期刊文献+

手机云计算的分析与研究 被引量:8

Analysis and Research of the Mobile Phone Cloud Computing
下载PDF
导出
摘要 近年来,云计算成为IT业界最热门的话题。IBM、Microsoft、Google和Amazon等知名企业都在大力开发和推进云计算。在介绍云计算的概念、优点及应用形式的基础上,简要分析了云计算在手机平台的应用。 In recent years, Cloud Computing has become the hottest topic in the field of IT. Many well -known enterprises such as IBM,Microsoft,Google and Amazon are developing and promoting Cloud Computing vigorously. This paper, based on introducing the concept,advantages and application form of Cloud Computing, analysed the application of Cloud Computing in the mobile phone platform briefly.
出处 《微处理机》 2010年第3期114-115,共2页 Microprocessors
关键词 云计算 手机云计算 虚拟操作系统 带宽 Cloud Computing Mobile phone Cloud Computing Web OS Bandwith
  • 相关文献

参考文献1

共引文献29

同被引文献43

  • 1刘丹,彭黎辉.空间位置服务平台的构架设计与服务接口实现[J].地球科学(中国地质大学学报),2006,31(5):733-738. 被引量:8
  • 2王鹏.走进云计算[M].北京:人民邮电出版社,2009.
  • 3王庆波,金漳等.云计算实践之道[M].北京:电子工业出版社,2011.
  • 4S. Ghemawat, H. Gobioff, S.T. Leung. The Google file system[ C ]. Proc of the 19th ACM SOSP New York. 2003.37 (5) :29 - 43.
  • 5Apache Hadoop. Hadoop Distributed File System Mailing Lists[ EB/OL]. http ://hadoop. apache, org/hdfs/mailing_lists, html ,2012 -05 -24.
  • 6J. Dean, S. Ghemawat, MapReduce :Simplified data processing on large clusters [ C ]. Sixth Symposium on Operating System De- sign and Implementation,2008,51 ( 1 ) : 107 - 113.
  • 7D. C. Giuseppe, H. Deniz,J. Madan,et at. Dynamo: Amazon highly available key -value store[ C]. Proceedings of twenty -first ACM SIGOPS symposium on Operating systems principles, 2007,41 (6) :205 -220.
  • 8M. Mowbray, S. Pearson. A Client - Based Privacy Manager for Clouding Computing[ C]. Proceedings of the Fourth Interna- tional ICST Conference on Communication System Software and Middleware,2009:1 -8.
  • 9S.H. Hung, C.S. Shih, J.P. Shieh, et al. An Online Migration Environment for Executing Mobile Applications on the Cloud [ C ]. Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2011:20 -27.
  • 10A.D. Rubin, D.E. Geer, Mobile Code Security[J]. IEEE Internet Computing,1998,2(6):30 -34.

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部