The Role of Cloudlets in Hostile Environments
Top Cited Papers
- 28 October 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Pervasive Computing
- Vol. 12 (4), 40-49
- https://doi.org/10.1109/mprv.2013.77
Abstract
The convergence of mobile computing and cloud computing is predicated on a reliable, high-bandwidth end-to-end network. This basic requirement is hard to guarantee in hostile environments such as military operations and disaster recovery. In this article, the authors examine how VM-based cloudlets that are located in close proximity to associated mobile devices can overcome this challenge. This article is part of a special issue on the edge of the cloud.Keywords
This publication has 10 references indexed in Scilit:
- Just-in-time provisioning for cyber foragingPublished by Association for Computing Machinery (ACM) ,2013
- Lowering the barriers to large-scale mobile crowdsensingPublished by Association for Computing Machinery (ACM) ,2013
- Cyber ForagingPublished by Springer Nature ,2012
- The Case for VM-Based Cloudlets in Mobile ComputingIEEE Pervasive Computing, 2009
- Cyber ThreatsPublished by Oxford University Press (OUP) ,2009
- The evolution of Army wearable computersIEEE Pervasive Computing, 2002
- The evolution of CodaACM Transactions on Computer Systems, 2002
- Disconnected operation in the Coda File SystemACM Transactions on Computer Systems, 1992
- Andrew: a distributed personal computing environmentCommunications of the ACM, 1986
- The ITC distributed file systemPublished by Association for Computing Machinery (ACM) ,1985