{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:30:58Z","timestamp":1760189458764},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T00:00:00Z","timestamp":1455667200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s11227-016-1674-2","type":"journal-article","created":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T08:00:50Z","timestamp":1455696050000},"page":"1431-1452","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Benchmark applications used in mobile cloud computing research: a systematic mapping study"],"prefix":"10.1007","volume":"72","author":[{"given":"Francisco Airton","family":"Silva","sequence":"first","affiliation":[]},{"given":"Germano","family":"Zaicaner","sequence":"additional","affiliation":[]},{"given":"Eder","family":"Quesado","sequence":"additional","affiliation":[]},{"given":"Matheus","family":"Dornelas","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"issue":"4","key":"1674_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"key":"1674_CR2","doi-asserted-by":"crossref","unstructured":"Brasilino Leite Neto C, De Carvalho Filho P, Nobrega Duarte A (2013) A systematic mapping study on fault management in cloud computing. In: Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2013 International Conference on, pp 332\u2013337","DOI":"10.1109\/PDCAT.2013.59"},{"key":"1674_CR3","unstructured":"Budgen D, Turner M, Brereton P, Kitchenham B (2008) Using mapping studies in Software Engineering. In: Proc. of PPIG 2008, pp 195\u2013204. Lancaster University"},{"key":"1674_CR4","doi-asserted-by":"crossref","unstructured":"Cagalaban G, Kim S, Kim M (2012) A mobile device-based virtualization technique for m2m communication in cloud computing security. In: Kim T-h, Stoica A, Fang W-c, Vasilakos T, Villalba J, Arnett K, Khan M, Kang B-H, (eds) Computer Applications for Security, Control and System Engineering, vol. 339 of Communications in Computer and Information Science, pp 160\u2013167. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-35264-5_23"},{"key":"1674_CR5","doi-asserted-by":"crossref","unstructured":"Chang RS, Gao J, Gruhn V, He J, Roussos G, Tsai WT (2013) Mobile cloud computing research - issues, challenges and needs. In: Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on, pp 442\u2013453","DOI":"10.1109\/SOSE.2013.96"},{"key":"1674_CR6","doi-asserted-by":"crossref","unstructured":"Chun B-G, Ihm S, Maniatis P, Naik M, Patti A (2013) Clonecloud: Elastic execution between mobile device and cloud. In: Proc. of the Sixth Conference on Computer Systems, EuroSys \u201911, pp 301\u2013314. New York (ACM 2011)","DOI":"10.1145\/1966445.1966473"},{"key":"1674_CR7","doi-asserted-by":"crossref","unstructured":"Cidon A, London TM, Katti S, Kozyrakis C, Rosenblum M (2011) Mars: adaptive remote execution for multi-threaded mobile devices. In: Proc. of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds, MobiHeld \u201911, pp 1:1\u20131:6. New York (ACM 2011)","DOI":"10.1145\/2043106.2043107"},{"key":"1674_CR8","doi-asserted-by":"crossref","unstructured":"Colombo-Mendoza LO, Alor AG, Valencia-garc\u00eda R (2014) MobiCloUP!: a PaaS for cloud services-based mobile applications. Automated Software Engineering 21(3):391\u2013437","DOI":"10.1007\/s10515-014-0143-5"},{"key":"1674_CR9","doi-asserted-by":"crossref","unstructured":"Cuervo E, Balasubramanian A, Cho D-k, Wolman A, Saroiu S, Chandra R, Bahl P (2010) Maui: making smartphones last longer with code offload. In: Proc. of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys \u201910, pp 49\u201362. New York (ACM 2010)","DOI":"10.1145\/1814433.1814441"},{"key":"1674_CR10","unstructured":"da Silva CMR, da Silva JLC, Rodrigues RB, Nascimento LM, Garcia VC (2013) Systematic mapping study on security threats in cloud computing. CoRR. arXiv:1303.6782"},{"issue":"18","key":"1674_CR11","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mobile Comput 13(18):1587\u20131611","journal-title":"Wirel Commun Mobile Comput"},{"key":"1674_CR12","doi-asserted-by":"crossref","unstructured":"Eom H, Juste PS, Figueiredo R, Tickoo O, Illikkal R, Iyer R (2012) SNARF: a social networking-inspired accelerator remoting framework, pp 29\u201334","DOI":"10.1145\/2342509.2342516"},{"key":"1674_CR13","doi-asserted-by":"crossref","unstructured":"Eom H, Juste PS, Figueiredo R, Tickoo O, Illikkal R, Iyer R (2013) Machine learning-based runtime scheduler for mobile offloading framework. In: 2013 IEEE\/ACM 6th International Conference on Utility and Cloud Computing, pp 17\u201325","DOI":"10.1109\/UCC.2013.21"},{"key":"1674_CR14","doi-asserted-by":"crossref","unstructured":"Eom H, Juste PS, Figueiredo R, Tickoo O, Illikkal R, Iyer R (2013) OpenCL-based remote offloading framework for trusted mobile cloud computing. In: 2013 International Conference on Parallel and Distributed Systems, pp 240\u2013248","DOI":"10.1109\/ICPADS.2013.43"},{"key":"1674_CR15","doi-asserted-by":"crossref","unstructured":"Ferber M, Rauber T (2012) Mobile cloud computing in 3G cellular networks using pipelined tasks. In: Proc. of the First European Conference on Service-Oriented and Cloud Computing, ESOCC\u201912, pp 192\u2013199. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-33427-6_14"},{"key":"1674_CR16","doi-asserted-by":"crossref","unstructured":"Fernando N, Loke S, Rahayu W (2013) Honeybee: a programming framework for mobile crowd computing. In: Zheng K, Li M, Jiang H (eds) mobile and ubiquitous systems: computing, networking, and services, vol. 120 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp 224\u2013236. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-40238-8_19"},{"issue":"4","key":"1674_CR17","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1108\/17427371211283029","volume":"8","author":"H Flores","year":"2012","unstructured":"Flores H, Srirama SN, Paniagua C (2012) Towards mobile cloud applications: offloading resource-intensive tasks to hybrid clouds. Int J Pervasive Comput 8(4):344\u2013367","journal-title":"Int J Pervasive Comput"},{"key":"1674_CR18","doi-asserted-by":"crossref","unstructured":"Giurgiu I, Riva O, Alonso G (2012) From clouds to mobile devices, pp 394\u2013414","DOI":"10.1007\/978-3-642-35170-9_20"},{"key":"1674_CR19","unstructured":"Gordon MS, Jamshidi DA, Mahlke S, Mao ZM, Chen X (2012) Comet: code offload by migrating execution transparently. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201912, pp 93\u2013106. USENIX Association, Berkeley"},{"key":"1674_CR20","doi-asserted-by":"crossref","unstructured":"Guan L, Ke X, Song M, Song J (2011) A survey of research on mobile cloud computing. In: Computer and Information Science (ICIS), 2011 IEEE\/ACIS 10th Int. Conf on, pp 387\u2013392","DOI":"10.1109\/ICIS.2011.67"},{"key":"1674_CR21","doi-asserted-by":"crossref","unstructured":"Hassan M, Chen S (2012) Mobile mapreduce: minimizing response time of computing intensive mobile applications. In: Zhang J, Wilkiewicz J, Nahapetian A (eds) Mobile computing, applications, and services, vol. 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp 41\u201359. