共 16 条
[1]
Balan Rajesh., 2002, EW10, P87
[2]
Tactics-based remote execution for mobile computing
[J].
PROCEEDINGS OF MOBISYS 2003,
2003,
:273-286
[3]
Balancing performance, energy, and quality in pervasive computing
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:217-226
[4]
A lightweight secure cyber foraging infrastructure for resource-constrained devices
[J].
SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS,
2004,
:186-195
[5]
Hunt GC, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), P187
[6]
Kristensen Mads Daro, 2008, Journal of Networks, V3, P49, DOI 10.4304/jnw.3.3.49-56
[7]
Kristensen Mads Daro, 2008, PB587 DAIMI
[8]
Kristensen Mads Daro, 2010, PERV COMP COMM WORKS
[9]
Towards a distributed platform for resource-constrained devices
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:43-51
[10]
Structured Decomposition of Adaptive Applications
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS,
2008,
:1-+