共 19 条
[1]
[Anonymous], 2007, IBM TOOLKIT MPEG 4
[2]
Balan R., 2002, 10 ACM SIGOPS EUR WO
[3]
Tactics-based remote execution for mobile computing
[J].
PROCEEDINGS OF MOBISYS 2003,
2003,
:273-286
[5]
Chiba S, 2003, LECT NOTES COMPUT SC, V2830, P364
[6]
Balancing performance, energy, and quality in pervasive computing
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:217-226
[7]
Garey MR, 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[8]
A lightweight secure cyber foraging infrastructure for resource-constrained devices
[J].
SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS,
2004,
:186-195
[9]
Gu XH, 2004, IEEE PERVAS COMPUT, V3, P66, DOI 10.1109/MPRV.2004.1321031
[10]
Adaptive offloading inference for delivering applications in pervasive computing environments
[J].
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003),
2003,
:107-114