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-32320-1_4"},{"key":"1674_CR22","doi-asserted-by":"crossref","unstructured":"Hassan MA, Chen S (2012) An investigation of different computing sources for mobile application outsourcing on the road. In: Mobile wireless middleware, operating systems, and applications, pp 153\u2013166. Springer, New York","DOI":"10.1007\/978-3-642-30607-5_15"},{"key":"1674_CR23","unstructured":"Hill S (2014) Android 4.4 vs. ios 7 vs. windows phone 8: which smartphone os is best? http:\/\/www.digitaltrends.com\/mobile\/best-smartphone-os\/ . Accessed on 13 October 2014"},{"issue":"3","key":"1674_CR24","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s11276-013-0608-7","volume":"20","author":"C-C Huang","year":"2013","unstructured":"Huang C-C, Huang J-L, Tsai C-L, Wu G-Z, Chen C-M, Lee W-C (2013) Energy-efficient and cost-effective web API invocations with transfer size reduction for mobile mashup applications. Wirel Netw 20(3):361\u2013378","journal-title":"Wirel Netw"},{"key":"1674_CR25","doi-asserted-by":"crossref","unstructured":"Jain P, Kabra R, Rustagi S, Bansal T, Patel D, Raychoudhury V (2013) Mc2: On-the-fly mobile compute cloud for computational intensive task. In: Proc. of the 5th IBM Collaborative Academia Research Exchange, I-CARE \u201913, pp 7:1\u20137:4. ACM, New York","DOI":"10.1145\/2528228.2528236"},{"key":"1674_CR26","doi-asserted-by":"crossref","unstructured":"Jhingut MZ, Ghoorun IM, Nagowah SD, Moloo R, Nagowah L (2010) Design and development of 3d mobile games. In: Proceedings of the 2010 Third International Conference on Advances in Computer-Human Interactions, ACHI \u201910, pp 119\u2013124. IEEE Computer Society, Washington, DC","DOI":"10.1109\/ACHI.2010.24"},{"key":"1674_CR27","doi-asserted-by":"crossref","unstructured":"Kakadia D (2013) MECCA: mobile, efficient cloud computing workload adoption framework using scheduler customization and workload migration decisions, pp 41\u201345","DOI":"10.1145\/2492348.2492357"},{"key":"1674_CR28","doi-asserted-by":"crossref","unstructured":"Kemp R, Palmer N, Kielmann T, Bal H (2012) Cuckoo: a computation offloading framework for smartphones, p 10","DOI":"10.1007\/978-3-642-29336-8_4"},{"key":"1674_CR29","doi-asserted-by":"crossref","unstructured":"Khalaj A, Lutfiyya H (2013) Handoff between proxies in the proxy-based mobile computing system. In: 2013 International Conference on MOBILe Wireless MiddleWARE, operating systems, and applications, pp 10\u201318","DOI":"10.1109\/Mobilware.2013.15"},{"issue":"1","key":"1674_CR30","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/SURV.2013.062613.00160","volume":"16","author":"A Khan","year":"2014","unstructured":"Khan A, Othman M, Madani S, Khan S (2014) A survey of mobile cloud computing application models. Commun Surv Tutor IEEE 16(1):393\u2013413","journal-title":"Commun Surv Tutor IEEE"},{"issue":"3","key":"1674_CR31","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11227-013-0967-y","volume":"66","author":"AN Khan","year":"2013","unstructured":"Khan AN, Mat Kiah ML, Madani SA, Khan AUR, Ali M (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687\u20131706","journal-title":"J Supercomput"},{"issue":"6","key":"1674_CR32","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1016\/j.infsof.2010.12.011","volume":"53","author":"BA Kitchenham","year":"2011","unstructured":"Kitchenham BA, Budgen D, Brereton OP (2011) Using mapping studies as the basis for further research a participant-observer case study. Inf Softw Technol 53(6):638\u2013651","journal-title":"Inf Softw Technol"},{"key":"1674_CR33","doi-asserted-by":"crossref","unstructured":"Kosta S, Aucinas A, Mortier R (2012) ThinkAir: dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In: 2012 Proc. IEEE INFOCOM, pp 945\u2013953. IEEE","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"1674_CR34","doi-asserted-by":"crossref","unstructured":"Kovachev D, Yu T, Klamma R (2012) Adaptive computation offloading from mobile devices into the cloud. In: 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications, pp 784\u2013791","DOI":"10.1109\/ISPA.2012.115"},{"key":"1674_CR35","doi-asserted-by":"crossref","unstructured":"Kumar K, Liu J, Lu YH, Bhargava B (2013) A survey of computation offl.g for mobile systems. Mob Netw Appl 18(1):129\u2013140","DOI":"10.1007\/s11036-012-0368-0"},{"key":"1674_CR36","doi-asserted-by":"crossref","unstructured":"Kwon Y-W, Tilevich E (2012) Energy-efficient and fault-tolerant distributed mobile execution. