Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Distributed Systems (C.2.4) > Distributed Applications (C.2.4...)  
  1-10 of 305 Reviews about "Distributed Applications (C.2.4...)": Date Reviewed
  State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing
Díaz M., Martín C., Rubio B.  Journal of Network and Computer Applications 67(C): 99-117, 2016. Type: Article

Rightfully, the practical question of integrating a myriad of (small, low-power) Internet of Things (IoT) devices with (large, scalable, but remote) cloud computing facilities is being addressed by many researchers....

May 10 2017
  A gap analysis of Internet-of-Things platforms
Mineraud J., Mazhelis O., Su X., Tarkoma S.  Computer Communications 89(C): 5-16, 2016. Type: Article

Connecting the plethora of potential sensors and devices of the Internet of Things (IoT) and hosting suitable IoT applications are commonly supported by so-called (IoT) platforms, pre-integrated sets of technical and software (foremost middleware)...

May 5 2017
  An architecture to implement the Internet-of-Things using the Prometheus methodology
Manaţe B., Fortiş F., Moore P.  International Journal of Distributed Systems and Technologies 6(4): 1-20, 2015. Type: Article

The Prometheus methodology is a set of detailed processes of specifying, designing, implementing, and testing agent-oriented software systems. An agent-oriented system consists of multiple agents, each of which has characteristics of autonomy and ...

Oct 11 2016
  The Internet of Things: a survey
Li S., Xu L., Zhao S.  Information Systems Frontiers 17(2): 243-259, 2015. Type: Article

Undisputedly, the Internet of Things (IoT), extending the classic computer-bound Internet to the physical world and all the “things” contained therein, will be a really big thing. Equally unanimously, connecting and communicating with ...

Oct 11 2016
  Wireless routing and control: a cyber-physical case study
Li B., Ma Y., Westenbroek T., Wu C., Gonzalez H., Lu C.  ICCPS 2016 (Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria,  Apr 11-14, 2016) 1-10, 2016. Type: Proceedings

Utilization of wireless sensor networks at automated industrial processing plants, not only for monitoring aspects but also for actuator ones, opens a new horizon for their deployment. In this platform, sensing components, control adapters, and ac...

Oct 6 2016
  Declarative framework for specification, simulation and analysis of distributed applications
Ma J., Le F., Russo A., Lobo J.  IEEE Transactions on Knowledge and Data Engineering 28(6): 1489-1502, 2016. Type: Article

Distributed applications are normally overlaid on a network of computing elements (nodes). Their specification requires the declaration of each task and role of each node over a period of time, along with protocols and services. The authors assert...

Sep 23 2016
  A reference architecture for real-time microservice API consumption
Gadea C., Trifan M., Ionescu D., Ionescu B.  CrossCloud 2016 (Proceedings of the 3rd Workshop on CrossCloud Infrastructures & Platforms, London, UK,  Apr 18-21, 2016) 1-6, 2016. Type: Proceedings

Are you a software practitioner or architect looking for a specific case study in building a contemporary Internet service using a microservices architecture? You will find this short conference presentation by Cristian Gadea et al. relevant. The ...

May 26 2016
  A context awareness framework for cross-platform distributed applications
Ntanos C., Botsikas C., Rovis G., Kakavas P., Askounis D.  Journal of Systems and Software 88138-146, 2014. Type: Article

The term “context awareness” can have different meanings for different people, or be used in different ways. For instance, in the domain of smartphones, some may say that applications using location and wireless connectivity informatio...

Jun 15 2015
  Optimal predictive code offloading
Berg F., Dürr F., Rothermel K.  MOBIQUITOUS 2014 (Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, London, UK,  Dec 2-5, 2014) 1-10, 2014. Type: Proceedings

A system that is used to offload computing from a mobile device to the cloud is presented in this paper. Presumably, this system can dramatically reduce battery usage and also increase computing performance, since cloud servers have a lot more pro...

Feb 4 2015
   In-cloud malware analysis and detection: state of the art
Alam S., Sogukpinar I., Traore I., Coady Y.  SIN 2014 (Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK,  Sep 9-11, 2014) 473-478, 2014. Type: Proceedings

Among the many “as a service” functions of the cloud, one of the least explored is the use of the cloud’s computational power to detect malware. This paper discusses the state of the art of this service. The survey analyzes only ...

Jan 27 2015
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy