Devices Running Heavier Mobile Internet Applications. IEEE Communications\u00a046, 56\u201363 (2008)","journal-title":"IEEE Communications"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-10445-9_5","volume-title":"Middleware 2009","author":"I. Giurgiu","year":"2009","unstructured":"Giurgiu, I., Riva, O., Juric, D., Krivulev, I., Alonso, G.: Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications. In: Bacon, J.M., Cooper, B.F. (eds.) Middleware 2009. LNCS, vol.\u00a05896, pp. 83\u2013102. Springer, Heidelberg (2009)"},{"key":"4_CR36","unstructured":"Shazam website, \n                    \n                      http:\/\/www.shazam.com"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Kallonen, T., Porras, J.: Use of distributed resources in mobile environment. In: International Conference on Software in Telecommunications and Computer Networks, pp. 281\u2013285 (2006)","DOI":"10.1109\/SOFTCOM.2006.329761"},{"key":"4_CR38","unstructured":"Goyal, S., Carter, J.: A lightweight secure cyber foraging infrastructure for resource-constrained devices. In: WMCSA 2004: Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications, pp. 186\u2013195. IEEE Computer Society (2004)"},{"key":"4_CR39","unstructured":"Portokalidis, G.: Using Virtualisation to Protect Against Zero-Day Attacks. PhD thesis, Vrije Universiteit, Amsterdam, The Netherlands (February 2010)"},{"key":"4_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MPRV.2005.9","volume":"4","author":"J.A. Paradiso","year":"2005","unstructured":"Paradiso, J.A., Starner, T.: Energy scavenging for mobile and wireless electronics. IEEE Pervasive Computing\u00a04, 18\u201327 (2005)","journal-title":"IEEE Pervasive Computing"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29336-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:26:09Z","timestamp":1558401969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29336-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642293351","9783642293368"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29336-8_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}