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp 586\u2013595","DOI":"10.1109\/ICDCS.2012.75"},{"key":"1674_CR37","doi-asserted-by":"crossref","unstructured":"Kwon Y-W, Tilevich E (2013) Reducing the Energy Consumption of Mobile Applications Behind the Scenes. 2013 IEEE International Conference on Software Maintenance, pages 170\u2013179, Sept. 2013","DOI":"10.1109\/ICSM.2013.28"},{"key":"1674_CR38","doi-asserted-by":"crossref","unstructured":"Lim K-H, Lee B-D (2014) History-based dynamic estimation of energy consumption for mobile applications. In: 16th International Conference on Advanced Communication Technology, pp 714\u2013718","DOI":"10.1109\/ICACT.2014.6779056"},{"key":"1674_CR39","doi-asserted-by":"crossref","unstructured":"Liu Q, Jian X, Hu J, Zhao H, Zhang S (2009) An optimized solution for mobile environment using mobile cloud computing. In: Wireless communications, networking and mobile computing. WiCom \u201909. 5th International Conference on, pp 1\u20135","DOI":"10.1109\/WICOM.2009.5302240"},{"key":"1674_CR40","doi-asserted-by":"crossref","unstructured":"Montesi M, Lago P (2008) Software engineering article types: an analysis of the literature. J Syst Softw 81(10):1694\u20131714 (selected papers from the 30th Annual International Computer Software and Applications Conference (COMPSAC), Chicago, 2006)","DOI":"10.1016\/j.jss.2007.11.723"},{"key":"1674_CR41","unstructured":"Muraleedharan R (2012) Cloud-vision: real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In: Proc. of the 2012 IEEE Symposium on Computers and Communications (ISCC), ISCC \u201912, pp 59\u201366. IEEE Computer Society, Washington, DC"},{"key":"1674_CR42","doi-asserted-by":"crossref","unstructured":"Murugesan S, Venkatakrishnan B (2005) Addressing the challenges of web applications on mobile handheld devices. In: Mobile business. ICMB 2005. International Conference on, pp 199\u2013205","DOI":"10.1109\/ICMB.2005.16"},{"key":"1674_CR43","doi-asserted-by":"crossref","unstructured":"Namboodiri V, Ghose T (2012) To cloud or not to cloud: a mobile device perspective on energy consumption of applications. In: World of Wireless, Mobile and Multimedia Networks (WoWMoM), IEEE International Symposium on a, pp 1\u20139","DOI":"10.1109\/WoWMoM.2012.6263712"},{"issue":"6","key":"1674_CR44","doi-asserted-by":"crossref","first-page":"1991","DOI":"10.1109\/TWC.2012.041912.110912","volume":"11","author":"D Niyato","year":"2012","unstructured":"Niyato D (2012) A dynamic offloading algorithm for mobile computing. IEEE Trans Wirel Commun 11(6):1991\u20131995","journal-title":"IEEE Trans Wirel Commun"},{"key":"1674_CR45","doi-asserted-by":"crossref","unstructured":"Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Proc. of the 12th Conf. on Evaluation and Assessment in Software Engineering, EASE\u201908, pp 68\u201377. British Computer Society, Swinton","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"1674_CR46","unstructured":"Pu L, Xu J, Jin X, Zhang J (2013) SmartVirtCloud: virtual cloud assisted application offloading execution at mobile devices\u2019 discretion. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp 4398\u20134403"},{"key":"1674_CR47","doi-asserted-by":"crossref","unstructured":"Ra M-R, Sheth A, Mummert L, Pillai P, Wetherall D, Govindan R (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proc. of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys \u201911, pp 43\u201356. ACM, New York","DOI":"10.1145\/1999995.2000000"},{"key":"1674_CR48","doi-asserted-by":"crossref","unstructured":"Ravi A, Peddoju SK (2014) Mobility managed energy efficient Android mobile devices using cloudlet. In: Proc. of the 2014 IEEE Students\u2019 Technology Symposium, pp 402\u2013407","DOI":"10.1109\/TechSym.2014.6808085"},{"issue":"2","key":"1674_CR49","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s00607-012-0245-5","volume":"96","author":"JM Rodriguez","year":"2014","unstructured":"Rodriguez JM, Mateos C, Zunino A (2014) Energy-efficient job stealing for cpu-intensive processing in mobile devices. Computing 96(2):87\u2013117","journal-title":"Computing"},{"key":"1674_CR50","unstructured":"Saab SA, Chehab A, Kayssi A (2013) Energy efficiency in mobile cloud computing: total offloading selectively works. Does selective offloading totally work? In: 2013 4th Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC), pp 164\u2013168"},{"key":"1674_CR51","doi-asserted-by":"crossref","unstructured":"Saarinen A, Siekkinen M, Xiao Y, Nurminen JK, Kemppainen M, Hui P (2012) Can offloading save energy for popular apps? In: Proceedings of the seventh ACM international workshop on Mobility in the evolving internet architecture, pp 3\u201310. ACM","DOI":"10.1145\/2348676.2348680"},{"key":"1674_CR52","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-642-45008-2_19","volume-title":"Theory and practice of natural computing. Lecture notes in computer science","author":"O Shoukry","year":"2013","unstructured":"Shoukry O, Fayek M (2013) Evolutionary scheduling for mobile content pre-fetching. In: Dediu A-H, Martin-Vide C, Truthe B, Vega-Rodriguez M (eds) Theory and practice of natural computing. Lecture notes in computer science, vol 8273. Springer, Berlin, Heidelberg, pp 228\u2013239"},{"key":"1674_CR53","unstructured":"Silva FA, Silveira P, Garcia V, Assad R, Trinta F (2012) Accounting models for cloud computing: a systematic mapping study. In: International Conference in Grid Computing and Applications Proc. (GCA), pp 3\u20139"},{"key":"1674_CR54","doi-asserted-by":"crossref","unstructured":"Chinese\/Hong Kong border automated with biometrics (2007) Biometric technology today 15(5):3","DOI":"10.1016\/S0969-4765(07)70107-8"},{"issue":"1","key":"1674_CR55","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/SURV.2012.021312.00045","volume":"15","author":"N Vallina-Rodriguez","year":"2013","unstructured":"Vallina-Rodriguez N, Crowcroft J (2013) Energy management techniques in modern mobile handsets. Commun Surv Tutor IEEE 15(1):179\u2013198","journal-title":"Commun Surv Tutor IEEE"},{"key":"1674_CR56","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-642-17758-3_9","volume-title":"Mobile wireless middleware, operating systems, and applications","author":"T Verbelen","year":"2010","unstructured":"Verbelen T, Hens R, Stevens T, De Turck F, Dhoedt B (2010) Adaptive online deployment for resource constrained mobile smart clients. In: Cai Y, Magedanz T, Li M, Xia J, Giannelli C (eds) Mobile wireless middleware, operating systems, and applications, vol 48. Springer, Berlin, Heidelberg, pp 115\u2013128"},{"key":"1674_CR57","doi-asserted-by":"crossref","unstructured":"Verbelen T, Simoens P, De Turck F, Dhoedt B (2012) Adaptive application configuration and distribution in mobile cloudlet middleware. In: Mobile wireless middleware, operating systems, and applications, pp 178\u2013191. Springer, New York","DOI":"10.1007\/978-3-642-36660-4_13"},{"issue":"11","key":"1674_CR58","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.1016\/j.jss.2011.06.063","volume":"84","author":"T Verbelen","year":"2011","unstructured":"Verbelen T, Stevens