Document Type
|
:
|
BL
|
Record Number
|
:
|
755061
|
Doc. No
|
:
|
b575023
|
Main Entry
|
:
|
Debashis De.
|
Title & Author
|
:
|
Mobile cloud computing : : architectures, algorithms and applications\ Debashis De.
|
Publication Statement
|
:
|
Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the Academic Division of T & F Informa, plc, [, 2016] ©2016
|
Page. NO
|
:
|
(xxv, 340 pages) : illustrations
|
ISBN
|
:
|
1482242842
|
|
:
|
: 9781482242843
|
Contents
|
:
|
Machine generated contents note: 1.1. Introduction to Mobile Computing --; 1.2. Architecture of Mobile Network --; 1.2.1. Architecture of Cellular Network --; 1.2.2. Architecture of Mobile Ad Hoc Network --; 1.2.3. Architecture of Mobile Wireless Sensor Network --; 1.3. Generations of Mobile Communication --; 1.3.1.1G Mobile Communication --; 1.3.2.2G Mobile Communication --; 1.3.3.2.5G Mobile Communication --; 1.3.4.3G Mobile Communication --; 1.3.5.4G Mobile Communication --; 1.3.6.5G Mobile Communication --; 1.3.7.Comparison of the Generations of Mobile Communication --; 1.4. Mobile Operating Systems --; 1.4.1. Windows CE Operating System --; 1.4.2. Mac OS X --; 1.4.3. Symbian OS --; 1.4.4. Android OS --; 1.4.5. Blackberry 10 --; 1.5. Applications of Mobile Communication --; 1.5.1. Smartphones --; 1.5.2. Digital Music Players --; 1.5.3. Bluetooth and Wi-Fi --; 1.5.4. GPS --; 1.5.5. Smart Systems --; 1.5.5.1. Smartcards --; 1.5.5.2. Smart Labels --; 1.5.5.3. Smart Tokens --; 1.5.5.4. Sensors --; 1.5.5.5. Actuators. Note continued: 1.6. Challenges of Mobile Communication --; 1.6.1. Wireless Communication --; 1.6.1.1. Disconnection --; 1.6.1.2. Low Bandwidth --; 1.6.1.3.Network Optimization for Confined Areas with High User Concentration --; 1.6.1.4. Variable Network Conditions --; 1.6.1.5. Security Issues --; 1.6.2. Mobility --; 1.6.2.1. Changing Network Address --; 1.6.2.2. Locality Migration --; 1.6.2.3. Location Management --; 1.6.2.4. Mobile Network Traffic Forecasting --; 1.6.2.5. Mobile Call Admission Control and Handover Management --; 1.6.3. Resource Limitation --; 1.6.3.1. Data Storage --; 1.6.3.2. Power Consumption --; 1.6.4. Mobile Channel Model --; 1.6.5. Disaster Management --; 1.6.6. Mobile Data Mining --; 1.6.7. Quality of Service --; 1.7. Conclusion --; Questions --; References --; 2.1. Introduction --; 2.2. Evolution of Cloud Computing --; 2.3. Cloud Computing: What Is It Actually? --; 2.3.1. Virtualization as a Component of Cloud Computing --; 2.3.1.1. Characteristics of Virtualized Environments. Note continued: 2.3.1.2. Taxonomy of Virtualization Techniques --; 2.3.1.3. Virtualization and Cloud Computing --; 2.4. Characteristics of Cloud Computing --; 2.5. Related Technologies --; 2.6. Cloud Computing Architecture --; 2.6.1. Cloud Computing Service Models --; 2.6.1.1. Software as a Service --; 2.6.1.2. Platform as a Service --; 2.6.1.3. Infrastructure as a Service --; 2.7. Cloud Computing Deployment Models --; 2.7.1. Public Cloud --; 2.7.2. Private Cloud --; 2.7.3. Hybrid Cloud --; 2.7.4. Public Cloud versus Private Cloud --; 2.8. Issues of Cloud Computing --; 2.8.1. Scheduling --; 2.9. Security and Trust --; 2.9.1. Types of Trust --; 2.9.1.1. Direct Trust --; 2.9.1.2. Indirect Trust --; 2.9.1.3. Hybrid Trust --; 2.10. Energy Efficiency --; 2.10.1. Reduction in Direct Energy --; 2.10.2. Reduction in Energy for Cooling Server --; 2.10.3. Increase in Energy Consumption for Increase in Network Traffic --; 2.11. Interactivity, Real-Time Streaming --; 2.12. Data Management --; 2.12.1. Data Storage and Access on Cloud. Note continued: 2.12.2. Data Portability and Interoperability --; 2.13. Quality of Service --; 2.14. Resource Utilization --; 2.15. Applications of Cloud Computing --; 2.15.1. Mobile Cloud Computing --; 2.15.2. Healthcare --; 2.15.3. Cloud Gaming --; 2.15.4. Storage --; 2.16. Conclusion --; Questions --; References --; 3.1. Introduction --; 3.2. Motivation to Mobile Cloud Computing --; 3.3. Architecture of Mobile Cloud Computing --; 3.3.1. Service-Oriented Architecture --; 3.3.2. Agent[--]Client Architecture --; 3.3.3. Collaborative Architecture --; 3.4. Platform and Technologies --; 3.4.1. Platform of MCC --; 3.4.2. Enabling Technologies of MCC --; 3.5. Mobile Augmentation Approaches --; 3.5.1. Hardware Approaches --; 3.5.2. Software Approaches --; 3.6. Issues of Mobile Cloud Computing --; 3.6.1. Operational Issues --; 3.6.1.1. Offloading Methods --; 3.6.1.2. Cost[--]Benefit analysis --; 3.6.1.3. Mobility Management --; 3.6.1.4. Connection Protocol --; 3.6.2. End-User Issues --; 3.6.2.1. Incentive Scheme. Note continued: 3.6.2.2. Presentation and Usability --; 3.6.3. Service-Level and Application-Level Issues --; 3.6.3.1. Fault Tolerance --; 3.6.3.2. Supporting Performance at Service Level --; 3.6.3.3. Cloud APIs --; 3.6.4. Security and Privacy --; 3.6.4.1. General Cloud Security --; 3.6.4.2. Security for Mobile User --; 3.6.4.3. Privacy --; 3.6.5. Context Awareness --; 3.6.5.1. Context-Aware Service Provisioning --; 3.6.5.2. Risk Assessment Using Context Awareness --; 3.6.5.3. Resource and Common Goal Identification Using Context Awareness --; 3.6.5.4. Energy Awareness --; 3.6.6. Mobile Data Management --; 3.6.6.1. Personal Data Storage on Mobile Cloud --; 3.6.6.2. Data Access --; 3.6.6.3. Data Portability and Interoperability --; 3.6.6.4. Embedded Mobile Databases --; 3.7. Advantages of Mobile Cloud Computing --; 3.8. Applications of Mobile Cloud computing --; 3.8.1. Mobile Commerce --; 3.8.2. Mobile Learning --; 3.8.3. Mobile Gaming --; 3.8.4. Mobile Health Monitoring. Note continued: 3.9. Research Challenges in Mobile Cloud Computing --; 3.9.1. Connectivity between Mobile Device and Cloud --; 3.9.2. Cloudlet Deployment in MCC --; 3.9.3. Centralization in Collaborative Model of MCC --; 3.9.4. Security in MCC --; 3.9.5. Incentives in MCC --; 3.9.6. Energy Efficiency in MCC --; 3.9.7. Business Model of MCC --; 3.9.8. Data Traffic Management --; 3.10. Conclusion --; Questions --; References --; 4.1. Introduction --; 4.2. Offloading Decision --; 4.2.1. Improving Performance --; 4.2.2. Saving Energy --; 4.3. Types of Offloading --; 4.3.1. Depending on Material Being Offloaded --; 4.3.2. Depending on Approaches to Time Reduction --; 4.3.2.1. Fine-Grained Offloading or Partial Offloading --; 4.3.2.2. Coarse-Grained Offloading or Full Offloading --; 4.4. Topologies of Offloading --; 4.5. Offloading in Cloud Computing and in Mobile Cloud Computing: Similarities and Differences --; 4.6. Adaptive Computation Offloading from Mobile Devices --; 4.6.1. Mobile Augmentation