You are previewing Enabling Real-Time Mobile Cloud Computing through Emerging Technologies.
O'Reilly logo
Enabling Real-Time Mobile Cloud Computing through Emerging Technologies

Book Description

Today’s smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Preface
  7. Acknowledgment
  8. Chapter 1: Conceptualizing a Real-Time Remote Cardiac Health Monitoring System
    1. ABSTRACT
    2. INTRODUCTION
    3. BIO-MEDICAL SENSOR DESIGN
    4. BIO-SENSOR CIRCUIT INTERFACE
    5. INTERNET-OF-THINGS BASED SENSORY ARCHITECTURE
    6. COMMUNICATIONS ARCHITECTURE
    7. VISUALIZATION OF THE ACQUIRED SENSORY DATA
    8. IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS
    9. CONCLUSION AND FUTURE WORK
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  9. Chapter 2: Energy Efficient Real-Time Distributed Communication Architectures for Military Tactical Communication Systems
    1. ABSTRACT
    2. MILITARY TACTICAL COMMUNICATIONS AND NETWORKING: OVERVİEW
    3. TRACE FAMILY OF PROTOCOLS
    4. FUTURE RESEARCH DIRECTIONS
    5. ACKNOWLEDGMENT
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  10. Chapter 3: Sensing as a Service in Cloud-Centric Internet of Things Architecture
    1. ABSTRACT
    2. INTRODUCTION
    3. SENSING AS A SERVICE (SaaS)
    4. RELIABLE SaaS AND TRUSTWORTHINESS OF CROWDSENSED DATA
    5. SUMMARY AND FUTURE DIRECTIONS
    6. REFERENCES
    7. ADDITIONAL READING
    8. KEY TERMS AND DEFINITIONS
  11. Chapter 4: Secure Health Monitoring in the Cloud Using Homomorphic Encryption
    1. ABSTRACT
    2. INTRODUCTION
    3. MOTIVATING APPLICATION
    4. APPLICATION CASE STUDY: LONG-TERM CARDIAC HEALTH MONITORING
    5. THEW ECG DATA REPOSITORY
    6. FULLY HOMOMORPHIC ENCRYPTION (FHE)
    7. PROPOSED SOLUTION: OVERVIEW
    8. COMPUTATIONAL MODELS
    9. METHODOLOGY
    10. OPTIMIZATIONS AND SCALABILITY
    11. PERFORMANCE EVALUATION
    12. CONCLUSION AND FUTURE WORK
    13. ACKNOWLEDGMENT
    14. REFERENCES
    15. KEY TERMS AND DEFINITIONS
  12. Chapter 5: Volunteer Computing on Mobile Devices
    1. ABSTRACT
    2. INTRODUCTION
    3. CLASSIFICATION OF PARALLEL COMPUTING
    4. MOTIVATIONS AND CHALLENGES
    5. MOBILE DISTRIBUTED COMPUTING ARCHITECTURES
    6. OPEN ISSUES AND FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
    11. ENDNOTE
  13. Chapter 6: Selling FLOPs
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND AND MOTIVATION
    4. THE FACE RECOGNITION ALGORITHM
    5. COMPUTATIONAL ACCELERATION (AX)
    6. AXaaS: ACCELERATION AS A SERVICE
    7. TSP VIEW OF AXaaS
    8. END-USER VIEW OF AXaaS
    9. DEVELOPER VIEW OF AXaaS
    10. PERFORMANCE EVALUATION
    11. CONCLUSION
    12. ACKNOWLEDGMENT
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  14. Chapter 7: Towards Privacy-Preserving Medical Cloud Computing Using Homomorphic Encryption
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SYSTEM AND APPLICATION MODELING
    5. COMPUTATIONAL/FUNCTIONAL MODELING
    6. FHE COMPUTATIONAL STRUCTURE
    7. FHE IMPLEMENTATION STEPS
    8. IMPLEMENTING MEDICAL APPLICATIONS
    9. PERFORMANCE EVALUATION
    10. CONCLUSION AND FUTURE WORK
    11. ACKNOWLEDGMENT
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  15. Chapter 8: Hardware and Software Aspects of VM-Based Mobile-Cloud Offloading
    1. ABSTRACT
    2. INTRODUCTION
    3. MOBILE CLOUD OFFLOADING
    4. VIRTUALIZATION APPROACHES
    5. VM-BASED OFFLOADING
    6. CHALLENGES IN VIRTUALIZATION
    7. SOFTWARE SUPPORT FOR VIRTUALIZATION
    8. ARCHITECTURAL SUPPORT FOR VIRTUALIZATION
    9. CONCLUSION AND FUTURE WORK
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  16. Chapter 9: A Tutorial on Network Latency and Its Measurements
    1. ABSTRACT
    2. INTRODUCTION
    3. LATENCY VS. THROUGHPUT
    4. TRANSPORTING DATA OVER THE INTERNET
    5. USE OF PLANETLAB FOR NETWORK LATENCY MEASUREMENT
    6. UNDERLYING INFRASTRUCTURE
    7. LOCAL AND GLOBAL LATENCY
    8. PERFORMANCE IMPLICATIONS ON APPLICATIONS
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  17. Chapter 10: Operational Cost of Running Real-Time Mobile Cloud Applications
    1. ABSTRACT
    2. INTRODUCTION
    3. CLOUD OPERATOR PRICING
    4. CLOUD OPERATOR SERVICE LEVEL AGREEMENTS
    5. SECURITY OF CLOUD OUTSOURCING
    6. CASE STUDY A: CLOUD-BASED HEALTH MONITORING SYSTEM
    7. CASE STUDY B: REAL-TIME FACE RECOGNITION USING MOCHA
    8. SURVEY OF CURRENT MOBILE CLOUD OPERATOR COST MODELS
    9. SUMMARY
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  18. Chapter 11: Theoretical Foundation and GPU Implementation of Face Recognition
    1. ABSTRACT
    2. INTRODUCTION
    3. FACE RECOGNITION ALGORITHMIC STRUCTURE
    4. INSTALLATION OF THE FACE RECOGNITION SOFTWARE
    5. OPENCV-BASED IMPLEMENTATION OF FACE RECOGNITION
    6. EXPERIMENTAL EVALUATION
    7. CONCLUSION AND FUTURE WORK
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  19. Chapter 12: Reach to Mobile Platforms and Availability
    1. ABSTRACT
    2. INTRODUCTION
    3. IMPACTS OF REACH TO MOBILE PLATFORMS
    4. AVAILABILITY
    5. SECURITY: AUTHENTICITY AND CONFIDENTIALITY
    6. QUALITY OF SERVICE
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  20. Compilation of References
  21. About the Contributors