Taxonomy of Computational Offloading in Mobile Devices
The ability of cloud computing to provide almost unlimited storage, backup and recovery, and quick deployment contributes to its widespread attention and implementation. Cloud computing has also become an attractive choice for mobile users as well. Due to limited features of mobile devices such as p...
| Main Authors: | Ali, Mushtaq, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Gran, Badshah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IDOSI Publication
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/16355/ http://umpir.ump.edu.my/id/eprint/16355/1/fskkp-2015-Taxonomy%20of%20Computational.pdf |
Similar Items
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Computation offloading for smart internet devices
by: Muhammad Wasif, Nabeel, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel, et al.
Published: (2015)
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
A model for power efficiency of mobile devices through lightweight method level computational offloading
by: Ali, Mushtaq
Published: (2018)
by: Ali, Mushtaq
Published: (2018)
Computation Offloading – an Effective Approach to Enhance Smartphone Capabilities
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
A lightweight process migration based computational offloading framework for mobile device augmentation / Abdullah
by: Abdullah, -
Published: (2017)
by: Abdullah, -
Published: (2017)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Energy-efficient and delay-aware offloading scheme using D2D-enabled mobile edge computing / Ramtin Ranji
by: Ramtin , Ranji
Published: (2019)
by: Ramtin , Ranji
Published: (2019)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Ergonomic Study On Input-Output Devices For Mobile Computing
by: balakrishnan, Vimala
Published: (2008)
by: balakrishnan, Vimala
Published: (2008)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
A support vector machine classification of
computational capabilities of 3D map on mobile
device for navigation aid
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Integrated vector instruction translator and offloading framework for mobile cloud computing / Junaid Shuja
by: Junaid , Shuja
Published: (2017)
by: Junaid , Shuja
Published: (2017)
Performance assessment of mobile computation offloading
by: Seifaddini, Omid, et al.
Published: (2014)
by: Seifaddini, Omid, et al.
Published: (2014)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
A model of biodiversity taxonomy database (iTaxo) for managing and analysing Kenyir landscape biodiversity data
by: Salwana, Mohamad, et al.
Published: (2020)
by: Salwana, Mohamad, et al.
Published: (2020)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Cloud based public bus location tracking and notification application for mobile devices
by: Chee, Xian Yang
Published: (2019)
by: Chee, Xian Yang
Published: (2019)
Similar Items
-
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015) -
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014) -
Computation offloading for smart internet devices
by: Muhammad Wasif, Nabeel, et al.
Published: (2015) -
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015) -
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)