Cloud Services. Note continued: 4.6.2. Adaptive Computation Offloading --; 4.7. Cloud Path Selection for Offloading --; 4.7.1. Cloud Path Selection Methods --; 4.7.2. Cloud Path Selection Issues --; 4.8. Mobile Data Offloading Using Opportunistic Communication --; 4.8.1. System Model --; 4.8.2. Target-Set Selection --; 4.8.3. Greedy, Heuristic, and Random Algorithms --; 4.9. Three Tier Architecture of Mobile Cloud Computing --; 4.10. Requirements of Data Offloading --; 4.11. Performance Analysis of Offloading Techniques --; 4.11.1. Analysis of Energy Consumption in Offloading for Different Data Amounts --; 4.11.2. Analysis of Energy Consumption in Offloading for Different Connectivity --; 4.12. Multi-Cloud Offloading in Mobile Cloud Computing Environment --; 4.12.1. Performance Analysis of Multi-Cloud Offloading Schemes --; 4.13. Conclusion --; Questions --; References --; 5.1. Introduction --; 5.2. Green Mobile Computing --; 5.2.1. Green Data Center --; 5.2.2. Green Macrocell Base Station. Note continued: 5.2.3. Green Femtocell Base Station --; 5.2.4. Green Mobile Device --; 5.2.5. Green Mobile Application and Services --; 5.3. Green Mobile Network --; 5.3.1. Congestion Control for Energy-Efficient Mobile Network --; 5.3.2. Energy Efficiency of Femtocell, Microcell, and Picocell Network over Macrocell-Based Mobile Network --; 5.4. Green Cloud Computing --; 5.4.1. Green Cloud Servers --; 5.4.2. Green Cloud Data Center --; 5.4.3. Green Cloud Hardware --; 5.4.4. Green Cloud Software --; 5.4.5. Green Wired or Wireless Network --; 5.5. Green Mobile Cloud Computing --; 5.5.1. Energy Saving in Mobile Cloud Infrastructures --; 5.5.2. Issues and Requirements for Green MCC --; 5.6. Green Mobile Devices Using Mobile Cloud Computing --; 5.6.1.Computation Offloading --; 5.6.2. Resource Management --; 5.7. Green Femtocell Using Mobile Cloud Computing --; 5.8.
|
|
:
|
Green Seamless Service Provisioning with Mobile Cloud Computing --; 5.8.1. Architecture of a Mobile Ad Hoc Cloud. Note continued: 5.8.2. Functioning of Mobile Ad Hoc Cloud --; 5.8.2.1. Module 1: Service Discovery --; 5.8.2.2. Module 2: Seamless Services --; 5.8.2.3. Module 3: Offloading Decisions --; 5.8.3. Issues and Challenges of Mobile Ad Hoc Cloud --; 5.9. Green Location Sensing within Mobile Cloud Computing Environment --; 5.10. Conclusion --; Questions --; References --; 6.1. Introduction --; 6.2. Significance of Resource Allocation in Mobile Cloud Computing --; 6.3. Resource-Allocation Strategies in Mobile Cloud Computing --; 6.3.1. Semi-Markov Decision Process (SMDP)-Based Resource Allocation in MCC --; 6.3.1.1. System Model of Cloud --; 6.3.1.2. System States of Cloud --; 6.3.1.3. Actions of Cloud --; 6.3.1.4. Dropping Probability --; 6.3.1.5.Comparison of SMDP with Greedy Approach --; 6.3.2. Task Scheduling Using Activity-Based Costing Algorithm --; 6.3.2.1. Activity-Based Costing Algorithm --; 6.3.2.2. Performance of ABC Algorithm --; 6.3.3. Resource Allocation Using Middleware. Note continued: 6.3.3.1. Architecture of Middleware --; 6.3.3.2. Resource-Allocation Strategies --; 6.3.4. Energy-Aware Resource Allocation --; 6.3.4.1. Green Cloud Architecture --; 6.3.4.2. Energy-Aware Data Center Resource Allocation --; 6.3.5. Resource Allocation in MCC Using Entropy-Based