{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:38Z","timestamp":1773950678604,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T00:00:00Z","timestamp":1407715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,11]]},"DOI":"10.1145\/2632951.2632958","type":"proceedings-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:39Z","timestamp":1406924019000},"page":"287-296","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":134,"title":["COSMOS"],"prefix":"10.1145","author":[{"given":"Cong","family":"Shi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Karim","family":"Habak","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Pranesh","family":"Pandurangan","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Mostafa","family":"Ammar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Mayur","family":"Naik","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Ellen","family":"Zegura","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon ec2 api tools. http:\/\/aws.amazon.com\/developertools\/351.  Amazon ec2 api tools. http:\/\/aws.amazon.com\/developertools\/351."},{"key":"e_1_3_2_1_2_1","unstructured":"Android-x86. http:\/\/www.android-x86.org\/.  Android-x86. http:\/\/www.android-x86.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Droidfish. http:\/\/web.comhem.se\/petero2home\/droidfish.  Droidfish. http:\/\/web.comhem.se\/petero2home\/droidfish."},{"key":"e_1_3_2_1_4_1","volume-title":"anonymized access logs. ftp:\/\/ftp.ircache.net\/Traces\/","author":"National laboratory for applied network research.","year":"2007","unstructured":"National laboratory for applied network research. anonymized access logs. ftp:\/\/ftp.ircache.net\/Traces\/ , 2007 . National laboratory for applied network research. anonymized access logs. ftp:\/\/ftp.ircache.net\/Traces\/, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133390"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247692"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1066125"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814456"},{"key":"e_1_3_2_1_9_1","volume-title":"Corporate finance","author":"Berk J.","year":"2007","unstructured":"J. Berk and P. DeMarzo . Corporate finance . Addison-Wesley , 2007 . J. Berk and P. DeMarzo. Corporate finance. Addison-Wesley, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879180"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00447ED1V01Y201209MPC010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382553.2382556"},{"key":"e_1_3_2_1_15_1","first-page":"93","volume-title":"USENIX OSDI","author":"Gordon M. S.","year":"2012","unstructured":"M. S. Gordon , D. A. Jamshidi , S. Mahlke , Z. M. Mao , and X. Chen . COMET: code offload by migrating execution transparently . In USENIX OSDI , pages 93 -- 106 , 2012 . M. S. Gordon, D. A. Jamshidi, S. Mahlke, Z. M. Mao, and X. Chen. COMET: code offload by migrating execution transparently. In USENIX OSDI, pages 93--106, 2012."},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE PERCOM","author":"Gu X.","year":"2003","unstructured":"X. Gu , K. Nahrstedt , A. Messer , I. Greenberg , and D. Milojicic . Adaptive offloading inference for delivering applications in pervasive computing environments . In IEEE PERCOM , 2003 . X. Gu, K. Nahrstedt, A. Messer, I. Greenberg, and D. Milojicic. Adaptive offloading inference for delivering applications in pervasive computing environments. In IEEE PERCOM, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464451"},{"key":"e_1_3_2_1_18_1","first-page":"2006","volume-title":"IEEE ICASSP","volume":"1","author":"Huggins-Daines D.","unstructured":"D. Huggins-Daines , M. Kumar , A. Chan , A. Black , M. Ravishankar , and A. Rudnicky . Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices . In IEEE ICASSP , volume 1 , pages I--I, 2006 . D. Huggins-Daines, M. Kumar, A. Chan, A. Black, M. Ravishankar, and A. Rudnicky. Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices. In IEEE ICASSP, volume 1, pages I--I, 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100036094"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"e_1_3_2_1_21_1","volume-title":"5th USENIX Workshop on Hot Topics in Cloud Computing","author":"Kosta S.","year":"2013","unstructured":"S. Kosta , V. Perta , J. Stefa , P. Hui , and A. Mei . Clone2Clone (C2C): Peer to Peer Networking of Smartphones on the Cloud . In 5th USENIX Workshop on Hot Topics in Cloud Computing , San Jose, CA, jun 2013 . S. Kosta, V. Perta, J. Stefa, P. Hui, and A. Mei. Clone2Clone (C2C): Peer to Peer Networking of Smartphones on the Cloud. In 5th USENIX Workshop on Hot Topics in Cloud Computing, San Jose, CA, jun 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX ATC","author":"Kwon Y.","year":"2013","unstructured":"Y. Kwon , S. Lee , H. Yi , D. Kwon , S. Yang , B.-G. Chun , L. Huang , P. Maniatis , M. Naik , and Y. Paek . Mantis: Automatic performance prediction for smartphone applications . In USENIX ATC , 2013 . Y. Kwon, S. Lee, H. Yi, D. Kwon, S. Yang, B.-G. Chun, L. Huang, P. Maniatis, M. Naik, and Y. Paek. Mantis: Automatic performance prediction for smartphone applications. In USENIX ATC, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/343647.343688"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298351"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409952"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342515"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248394"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1342171.1342172"}],"event":{"name":"MobiHoc'14: The Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Philadelphia Pennsylvania USA","acronym":"MobiHoc'14","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632951.2632958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:08Z","timestamp":1750230068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632958"}},"subtitle":["computation offloading as a service for mobile devices"],"short-title":[],"issued":{"date-parts":[[2014,8,11]]},"references-count":30,"alternative-id":["10.1145\/2632951.2632958","10.1145\/2632951"],"URL":"https:\/\/doi.org\/10.1145\/2632951.2632958","relation":{},"subject":[],"published":{"date-parts":[[2014,8,11]]},"assertion":[{"value":"2014-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}