T, Simoens P, De Turck F, Dhoedt B (2011) Dynamic deployment and quality adaptation for mobile augmented reality applications. J Syst Softw 84(11):1871\u20131882","journal-title":"J Syst Softw"},{"key":"1674_CR59","doi-asserted-by":"crossref","unstructured":"Wang X, Liu X, Huang G, Liu Y (2013) Appmobicloud: improving mobile web applications by mobile-cloud convergence. In: Proceedings of the 5th Asia-Pacific Symposium on Internetware, Internetware \u201913, pp 14:1\u201314:10. ACM, New York","DOI":"10.1145\/2532443.2532445"},{"key":"1674_CR60","doi-asserted-by":"crossref","unstructured":"Wang Y-C, Donyanavard B, Cheng K-TT (2010) Energy-aware real-time face recognition system on mobile cpu-gpu platform. In: Trends and Topics in Computer Vision, pp 411\u2013422. Springer, New York","DOI":"10.1007\/978-3-642-35740-4_32"},{"issue":"1","key":"1674_CR61","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s10796-013-9458-1","volume":"16","author":"F Xia","year":"2014","unstructured":"Xia F, Ding F, Li J, Kong X, Yang LT, Ma J (2014) Phone2cloud: exploiting computation offloading for energy saving on smartphones in mobile cloud computing. Inf Syst Front 16(1):95\u2013111","journal-title":"Inf Syst Front"},{"issue":"1","key":"1674_CR62","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s00530-013-0337-x","volume":"21","author":"F Xia","year":"2015","unstructured":"Xia F, Hsu C-H, Liu X, Liu H, Ding F, Zhang W (2015) The power of smartphones. Multimed Syst 21(1):87\u2013101","journal-title":"Multimed Syst"},{"key":"1674_CR63","doi-asserted-by":"crossref","unstructured":"Yang S, Kwon Y, Cho Y, Yi H, Kwon D, Youn J, Paek Y (2013) Fast dynamic execution offloading for efficient mobile cloud computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp 20\u201328","DOI":"10.1109\/PerCom.2013.6526710"},{"issue":"3","key":"1674_CR64","first-page":"1","volume":"57","author":"W Zhang","year":"2014","unstructured":"Zhang W, Chen L, Liu X, Lu Q, Zhang P, Yang S (2014) An OSGi-based flexible and adaptive pervasive cloud infrastructure. Sci China Inf Sci 57(3):1\u201311","journal-title":"Sci China Inf Sci"},{"issue":"3","key":"1674_CR65","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/s11036-011-0305-7","volume":"16","author":"X Zhang","year":"2011","unstructured":"Zhang X, Kunjithapatham A, Jeong S, Gibbs S (2011) Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing. Mobile Netw Appl 16(3):270\u2013284","journal-title":"Mobile Netw Appl"},{"key":"1674_CR66","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu H, Jiao L, Fu X (2012) To offload or not to offload: an efficient code partition algorithm for mobile cloud computing. In: 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), pp 80\u201386","DOI":"10.1109\/CloudNet.2012.6483660"},{"key":"1674_CR67","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: Security and Privacy (SP), 2012 IEEE Symposium on, pp 95\u2013109","DOI":"10.1109\/SP.2012.16"},{"key":"1674_CR68","doi-asserted-by":"crossref","unstructured":"Zhu H, Huang C, Yan J (2013) Vulnerability evaluation for securely offloading mobile apps in the cloud. In: 2013 IEEE 2nd Int. Conf. on Cloud Networking (CloudNet), pp 108\u2013116","DOI":"10.1109\/CloudNet.2013.6710564"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1674-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-016-1674-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1674-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T15:58:03Z","timestamp":1600185483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-016-1674-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["1674"],"URL":"https:\/\/doi.org\/10.1007\/s11227-016-1674-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,17]]}}}