2015 IEEE Global Communications Conference (GLOBECOM) 2015
DOI: 10.1109/glocom.2015.7417575
|View full text |Cite
|
Sign up to set email alerts
|

Bring-Your-Own-Application (BYOA): Optimal Stochastic Application Migration in Mobile Cloud Computing

Abstract: Abstract-The increasing popularity of using mobile devices in a work context, has led to the need to be able to support more powerful computation. Users no longer remain in an office or at home to conduct their activities, preferring libraries and cafes. In this paper, we consider a mobile cloud computing scenario in which users bring their own mobile devices and are offered a variety of equipment, e.g., desktop computer, smart-TV, or projector, to migrate their applications to, so as to save battery life, imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The framework with ambient intelligence will be useful for information security managers to make adaptive security policies in context-aware computing environments e.g. BYOD [3], IoT [4], and 5G wireless networks [5].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The framework with ambient intelligence will be useful for information security managers to make adaptive security policies in context-aware computing environments e.g. BYOD [3], IoT [4], and 5G wireless networks [5].…”
Section: Discussionmentioning
confidence: 99%
“…Changes in such context can have impact on security postures such that security requirements and policies have to be refined [2]. For example, security policies for Bring-Your-Own-Device (BYOD) paradigm [3], Internet-of-Things (IoT) [4], and 5G networks [5] have to be adaptable to context relevant to security and other factors such as computing performance and monetary costs [6].…”
Section: Introductionmentioning
confidence: 99%