A context sensitive offloading scheme for mobile cloud computing service

B Zhou, AV Dastjerdi, RN Calheiros… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
Mobile cloud computing (MCC) has drawn significant research attention as the popularity
and capability of mobile devices have been improved in recent years. In this paper, we …

[HTML][HTML] Network Resilience: Definitions, approaches, and applications

X Qi, G Mei - Journal of King Saud University-Computer and …, 2023 - Elsevier
Complex networks describe a wide range of complex systems in nature and society, and
people are increasingly interested in network science. Network resilience is a significant …

Experimental study and design of smart energy meter for the smart grid

A Arif, M Al-Hussain, N Al-Mutairi… - 2013 international …, 2013 - ieeexplore.ieee.org
The demand for energy is increasing as a result of the growth in both population and
industrial development. To improve the energy efficiency, consumers need to be more …

A new algorithm for optimization of quality of service in peer to peer wireless mesh networks

M Gheisari, J Alzubi, X Zhang, U Kose, JAM Saucedo - Wireless Networks, 2020 - Springer
Nowadays, wireless mesh networks are known as important parts of different commercial,
scientific, and industrial processes. Their prevalence increases day-by-day and the future of …

A Context Sensitive with Effective Task Migration in Mobile Cloud Computing Services

GR Babu, PV Chintalapati, PK Sree… - … on Computing and …, 2023 - ieeexplore.ieee.org
Cloud computing has gained popularity in recent years and is modernizing the internet
computer architecture. Mobile applications and gadgets are also rapidly transforming. As the …

Using blockchains to protect critical infrastructures: a comparison between ethereum and hyperledger fabric

WSM Jr, LSD Santos, LMS Bento… - … Journal of Security …, 2022 - inderscienceonline.com
The monitoring and protection of critical infrastructures, especially the ones involving
physical assets (eg, dams, nuclear energy facilities, governmental buildings), constitute a …

[PDF][PDF] Security concerns with open research issues of present computer network

G Rathee, H Saini - International Journal of …, 2016 - pfigshare-u-files.s3.amazonaws.com
Present networks are the mainstay of modern communication. The existence of networks is
enriching our society in countless different ways. Now days, wireless mesh network is …

A taxonomy and evaluation for developing 802.11‐based wireless mesh network testbeds

S Uludag, T Imboden, K Akkaya - International Journal of …, 2012 - Wiley Online Library
The definition of wireless mesh networks (WMNs) has been used in the literature to connote
and epitomize the ideal, ubiquitous, pervasive, and autonomic networking technology. An …

Strategies and metric for resilience in computer networks

RM Salles, DA Marino - The Computer Journal, 2012 - ieeexplore.ieee.org
The use of the Internet for business-critical and real-time services is growing day after day.
Random node (link) failures and targeted attacks against the network affect all types of …

Practical considerations on applications of the popularity of games: The case of location-based games and disaster

N LaLone, PO Toups Dugas, K Papangelis - International Conference on …, 2022 - Springer
In the midst of a disaster event like a hurricane, all electrical, connected objects are typically
rendered useless. A lack of connectivity, electricity, and potential mobility issues render …