FIFO Method --; 6.3.6. Auction Mechanism for Resource Allocation in MCC --; 6.4. Research Challenges in Resource Allocation in Mobile Cloud Computing --; 6.4.1. Energy-Aware Memory Management --; 6.4.2. Maintaining Strict Service-Level Agreements (SLAB) --; 6.4.3. Merging of Different Resource-Allocation Strategies --; 6.5. Conclusion --; Questions T --; References --; 7.1. Introduction --; 7.2. Wireless Sensor Network --; 7.2.1. Different Deployment Technologies of WSN --; 7.2.2. Architecture of WSN --; 7.3. Sensor Cloud --; 7.3.1. Architecture of Sensor Cloud --; 7.3.2. Benefits of Sensor Cloud --; 7.3.3. Extension of Sensor Cloud with Mobile --; 7.4. Sensor Mobile Cloud Computing. Note continued: 7.4.1. Architecture of Sensor Mobile Cloud Computing --; 7.4.2. Service Life Cycle Model of Sensor Mobile Cloud Computing --; 7.4.3. System Architecture for a Rescue Service Model --; 7.4.3.1. Performance Analysis of Rescue Service Model --; 7.5. Internet of Things --; 7.6. Urban Sensing --; 7.6.1. Opportunistic Sensing --; 7.6.2. Participatory Sensing --; 7.7. Application --; 7.7.1.A Complete Architecture of Health Service Model --; 7.8. Challenges of Sensor Mobile Cloud Computing --; 7.9. Conclusion --; Questions --; References --; 8.1. Introduction --; 8.2. Mobile Social Cloud Architecture --; 8.3. Resource Sharing in Mobile Social Cloud --; 8.3.1. Motivation for Contribution of Resources --; 8.3.2. Social Capital --; 8.3.3. Virtualized Resources --; 8.3.4. Banking --; 8.3.5. Registration --; 8.3.6. Social Market --; 8.4. Warehousing and Analyzing Social Data Using Cloud --; 8.4.1. Architecture of Analysis and Warehousing of Social Network Data --; 8.4.2. Case Study on Tweet Data Analysis. Note continued: 8.4.2.1. Tweet Mapping --; 8.4.2.2. Mood Probabilities --; 8.5. Social Compute Cloud: Sharing and Allocating Resources --; 8.5.1. Architecture of Social Compute Cloud --; 8.6.3D Visualization of Social Network Data --; 8.6.1. Visualization of Social Network Data --; 8.6.2. OLAP Data Analysis and Cube Generation --; 8.6.3. MVC-Based Model for Visualization --; 8.7. Security in Mobile Social Cloud --; 8.7.1. Security in Social Network --; 8.7.1.1. Purpose of Attackers --; 8.7.1.2. Method of Attacks --; 8.7.2. Resource Allocation for Security Services --; 8.8. Trust in Mobile Social Cloud --; 8.8.1. Trust Inference in Social Networks --; 8.8.2. Trust Contextualizing in Social Clouds --; 8.8.3. Social Cloud Exchange Structure --; 8.8.3.1. Prior Expectation --; 8.8.3.2. Social Interchange --; 8.8.3.3.Completion --; 8.9. Applications of Mobile Social Cloud --; 8.9.1. Cloud-Assisted Adaptive Video Streaming --; 8.9.2. Personal Emergency Preparedness Plan --; 8.9.2.1. System Architecture. Note continued: 8.9.3. Massively Multiplayer Online Games --; 8.9.3.1. Challenges in CAMEO Architecture --; 8.9.4. Geosmart: Social Media Education --; 8.9.4.1. Entities of Geosmart --; 8.9.4.2. Architecture of Geosmart --; 8.10. Conclusion --; Questions --; References --; 9.1. Introduction --; 9.2. Security Needed in Different Levels for Securing Mobile Cloud Computing --; 9.2.1. Level 1: Security Issues in Mobile Devices --; 9.2.1.1. Approaches to Mitigate Security Issues Related to Mobile Devices --; 9.2.2. Level 2: Security Issues in Communication