期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Invited Paper: The Audacity of Fiber-Wireless(FiWi) Networks: Revisited for Clouds and Cloudlets 被引量:5
1
作者 Martin Maier Bhaskar Prasad Rimal 《China Communications》 SCIE CSCD 2015年第8期33-45,共13页
There is a growing awareness among industry players of reaping the benefits of mobile-cloud convergence by extending today's unmodified cloud to a decentralized two-level cloud-cloudlet architecture based on emerg... There is a growing awareness among industry players of reaping the benefits of mobile-cloud convergence by extending today's unmodified cloud to a decentralized two-level cloud-cloudlet architecture based on emerging mobile-edge computing(MEC) capabilities. In light of future 5G mobile networks moving toward decentralization based on cloudlets, intelligent base stations, and MEC, the inherent distributed processing and storage capabilities of radio-and-fiber(R&F) networks may be exploited for new applications, e.g., cognitive assistance, augmented reality, or cloud robotics. In this paper, we first revisit fiber-wireless(Fi Wi) networks in the context of conventional clouds and emerging cloudlets, thereby highlighting the limitations of conventional radio-overfiber(Ro F) networks such as China Mobile's centralized cloud radio access network(C-RAN) to meet the aforementioned trends. Furthermore, we pay close attention to the specific design challenges of data center networks and revisit our switchless arrayedwaveguide grating(AWG) based network with efficient support of east-west flows and enhanced scalability. 展开更多
关键词 CLOUDLET computation offloading east-west flows intelligent base station mobile-cloud convergence mobile dataoffloading mobile-edge computing (MEC) SCALABILITY
下载PDF
SplitPass: A Mutually Distrusting Two-Party Password Manager 被引量:1
2
作者 Yu-Tao Liu Dong Du +3 位作者 Yu-Bin Xia Hai-Bo Chen Bin-Yu Zang Zhenkai Liang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第1期98-115,共18页
Using a password manager is known to be more convenient and secure than not using one, on the assmnption that the password manager itself is safe. However recent studies show that most popular password managers have s... Using a password manager is known to be more convenient and secure than not using one, on the assmnption that the password manager itself is safe. However recent studies show that most popular password managers have security vulnerabilities that may be fooled to leak passwords without users' awareness. In this paper, we propose a new password manager, SplitPass, which vertically separates both the storage and access of passwords into two mutually distrusting parties. During login, all the parties will collaborate to send their password shares to the web server, but none of these parties will ever have the complete password, which significantly raises the bar of a successful attack to compromise all of tile parties. To retain transparency to existing applications and web servers, SplitPass seamlessly splits the secure sockets layer (SSL) and transport layer security (TCP) sessions to process on all parties, and makes the joining of two password shares transparent to the web servers. We have implemented SplitPass using an Android phone and a cloud assistant and evaluated it using 100 apps from top free apps in the Android official market. The evaluation shows that SplitPass securely protects users' passwords, while incurring little performance overhead and power consumption. 展开更多
关键词 password manager privacy protection mobile-cloud system
原文传递
Evaluation of Remote-I/O Support for a DSM-Based Computation Offloading Scheme
3
作者 Yuhun Jun Jaemin Lee Euiseong Seo 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第5期957-973,共17页
Computation offloading enables mobile devices to execute rich applications by using the abundant computing resources of powerful server systems. The distributed shared memory based (DSM-based) computation offloading a... Computation offloading enables mobile devices to execute rich applications by using the abundant computing resources of powerful server systems. The distributed shared memory based (DSM-based) computation offloading approach is expected to be especially popular in the near future because it can dynamically migrate running threads to computing nodes and does not require any modifications of existing applications to do so. The current DSM-based computation offloading scheme, however, has focused on efficiently offloading computationally intensive applications and has not considered the significant performance degradation caused by processing the I/O requests issued by offloaded threads. Because most mobile applications are interactive and thus yield frequent I/O requests, efficient handling of I/O operations is critically important. In this paper, we quantitatively analyze the performance degradation caused by I/O processing in DSM-based computation offloading schemes using representative commodity applications. To remedy the performance degradation, we apply a remote I/O scheme based on remote device support to computation offloading. The proposed approach improves the execution time by up to 43.6% and saves up to 17.7% of energy consumption in comparison with the existing offloading schemes. Selective compression of the remote I/O scheme reduces the network traffic by up to 53.5%. 展开更多
关键词 computation offloading mobile-cloud computing distributed shared memory (DSM) mobile computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部