1 |
S. Satyanarayana, "Cloud computing: SAAS," Computer Sciences and Telecommunications 2012 vol 4, no. 36, pp.76-79, Dec. 2011.
|
2 |
T. Baltrusaitis, P. Robinson and L. Morency, "OpenFace: An open source facial behavior analysis toolkit," 2016 IEEE Winter Conference on Applications of Computer Vision, pp. 1-10, Mar. 2016.
|
3 |
T. Salah, M. J. Zemerly, C. Y. Teun, M. Al-Qutayri and Y. Al-Hammadi, "Performance comparison between container-based and VM-based services", 2017 20th Conference on Innovations in Clouds, Internet and Networks, pp. 185-190, Mar. 2017.
|
4 |
W. Yu et al. "A Survey on the Edge Computing for the Internet of Things," in IEEE Access, vol. 6, pp. 6900-6919, Nov. 2017.
DOI
|
5 |
L. Klozar and J. Prokopec, "Propagation path loss models for mobile communication", Proceedings of 21st International Conference Radioelektronika 2011, pp. 1-4, Apr. 2011.
|
6 |
T. Ylonen, C. Lonvick, Ed. "The Secure Sehll (SSH) Protocol Architecture" Internet Engineering Task Force, RFC4251, Jan. 2006.
|
7 |
T. Taleb and A. Ksentini, "Follow me cloud: interworking federated clouds and distributed mobile networks," in IEEE Network, vol. 27, no. 5, pp. 12-19, Oct. 2013.
DOI
|
8 |
Hejtmanek, Lukas, David Antos, and Lubos Kopecky. "Choice of Data Transfer Protocols in Remote Storage Applications." CESNET Technical Report 1/2013, Jun. 2013.
|
9 |
S. Wang, J. Xu, N. Zhang and Y. Liu, "A Survey on Service Migration in Mobile Edge Computing", in IEEE Access, vol. 6, pp. 235511-23528, Apr. 2018.
|