期刊文献+

Mirroring Smartphones for Good:A Feasibility Study

Mirroring Smartphones for Good:A Feasibility Study
下载PDF
导出
摘要 An increasing number of applications and functions are being introduced.into smartphones, but smartphones have limited computation ability and battery resources. To enhance smartphone capacity, cloud computing and virtualization techniques can be used to shift the workload from smartphone to computational infrastructure. In this paper, we propose a new framework in which a mirror is kept for each smartphone on a computing infrastructure in the telecom network. With mirrors, the workload can be greatly reduced, and smartphone resources can be virtually expanded. The feasibility of deploying this framework in telecom networks is demonstrated in the protocol design, a synchronization study, and a scalability test. Two applications are introduced to show how computational workload on the smartphone and traffic in the telecom network are signiScantly reduced using our techniques. An increasing number of applications and functions are being introduced.into smartphones, but smartphones have limited computation ability and battery resources. To enhance smartphone capacity, cloud computing and virtualization techniques can be used to shift the workload from smartphone to computational infrastructure. In this paper, we propose a new framework in which a mirror is kept for each smartphone on a computing infrastructure in the telecom network. With mirrors, the workload can be greatly reduced, and smartphone resources can be virtually expanded. The feasibility of deploying this framework in telecom networks is demonstrated in the protocol design, a synchronization study, and a scalability test. Two applications are introduced to show how computational workload on the smartphone and traffic in the telecom network are signiScantly reduced using our techniques.
出处 《ZTE Communications》 2011年第1期9-14,共6页 中兴通讯技术(英文版)
关键词 MIRROR cloud computing SMARTPHONE mirror cloud computing smartphone
  • 相关文献

参考文献8

  • 1M. Satyanarayanan,P. Bahl,R. Caceres,N. Davies."The case for VM-based cloudlets in mobile computing,". IEEE Pervasive Computing . 2009
  • 2J. Oberheide,K. Veeraraghavan,E. Cooke,J. Flinn,F. Jahanian."Virtualized in-cloud security services for mobile devices,". Proc. MobiVirt 2008 .
  • 3B. Zhao,Z. Xu,C. Chi,S. Zhu,G. Cao.“Mirroring smartphones for good: A feasibility study,”. CSE Technical report .
  • 4Z. Zhu,G. Cao,S. Zhu,S. Ranjan,A. Nucci."A social network based patching scheme for worm containment in cellular networks,". Proc. INFOCOM 2009 .
  • 5B. Zhao,C. Chi,W. Gao,S. Zhu,G Cao."A chain reaction dos attack on 3G networks: Analysis and defenses,". Proc. INFOCOM 2009 .
  • 6Smobile virusguard for google android. www.smobilesystems.com .
  • 7ZHANG XINWEN,SCHIFFMAN J,GIBBS S.Securing elastic ap-plications on mobile devices for cloud computing. CCSW‘‘‘‘09:the 2009 ACM workshop on Cloud computing security workshop . 2009
  • 8CHUN B-G,MANIATIS P.Augmented smartphone applicationsthrough clone cloud execution. HotOS‘‘‘‘09:the 12th Conferenceon Hot Topics in Operating Systems . 2009

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部