Abstract is missing.
- Computational Offloading or Data Binding? Bridging the Cloud Infrastructure to the Proximity of the Mobile UserHuber Flores, Satish Narayana Srirama, Rajkumar Buyya. 10-18 [doi]
- A Taxonomy of Computation Offloading in Mobile Cloud ComputingNur Idawati Md Enzai, Maolin Tang. 19-28 [doi]
- Imprecise Computation Over the CloudChi-Sheng Shih, Joen Chen, Yu-Hsin Wang, Norman Chang. 29-37 [doi]
- ECC: Edge Cloud CompositesKetan Bhardwaj, Sreenidhy Sreepathy, Ada Gavrilovska, Karsten Schwan. 38-47 [doi]
- Using Mobile Cloud Computing for Real-Time Online ApplicationsDominik Meiländer, Frank Glinka, Sergei Gorlatch, Li Lin, Wei Zhang, Xiaofei Liao. 48-56 [doi]
- NERD - No Effort Rapid Development: A Framework for Provisioning Mobile Cloud Industrial Control ApplicationsThaddeus Czauski, Hamilton A. Turner, Jules White, Sean Eade. 57-66 [doi]
- Modeling and Analysis of Mobile Cloud Computing Based on Bigraph TheoryLian Yu, Wei-Tek Tsai, Xin Wei, Jerry Zeyu Gao, Thomas T. Hildebrandt, Xiao Qun Guo. 67-76 [doi]
- Mobile Cloud Computing for Providing Complex Mobile Web ServicesFeda AlShahwan, Maha Faisal. 77-84 [doi]
- AppACTS: Mobile App Automated Compatibility Testing ServiceJun-fei Huang. 85-90 [doi]
- Mobile-Based Medical Data Accessibility in mHealthRichard K. Lomotey, Ralph Deters. 91-100 [doi]
- Connecting a Pedelec to the Cloud as Basis for Gamification in Multi Modal Mobility PlanningThomas Ritz, Cesar Izquierdo Tello, Sebastian Damm. 101-108 [doi]
- Supporting Context-Aware Cloud-Based Media Recommendations for SmartphonesAbayomi Moradeyo Otebolaku, Maria Teresa Andrade. 109-116 [doi]
- MyActivity: Cloud-Hosted Continuous Activity Recognition Using Ontology-Based Stream ReasoningAmin Bakhshandehabkenar, Seng W. Loke. 117-126 [doi]
- Jovaku: Globally Distributed Caching for Cloud Database Services Using DNSRobert Pettersen, Steffen Viken Valvåg, Åge Kvalnes, Dag Johansen. 127-135 [doi]
- A Multi-token Authorization Strategy for Secure Mobile Cloud ComputingAzeem Ahmad, Muhammad Mustafa Hassan, Abdul Aziz. 136-141 [doi]
- A Two-Layered Permission-Based Android Malware Detection SchemeXing Liu, Jiqiang Liu. 142-148 [doi]
- Information Aggregation for Collaborative Sensing in Mobile Cloud ComputingRadhika Loomba, Lei Shi, Brendan Jennings, Roy Friedman, John Kennedy, Joe Butler. 149-158 [doi]
- A Virtualized, Programmable Content Delivery NetworkHonguk Woo, Sungwon Han, Eunho Heo, Jaehong Kim, Sangho Shin. 159-168 [doi]
- Adaptive Provisioning of Connectivity-as-a-Service for Mobile Cloud ComputingInes Ayadi, Noemie Simoni. 169-175 [doi]
- Location Matters: Optimal Data Placement in Mobile Telecom CloudSeyed Yahya Vaezpour, Kui Wu, Gholamali C. Shoja. 176-185 [doi]
- Efficient Transmission of Smartphone Application Traffic in Wireless Access NetworksHans Joachim Einsiedler, Nico Bayer, Kay Haensge, Roman Szczepanski, Martin Kurze, Thorsten Rettig, Francisco González Garcia, Andreas Roos, Stephan Berg, Jose Ignacio Moreno. 186-193 [doi]
- Cognitive Data Routing in Heterogeneous Mobile Cloud NetworksLaith Al-Saeed, Maozhen Li, Hamed S. Al-Raweshidy. 194-199 [doi]
- Addressing the Challenges of HTTP-Based Mobile/Cloud InteractionJules White, Yao Pan, Zach McCormick. 200-209 [doi]
- Global-Scale Event Dissemination on Mobile Social Channeling PlatformRankyung Hong, Sangho Shin, Young Yoon, Atul Laxmankatole, Honguk Woo. 210-219 [doi]
- A Cloud-Based Mobile Data Analytics Framework: Case Study of Activity Recognition Using SmartphoneBingchuan Yuan, John Herbert. 220-227 [doi]
- Exploiting User Interest in Data-Driven Cloud-Based Mobile OptimizationJohn Kolb, William Myott, Thao Nguyen, Abhishek Chandra, Jon B. Weissman. 228-235 [doi]
- A Cloud-Based Transcoding Framework for Real-Time Mobile Video Conferencing SystemRui Cheng, Wenjun Wu 0001, Yihua Lou, Yongquan Chen. 236-245 [doi]
- Cloud Offloading Method for Web ApplicationsInchul Hwang, Jonggyu Ham. 246-247 [doi]
- Semi-Automatic 2D to 3D Video Conversion Based on Relative Velocity EstimationTsung-Han Tsai, Chen-Shuo Fan. 248-249 [doi]
- Modeling and Composition of Environment-as-a-ServiceTao Peng, Chi-Hung Chi, Annamaria Chiasera, Giampaolo Armellin, Marco Ronchetti, Cristina Matteotti. 250-251 [doi]
- A Review and Research Towards Mobile Cloud ComputingDipayan Dev, Krishna Lal Baishnab. 252-256 [doi]
- AegeanBoard: An Interactive Whiteboard Messenger for iPadFan Zhang, Hongliang Yu. 257-258 [doi]
- Trusted Execution Environments: A Look under the HoodGhada Arfaoui, Said Gharout, Jacques Traoré. 259-266 [doi]
- Cloudlets Authentication in NFC-Based Mobile ComputingSamia Bouzefrane, Amira F. Benkara Mostefa, Fatiha Houacine, Herve Cagnon. 267-272 [doi]
- Mobile Authentication Secure against Man-in-the-Middle AttacksKemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier. 273-276 [doi]
- SecBus, a Software/Hardware Architecture for Securing External MemoriesJeremie Brunel, Renaud Pacalet, Salaheddine Ouaarab, Guillaume Duc. 277-282 [doi]
- Explaining the Role of Trust in Cloud Service AcquisitionJoseph K. Adjei. 283-288 [doi]
- A Secure Cloud Computing Architecture DesignAbir Khaldi, Kamel Karoui, Nada Tanabene, Henda Ben Ghzela. 289-294 [doi]
- Analysis of the Impact of Cloud Computing Technology to E-government Performance EvaluationHongxia Zhang. 295-298 [doi]