IEEE Internet Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Live migration of virtual machines
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Remus: high availability via asynchronous virtual machine replication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Privacy in Content-Based Opportunistic Networks
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Haggle: seamless networking for mobile applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
MobiAd: private and scalable mobile advertising
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
Turning down the LAMP: software specialisation for the cloud
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Unikernels: the rise of the virtual library operating system
Communications of the ACM
Unikernels: Rise of the Virtual Library Operating System
Queue - Distributed Computing
Hi-index | 0.02 |
Current opinion and debate surrounding the capabilities and use of the Cloud is particularly strident. By contrast, the academic community has long pursued completely decentralised approaches to service provision. In this paper we contrast these two extremes, and propose an architecture, Droplets, that enables a controlled trade-off between the costs and benefits of each. We also provide indications of implementation technologies and three simple sample applications that substantially benefit by exploiting these trade-offs.