2011 10th IEEE/ACIS International Conference on Computer and Information Science 2011
DOI: 10.1109/icis.2011.67
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Research on Mobile Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
68
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 136 publications
(70 citation statements)
references
References 12 publications
1
68
0
1
Order By: Relevance
“…The lack of the energy significantly affects the performance and efficiency of the mobile cloud device including running applications on the cloud [35,36]. Based on the experimental results, we observed that the energy consumption of the mobile devices increased when the mobile device initiated the handover process.…”
Section: Energy Consumptionmentioning
confidence: 77%
“…The lack of the energy significantly affects the performance and efficiency of the mobile cloud device including running applications on the cloud [35,36]. Based on the experimental results, we observed that the energy consumption of the mobile devices increased when the mobile device initiated the handover process.…”
Section: Energy Consumptionmentioning
confidence: 77%
“…Furthermore, authentication plays an important role in preserving security and privacy of mobile communication especially in wide spread networks such as MCC [37,38,40]. It helps to protect shared information from unauthorized persons.…”
Section: Introductionmentioning
confidence: 99%
“…In [30], the authors present the comparison of different application models for MCC and highlight the research challenges on the subject. The authors in [31] have investigated the MCC architectures, application offloading, and context-aware services. To the best of our knowledge, there exists only a single survey [32] that discusses security issues as a part of the survey in MCC .…”
Section: Security Threats and Counter Measuresmentioning
confidence: 99%
“…As MCC is in the preliminary stages, limited surveys are available in various domains of MCC [30][31][32]. In [30], the authors present the comparison of different application models for MCC and highlight the research challenges on the subject.…”
Section: Security Threats and Counter Measuresmentioning
confidence: 99%