Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Mobile Networks and Applications
ACM Press
 
   
 
Options:
 
  1-10 of 59 reviews Date Reviewed 
  Securing and self recovery of virtual machines in cloud with an autonomic approach using snapshots
Joseph L., Mukesh R. Mobile Networks and Applications 24(4): 1240-1248, 2019.  Type: Article

Virtual machines (VMs) in the form of cloud computing are now mainstream for the delivery of information technology (IT) services. However, the environment in which these VMs run is complex and prone to malicious attack, potentially im...

Jun 17 2021
  Forward delay-based packet scheduling algorithm for multipath TCP
Le T., Bui L. Mobile Networks and Applications 23(1): 4-12, 2018.  Type: Article

Multipath TCP (MPTCP) allows packets to be transmitted over multiple paths, “and hence utilizes the network resources more effectively than the traditional single-path [transmission control protocol, TCP].” However,...

Jun 8 2018
  Optimizing detection quality and transmission quality of barrier coverage in heterogeneous wireless sensor networks
Lai Y., Jiang J. Mobile Networks and Applications 22(5): 959-969, 2017.  Type: Article

Invariably all progress is made because we, as the saying goes, are able to see further standing on the shoulders of giants. Yet this is the first time I have seen a paper with such refreshing homage to that adage. The problem space th...

Apr 3 2018
  ADC: an adaptive data collection protocol with free addressing and dynamic duty-cycling for sensor networks
Tong F., Pan J. Mobile Networks and Applications 22(5): 983-994, 2017.  Type: Article

Wireless sensor networks (WSNs) constitute a set of tiny electronic devices, powered by batteries with limited sensing, computation, and communications capabilities. These limitations cause the cross-layer energy efficiency optimizatio...

Apr 2 2018
  Energy-efficient context aware power management with asynchronous protocol for body sensor network
Magno M., Polonelli T., Casamassima F., Gomez A., Farella E., Benini L. Mobile Networks and Applications 22(5): 814-824, 2017.  Type: Article

Magno et al. address a challenging issue of wearable devices for fitness and health tracking: low-power resources and wireless communication. The lifetime of these devices is limited by the small energy storage components that supply t...

Dec 21 2017
  Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications 22(5): 848-858, 2017.  Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest t...

Nov 29 2017
  Performance estimation of fault-prone infrastructure-as-a-service cloud computing systems and their cost-aware optimal performance determination
Guo K., Yu K., Yang D., Wu L., Wang Y. Mobile Networks and Applications 22(4): 662-673, 2017.  Type: Article

Cloud computing has gradually spread throughout the global computing environment; speed, reliability, quality of service, security, and standardization of services are the main issues in its ecosystem. To evaluate the performance of th...

Oct 18 2017
  Cost-effective service provisioning for hybrid cloud applications
Liu F., Luo B., Niu Y. Mobile Networks and Applications 22(2): 153-160, 2017.  Type: Article

Making automatic, optimal workload placements in a multi-cloud, hybrid-cloud information technology (IT) infrastructure is an important problem that concerns DevOps. Here is one specific solution to the use case of social networking se...

Jun 12 2017
  Software-defined mobile networks security
Chen M., Qian Y., Mao S., Tang W., Yang X. Mobile Networks and Applications 21(5): 729-743, 2016.  Type: Article

The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service (QoS), and user satisfaction. It is therefore very important to address these challenges and provide cost-...

May 12 2017
  Quality of protection in cloud-assisted cognitive machine-to-machine communications for industrial systems
Jiang L., Tian H., Shen J., Maharjan S., Zhang Y. Mobile Networks and Applications 21(6): 1032-1042, 2016.  Type: Article

Cloud computing and connected devices are opening new research areas in multiple fields including mobile communications and health sciences, among others. As we connect to the Internet more, there is an increasing chance of our data be...

May 5 2017
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy