3 | -- | 12 | Hong Xu, Baochun Li. A study of pricing for cloud resources |
13 | -- | 22 | Zhizhong Zhang, Chuan Wu, David Wai-Lok Cheung. A survey on cloud interoperability: taxonomies, standards, and practice |
23 | -- | 32 | Lei Yang, Jiannong Cao, Yin Yuan, Tao Li, Andy Han, Alvin T. S. Chan. A framework for partitioning and execution of data stream applications in mobile cloud computing |
33 | -- | 42 | Weina Wang, Kai Zhu, Lei Ying, Jian Tan, Li Zhang. A throughput optimal algorithm for map task scheduling in mapreduce with data locality |
43 | -- | 52 | Qun Huang, Patrick P. C. Lee. An experimental study of cascading performance interference in a virtualized environment |
53 | -- | 62 | Rahul Singh, Prashant J. Shenoy, Maitreya Natu, Vaishali P. Sadaphal, Harrick M. Vin. Analytical modeling for what-if analysis in complex cloud computing applications |
63 | -- | 72 | Jia Liu, Cathy H. Xia, Ness B. Shroff, Xiaodong Zhang 0001. On distributed computation rate optimization for deploying cloud computing programming frameworks |
73 | -- | 82 | Giuliano Casale, Mirco Tribastone. Modelling exogenous variability in cloud deployments |
84 | -- | 89 | Shah Mahmood, Yvo Desmedt. Two new economic models for privacy |
90 | -- | 95 | Luke Hutton, Tristan Henderson. An architecture for ethical and privacy-sensitive social network experiments |
96 | -- | 100 | Minaxi Gupta, Yuqing (Melanie) Wu, Swapnil S. Joshi, Aparna Tiwari, Ashish Nair, Ezhilan Ilangovan. On the linkability of complementary information from free versions of people databases |
101 | -- | 106 | Florian Tschorsch, Björn Scheuermann. How (not) to build a transport layer for anonymity overlays |