{"id":"https://openalex.org/W2536892683","doi":"https://doi.org/10.1109/csc.2011.6138505","title":"eXCloud: Transparent runtime support for scaling mobile applications in cloud","display_name":"eXCloud: Transparent runtime support for scaling mobile applications in cloud","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2536892683","doi":"https://doi.org/10.1109/csc.2011.6138505","mag":"2536892683"},"language":"en","primary_location":{"id":"doi:10.1109/csc.2011.6138505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079454687","display_name":"K. K. Ricky","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Ricky K. K. Ma","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056094107","display_name":"King Tin Lam","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"King Tin Lam","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036576232","display_name":"Cho-Li Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Cho-Li Wang","raw_affiliation_strings":["Department of Computer Science, University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079454687"],"corresponding_institution_ids":["https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":6.3014,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.968235,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"103","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8678459525108337},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8241453766822815},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7144736051559448},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5813907980918884},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.5500022172927856},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.527422308921814},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.5228244066238403},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4608267545700073},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30101078748703003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27521777153015137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0975027084350586}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8678459525108337},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8241453766822815},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7144736051559448},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5813907980918884},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.5500022172927856},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.527422308921814},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.5228244066238403},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4608267545700073},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30101078748703003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27521777153015137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0975027084350586}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csc.2011.6138505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:hub.hku.hk:10722/144630","is_oa":false,"landing_page_url":"http://hdl.handle.net/10722/144630","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference_Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1510894298","https://openalex.org/W1516997832","https://openalex.org/W1966749098","https://openalex.org/W1974943206","https://openalex.org/W1997269120","https://openalex.org/W2023380813","https://openalex.org/W2052979338","https://openalex.org/W2101788345","https://openalex.org/W2118509347","https://openalex.org/W2135099885","https://openalex.org/W2138165844","https://openalex.org/W2157801087","https://openalex.org/W2165601128","https://openalex.org/W2245072801","https://openalex.org/W2275530856","https://openalex.org/W2604310784","https://openalex.org/W3144156451","https://openalex.org/W4231540666","https://openalex.org/W4254211330","https://openalex.org/W4255374438","https://openalex.org/W6631015617","https://openalex.org/W6649948755","https://openalex.org/W6679931169","https://openalex.org/W6680602711","https://openalex.org/W6694821995","https://openalex.org/W6736198090"],"related_works":["https://openalex.org/W2048100608","https://openalex.org/W2034905385","https://openalex.org/W3150868077","https://openalex.org/W4281385823","https://openalex.org/W2189508715","https://openalex.org/W3194052956","https://openalex.org/W4312728238","https://openalex.org/W2282963174","https://openalex.org/W2589365628","https://openalex.org/W1535946264"],"abstract_inverted_index":{"Cloud":[0,23],"computing":[1,16,64],"augments":[2],"applications":[3,19,133],"with":[4,14,75],"ease-of-access":[5],"to":[6,87,98,112],"the":[7,11,22,49,53,117,136],"enormous":[8],"resources":[9,97,146],"on":[10,135],"Internet.":[12],"Combined":[13],"mobile":[15,18,46,62,118,148,176,210],"technologies,":[17],"can":[20,139,166],"exploit":[21,140],"everywhere":[24],"by":[25],"statically":[26],"distributing":[27],"code":[28],"segments":[29],"or":[30,141,171],"dynamically":[31],"migrating":[32],"running":[33,134],"processes":[34],"onto":[35],"cloud":[36,63,119,137,169,207],"services.":[37],"Existing":[38],"migration":[39,186,191],"techniques":[40,197],"are":[41],"however":[42],"too":[43],"coarse-grained":[44],"for":[45],"devices,":[47],"so":[48],"overheads":[50],"often":[51],"offset":[52],"benefits":[54],"of":[55,144,162,190],"migration.":[56],"To":[57],"build":[58],"a":[59,72,84,91,106,156,175],"truly":[60],"elastic":[61],"infrastructure,":[65],"we":[66],"introduce":[67],"eXCloud":[68],"(eXtensible":[69],"Cloud)":[70],"-":[71],"middleware":[73],"system":[74],"multi-level":[76],"mobility":[77,115],"support,":[78],"ranging":[79],"from":[80,174],"as":[81,83,88,90,151],"coarse":[82],"VM":[85],"instance":[86],"fine":[89],"runtime":[92],"stack":[93],"frame,":[94],"and":[95,101,127,153,193,209],"allows":[96],"be":[99,172],"integrated":[100],"used":[102,111],"dynamically.":[103],"In":[104],"eXCloud,":[105],"stack-on-demand":[107],"(SOD)":[108],"approach":[109,122],"is":[110,123],"support":[113],"computation":[114],"throughout":[116],"environment.":[120],"The":[121],"fully":[124],"adaptive,":[125],"goal-driven":[126],"transparent.":[128],"By":[129],"downward":[130],"task":[131,160,204],"migration,":[132],"nodes":[138,170,208],"take":[142],"control":[143],"special":[145],"in":[147,188,199],"devices":[149],"such":[150],"GPS":[152],"cameras.":[154],"With":[155],"restorable":[157],"MPI":[158,163],"layer,":[159],"migrations":[161,205],"parallel":[164],"programs":[165],"happen":[167],"between":[168],"initiated":[173],"device.":[177],"Our":[178],"evaluation":[179],"shows":[180],"that":[181],"SOD":[182],"outperforms":[183],"several":[184],"existing":[185],"mechanisms":[187],"terms":[189],"overhead":[192],"latency.":[194],"All":[195],"our":[196],"result":[198],"better":[200],"resource":[201],"utilization":[202],"through":[203],"among":[206],"nodes.":[211]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