Channels --; 9.2.2.1. Approaches to Mitigate Security Issues Related to Communication Channel --; 9.2.3. Level 3: Security Issues in Cloud Computing --; 9.2.3.1. Approaches to Mitigate Security Issues in Cloud Infrastructure --; 9.3. Security Issues in Mobile Cloud Environment --; 9.3.1. Application Security --; 9.3.1.1. Existing Schemes for Application Security --; 9.3.2. Authentication Issues --; 9.3.2.1. Existing Authentication Schemes. Note continued: 9.3.3. Data Security --; 9.3.3.1. Existing Schemes for Data Security --; 9.3.4. Digital Rights Management --; 9.3.4.1. Existing DRM Scheme --; 9.3.5. Intrusion Detection --; 9.3.5.1. Drawbacks of Intrusion Detection --; 9.3.5.2. Existing Schemes for Intrusion Detection --; 9.4. Conclusion --; Questions --; References --; 10.1. Introduction --; 10.2. Trust Properties --; 10.3.Components of Trust --; 10.3.1. Security --; 10.3.2. Privacy --; 10.3.3. Auditability --; 10.3.4. Accountability --; 10.4. Types of Trust --; 10.4.1. Direct Trust --; 10.4.2. Indirect Trust --; 10.4.3. Hybrid Trust --; 10.5. Trust Issues --; 10.5.1. Weak Chain of Trust --; 10.5.2. Lack of Control and Visibility --; 10.6. Ways of Trust Establishment --; 10.6.1. Service-Level Agreement --; 10.6.2. Audit --; 10.6.3. Measuring and Rating --; 10.6.4. Self-Assessment Questionnaire --; 10.6.5. Trust and Reputation Model --; 10.6.5.1. QoS+ Parameters for Trust and Reputation Models --; 10.6.5.2. Promising Trust and Reputation Models. Note continued: 10.7. Trust Evaluation --; 10.7.1. Black Box Approach --; 10.7.2. Inside-Out Approach --; 10.7.3. Outside-In Approach --; 10.8. Detailed Study of Various Aspects of Trust in MCC --; 10.8.1. User Behavior Trust --; 10.8.1.1. Evaluation Principles of User Behavior Trust --; 10.8.1.2. Decomposition of User Behavior Trust --; 10.8.1.3. Acquirement of Behavior Trust Evidence --; 10.8.1.4. User Behavior Trust Evaluation Methods --; 10.8.2. Trustworthy Mobile Sensing Framework --; 10.8.3. Mobile Agent-Based Trustworthy Infrastructure for MCC --; 10.8.4. Building Trustworthy Social Network Based on Call Behavior --; 10.8.5. Trust-Based Mobile Commerce --; 10.8.5.1. Automated Trust Negotiation --; 10.8.5.2. Proxy Certificate --; 10.8.5.3. CBTN Protocol for Trust-Based Mobile Commerce --; 10.9. Conclusion --; Questions --; References --; 11.1. Introduction --; 11.2. Vehicular Ad Hoc Network --; 11.2.1. Working Principles of Vehicular Ad Hoc Networks. Note continued: 11.3. Architecture and Working Model of Vehicular Mobile Cloud Computing --; 11.3.1. VMCC Architecture --; 11.3.2. Performance Analysis of VMCC --; 11.4. Privacy and Security in Vehicular Mobile Cloud Computing --; 11.4.1. Security and Privacy Attacks in VMCC --; 11.4.1.1. Possible Forms of Attacks --; 11.4.1.2. Threats in VMCC --; 11.4.1.3. Authentication of Mobility Nodes --; 11.4.2. Solution to Secure VMCC --; 11.5. Limitations of Vehicular Mobile Cloud Computing --; 11.5.1. Mobility in VMCC --; 11.5.2. Volatility in VMCC --; 11.5.3. Privacy --; 11.5.4. Liability --; 11.5.5. Scalability --; 11.6. Challenges in Vehicular Mobile Cloud Computing --; 11.7. Applications --; 11.7.1. Safety Applications --; 11.7.2. User Applications --; 11.8. Conclusion --; Questions --; References --; 12.1. Introduction --; 12.2.
|
|
:
|
Cloud Business Models --; 12.2.1. Cloud Computing Architecture --; 12.2.2. Current Offerings of Cloud Computing --; 12.2.3. Pricing Strategies of Cloud. Note continued: 12.2.4. Method of Dynamically Pricing Resources --; 12.2.4.1. Dynamic Pricing Scheme --; 12.2.4.2. User Welfare in Cloud Computing --; 12.2.5. Cooperation among Cloud Service Providers --; 12.2.5.1. Brokering Mechanism in Mobile Cloud Business Model --; 12.2.5.2. Broker as a Service --; 12.2.5.3. Resource Estimation and Pricing Model --; 12.2.5.4. Pricing and Billing r --; 12.2.5.5. System Model and Assumption --; 12.2.5.6. Resource and Revenue Sharing among Cloud Providers --; 12.3. Business Model of Mobile Computing Environment --; 12.4. Cooperation among Service Providers --; 12.4.1. Model of Mobile Cloud Computing --; 12.4.2. Model of Resource Pool --; 12.5. Weblet-Based Mobile Cloud Computing Model --; 12.6. Mobile Cloud Service Insurance Brokerage --; 12.7. Business Aspects of Social Mobile Cloud Computing --; 12.7.1. Impact on Global Business --; 12.7.2. Individual Roles of Components of SMAC --; 12.8. Conclusion --; References --; 13.1. Introduction. Note continued: 13.2. Cloud Mobile Media Application --; 13.2.1. Architecture --; 13.3. Biometric Application --; 13.3.1. Face Recognition --; 13.3.2. Fingerprint Recognition --; 13.4. Vehicle Monitoring --; 13.4.1. Mobile Vehicular Cloud --; 13.4.1.1. Route Tracking --; 13.4.1.2. Traffic Management --; 13.5. Pervasive Forensic Analysis --; 13.5.1. Pervasive and Collaborative Analysis --; 13.5.2. Forensic Cloud --; 13.5.2.1. Framework Design --; 13.6. Mobile Learning --; 13.6.1. Mobile Learning Procedure --; 13.6.1.1. Cloud Model --; 13.6.1.2. Client Model --; 13.7. Remote Display --; 13.8. Context-Aware Navigation System --; 13.9. Cloud Computing Support for Enhanced Health Applications --; 13.9.1. Femtocell-Based Health Monitoring Using MCC --; 13.10. Sensing as a Service --; 13.11. Secure Web Referral Services for Mobile Cloud Computing --; 13.12. Mobile Multimedia Storage --; 13.13. Application of Mobile Cloud Computing in Defense Sector --; 13.14. Application in Social Cloud --; 13.15. Conclusion --; Questions. Note continued: References --; 14.1. Introduction --; 14.2. Efficient Bandwidth Allocation --; 14.2.1. Use of 5G Network --; 14.2.2. Mobile Cloud Computing Architecture with 5G Network --; 14.2.3. Mobile Cloud Computing Architecture with Femtocell Base Station --; 14.2.4. Efficient Spectrum Utilization Using Cognitive Radio --; 14.2.4.1. Mobile Cloud Computing with Cognitive Radio Technology --; 14.3. Use of Cloudlet in Mobile Cloud Computing --; 14.4. Cross-Cloud Communication --; 14.4.1. Mobile Sky Computing --; 14.5. Standard Interface in Mobile Cloud Computing --; 14.6. Cloud Resource Access Mechanism --; 14.7. Elastic Application Model --; 14.8. Security and Privacy in Mobile Cloud Computing --; 14.8.1. Secured Mobile Cloud Computing --; 14.9. Enterprise Mobile Cloud --; 14.9.1. Identity Security --; 14.9.2. Disaster Recovery --; 14.9.3. Pricing in Mobile Cloud Computing --; 14.9.4. Service Execution and Delivery --; 14.10. Reducing Energy Consumption of Offloading. Note continued: 14.10.1. Femtocell-Based Offloading Strategy for Mobile Cloud Computing --; 14.10.2. Cloud Path Selection for Offloading Data Storage and Application Execution --; 14.10.3. Offloading Strategy for Mobile Devices --; 14.10.4. Offloading Overhead in Mobile Cloud Computing --; 14.11. Improving Quality of Service with Cloudlets --; 14.11.1. Load Balancing among Cloudlets --; 14.11.2. Load Sharing among Cloudlets --; 14.11.3. Provisioning of Seamless Mobile Cloud Services --; 14.12. Reduction in Cloud Data Center Energy Consumption --; 14.13. Resource Management --; 14.14. Application Migration Schemes for Data Center Servers --; 14.15. Conclusion --; Questions --; References.
|
Abstract
|
:
|
The immense growth of mobile applications and the emerging cloud computing concept led to the development of mobile cloud computing (MCC) as a potential technology for mobile services. This is the first book where mobile computing and cloud computing are considered together. Readers learn the present developments, advantages, and disadvantages of MCC. The book explains different applications of MCC with examples and looks at future research directions and open research problems.
|
Subject
|
:
|
Cloud computing.
|
Subject
|
:
|
COMPUTERS -- Computer Literacy.
|
Subject
|
:
|
Mobile computing.
|
Added Entry
|
:
|
Debashis De
|