共 50 条
- [3] A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 119 - 147
- [4] A Decision Model for Cyber-Foraging Systems [J]. 2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 51 - 60
- [5] Characterization of Cyber-Foraging Usage Contexts [J]. SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 195 - 211
- [6] Cyber-Foraging for Improving Survivability of Mobile Systems [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1421 - 1426
- [7] Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review [J]. SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 154 - 169
- [8] A Decomposition-based Architecture for Distributed Cyber-Foraging of Multiple Edge Functions [J]. 2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), 2018, : 247 - 251
- [9] Cloudlet-Based Cyber-Foraging for Mobile Systems in Resource-Constrained Edge Environments [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 412 - 415
- [10] On-Demand VM Provisioning for Cloudlet-Based Cyber-Foraging in Resource-Constrained Environments [J]. 2014 6TH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING, APPLICATIONS AND SERVICES (MOBICASE), 2014, : 116 - 124