{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:54:11Z","timestamp":1725897251527},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642366314"},{"type":"electronic","value":"9783642366321"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36632-1_16","type":"book-chapter","created":{"date-parts":[[2013,2,4]],"date-time":"2013-02-04T09:10:29Z","timestamp":1359969029000},"page":"274-293","source":"Crossref","is-referenced-by-count":9,"title":["A Reference Architecture for Mobile Code Offload in Hostile Environments"],"prefix":"10.1007","author":[{"given":"Soumya","family":"Simanta","sequence":"first","affiliation":[]},{"given":"Kiryong","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Grace","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Morris","sequence":"additional","affiliation":[]},{"given":"Mahadev","family":"Satyanarayanan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Frenzel, L.: Street-Ready Smart Phone Enhances First Responder Communications. Electronic Communications (2012), http:\/\/electronicdesign.com\/article\/communications\/streetready-smart-phone-enhances-responder-communications-73646"},{"key":"16_CR2","unstructured":"Kozlowski, J.: Smartphone and Tablet Apps for First Responders. EMS1.com (2012), http:\/\/www.ems1.com\/ems-products\/communications\/articles\/1129715-Smartphone-and-tablet-Apps-for-first-responders\/"},{"key":"16_CR3","unstructured":"Morris, E: A New Approach for Handheld Devices in the Military. Software Engineering Institute Blog (2011), http:\/\/blog.sei.cmu.edu\/post.cfm\/a-new-approach-for-handheld-devices-in-the-military"},{"key":"16_CR4","first-page":"1","volume-title":"Proceedings of the 15th Annual ACM Symposium on Principles of Distributed Computing","author":"M. Satyanarayanan","year":"1996","unstructured":"Satyanarayanan, M.: Fundamental Challenges in Mobile Computing. In: Proceedings of the 15th Annual ACM Symposium on Principles of Distributed Computing, pp. 1\u20137. ACM, New York (1996)"},{"key":"16_CR5","first-page":"87","volume-title":"Proceedings of the 10th ACM SIGOPS European Workshop","author":"R. Balan","year":"2002","unstructured":"Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., Yang, H.: The Case for Cyber Foraging. In: Proceedings of the 10th ACM SIGOPS European Workshop, pp. 87\u201392. ACM, New York (2002)"},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1145\/1247660.1247692","volume-title":"Proceedings of the 5th International Conference on Mobile Systems Applications and Services","author":"R. Balan","year":"2007","unstructured":"Balan, R., Gergle, D., Satyanarayanan, M., Herbsleb, J.: Simplifying Cyber Foraging for Mobile Devices. In: Proceedings of the 5th International Conference on Mobile Systems Applications and Services, pp. 272\u2013285. ACM, New York (2007)"},{"key":"16_CR7","first-page":"14","volume-title":"Proceedings of the 3rd Conference on USENIX Symposium on Internet Technologies and Systems","author":"E. Lara De","year":"2001","unstructured":"De Lara, E., Wallach, D.S., Zwaenepoel, W.: Puppeteer: Component-based Adaptation for Mobile Computing. In: Proceedings of the 3rd Conference on USENIX Symposium on Internet Technologies and Systems, p. 14. USENIX Association, Berkely (2001)"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/HOTOS.2001.990062","volume-title":"Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems","author":"J. Flinn","year":"2001","unstructured":"Flinn, J., Narayanan, D., Satyanarayanan, M.: Self-Tuned Remote Execution for Pervasive Computing. In: Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems, pp. 61\u201366. IEEE, New York (2001)"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/ICDCS.2002.1022259","volume-title":"Proceedings of the 22nd International Conference on Distributed Computing Systems","author":"J. Flinn","year":"2002","unstructured":"Flinn, J., Park, S., Satyanarayanan, M.: Balancing Performance, Energy Conservation and Application Quality in Pervasive Computing. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 217\u2013226. IEEE, New York (2002)"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/MCSA.2004.2","volume-title":"Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications","author":"S. Goyal","year":"2004","unstructured":"Goyal, S., Carter, J.: A Lightweight Secure Cyber Foraging Infrastructure for Resource-constrained Devices. In: Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications, pp. 186\u2013195. IEEE, Washington D.C (2004)"},{"key":"16_CR11","first-page":"392","volume-title":"Proceedings of the 11th IEEE International Symposium on Multimedia","author":"R. Kemp","year":"2009","unstructured":"Kemp, R., Palmer, N., Kielmann, T., Seinstra, F., Drost, N., Maassen, J., Bal, H.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: Proceedings of the 11th IEEE International Symposium on Multimedia, pp. 392\u2013399. IEEE, New York (2009)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-74573-0_43","volume-title":"Network-Based Information Systems","author":"M. Ok","year":"2007","unstructured":"Ok, M., Seo, J.-W., Park, M.-S.: A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, vol.\u00a04658, pp. 416\u2013425. Springer, Heidelberg (2007)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communications, 10\u201317 (2001)","DOI":"10.1109\/98.943998"},{"key":"16_CR14","first-page":"765","volume-title":"Proceedings of the 24th ACM SIGPLAN Conference Companion on Object-Oriented Programming Systems Languages and Applications, OOPSLA 2009","author":"J. Christensen","year":"2009","unstructured":"Christensen, J.: Using RESTful Web Services and Cloud Computing to Create Next-Generation Mobile Applications. In: Proceedings of the 24th ACM SIGPLAN Conference Companion on Object-Oriented Programming Systems Languages and Applications, OOPSLA 2009, pp. 765\u2013766. ACM, New York (2009)"},{"key":"16_CR15","first-page":"770","volume-title":"Proceedings of the 2nd International Conference on Sensor Technologies and Applications","author":"P. Leusse de","year":"2008","unstructured":"de Leusse, P., Periorellis, P., Watson, P., Maierhofer, A.: Secure and Rapid Composition of Infrastructure Services in the Cloud. In: Proceedings of the 2nd International Conference on Sensor Technologies and Applications, pp. 770\u2013775. IEEE, New York (2008)"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2010.98","volume":"43","author":"K. Kumar","year":"2010","unstructured":"Kumar, K., Lu, Y.: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? IEEE Computer\u00a043, 51\u201356 (2010)","journal-title":"IEEE Computer"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-10665-1_27","volume-title":"Cloud Computing","author":"X. Li","year":"2009","unstructured":"Li, X., Zhang, H., Zhang, Y.: Deploying Mobile Computation in Cloud Service. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol.\u00a05931, pp. 301\u2013311. Springer, Heidelberg (2009)"},{"key":"16_CR18","unstructured":"Marinelli, E.: Hyrax: Cloud Computing on Mobile Devices using MapReduce. Technical Report, Carnegie Mellon University (2009)"},{"key":"16_CR19","volume-title":"Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, article No. 17","author":"N. Palmer","year":"2009","unstructured":"Palmer, N., Kemp, R., Kielmann, T., Bal, H.: Ibis for Mobility: Solving Challenges of Mobile Computing Using Grid Techniques. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, article No. 17. ACM, New York (2009)"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/1655008.1655026","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security","author":"X. Zhang","year":"2009","unstructured":"Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing Elastic Applications on Mobile Devices for Cloud Computing. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 127\u2013134. ACM, New York (2009)"},{"key":"16_CR21","unstructured":"Dilger, D.: First Look: Using iPhone 4S with Siri Voice Assistant (with Videos). Apple Insider (2011), http:\/\/www.appleinsider.com\/articles\/11\/10\/14\/first_look_using_iphone_4s_with_siri_voice_assistant.html"},{"key":"16_CR22","unstructured":"Ha, K., Lewis, G., Simanta, S., Satyanarayanan, M.: Code Offload in Hostile Environments. Technical Report, Carnegie Mellon University (2011)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The Case for VM-Based Cloudlets in Mobile Computing. IEEE CS Pervasive Computing, 14\u201323 (2009)","DOI":"10.1109\/MPRV.2009.82"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Lehr, W., McKnight, L.: Wireless Internet Access: 3G vs. WiFi? Center for eBusiness @ MIT (2002)","DOI":"10.1016\/S0308-5961(03)00004-1"},{"key":"16_CR25","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1814433.1814441","volume-title":"Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services","author":"E. Cuervo","year":"2010","unstructured":"Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: MAUI: Making Smartphones Last Longer with Code Offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, pp. 49\u201362. ACM, New York (2010)"},{"key":"16_CR26","unstructured":"Wolbach, A.: Improving the Deployability of Diamond. Technical Report, Carnegie Mellon University (2008)"},{"issue":"1","key":"16_CR27","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/4236.656066","volume":"2","author":"T. Richardson","year":"1998","unstructured":"Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing\u00a02(1), 33\u201338 (1998)","journal-title":"IEEE Internet Computing"},{"key":"16_CR28","unstructured":"Microsoft Corporation: TCP\/IP and NBT configuration parameters for Windows XP, http:\/\/support.microsoft.com\/kb\/314053"},{"key":"16_CR29","unstructured":"xdelta.org, http:\/\/www.xdelta.org"},{"key":"16_CR30","unstructured":"7-Zip.org: LZMA SDK (Software Development Kit), http:\/\/www.7-zip.org\/sdk.html"},{"key":"16_CR31","unstructured":"OpenSSL.org: OpenSSL: The Open Source Toolkit for SSL\/TLS, http:\/\/www.openssl.org\/"},{"key":"16_CR32","unstructured":"KVM: Kernel-Based Virtual Machine, http:\/\/www.linux-kvm.org\/"},{"key":"16_CR33","unstructured":"KVM: Guest Support Status, http:\/\/www.linux-kvm.org\/page\/Guest_Support_Status"},{"key":"16_CR34","unstructured":"CherryPy: Cherry Py \u2013 A Minimalist Python Web Framework, http:\/\/www.cherrypy.org\/"},{"key":"16_CR35","unstructured":"Ubuntu: KVM\/Networking \u2013 Community Ubuntu Documentation, https:\/\/help.ubuntu.com\/community\/KVM\/Networking"},{"key":"16_CR36","unstructured":"Github: seb-m\/pyinotify\u2014Github, https:\/\/github.com\/seb-m\/pyinotify"},{"key":"16_CR37","unstructured":"Avahi.org: Avahi, http:\/\/avahi.org\/"},{"key":"16_CR38","unstructured":"Zeroconf: Zero Configuration Networking (Zeroconf), http:\/\/www.zeroconf.org"},{"key":"16_CR39","unstructured":"OpenCV: Welcome \u2013 Open CV Wiki, http:\/\/opencv.willowgarage.com\/wiki\/"},{"key":"16_CR40","unstructured":"MOPED: MOPED: Object Recognition and Pose Estimation for Manipulation, http:\/\/personalrobotics.ri.cmu.edu\/projects\/moped.php"},{"key":"16_CR41","unstructured":"SPHINX-4. Sphinx-4 \u2013 A Speech Recognizer Written Entirely in the Java Programming Language, http:\/\/cmusphinx.sourceforge.net\/sphinx4\/"},{"key":"16_CR42","unstructured":"Monsoon Solutions: Power Monitor, http:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/"},{"key":"16_CR43","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1145\/1966445.1966473","volume-title":"Proceedings of the 6th European Conference on Computer Systems","author":"B. Chun","year":"2011","unstructured":"Chun, B., Ihm, S., Maniatis, P., Naik, M., Patti, A.: CloneCloud: Elastic Execution between Mobile Device and Cloud. In: Proceedings of the 6th European Conference on Computer Systems, pp. 301\u2013314. ACM, New York (2011)"},{"key":"16_CR44","volume-title":"Proceedings of the 1st Workshop on Mobile Middleware, article no. 2","author":"M.D. Kristensen","year":"2008","unstructured":"Kristensen, M.D.: Execution Plans for Cyber Foraging. In: Proceedings of the 1st Workshop on Mobile Middleware, article no. 2. ACM, New York (2008)"},{"issue":"9","key":"16_CR45","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TPDS.2004.47","volume":"15","author":"G. Chen","year":"2004","unstructured":"Chen, G., Kang, B., Kandemir, M., Vijaykrishnan, N., Irwin, M., Chandramouli, R.: Studying Energy Trade Offs in Offloading Computation\/Compilation in Java-Enabled Mobile Devices. IEEE Transactions on Parallel and Distributed Systems\u00a015(9), 795\u2013809 (2004)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36632-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T07:00:27Z","timestamp":1644217227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36632-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642366314","9783642366321"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36632-1_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}