• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Towards a distributed platform for resourceconstrained devices. (2002)

by A Messer
Venue:In ICDCS,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 41
Next 10 →

A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices

by Sachin Goyal, John Carter , 2004
"... Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate infras ..."
Abstract - Cited by 45 (3 self) - Add to MetaCart
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate infrastructure based on virtual machine technology that allows resource-constrainted devices to utilize a surrogate's compute, network, and storage resources. After describing the design of our surrogate infrastructure, we demonstrate how it can be used to support real-time speech recognition and a synthetic web services application. Using a surrogate reduces the response time of speech recognition by a factor of 200 while reducing the energy drain on the client device by a factor of 60. Using a surrogate reduces the response time and energy drain on the client by factors of 21 and 25, respectively, for the web services application. 1.

Securing elastic applications on mobile devices for cloud computing

by Xinwen Zhang, Joshua Schiffman, Anugeetha Kunjithapatham, Sangoh Jeong - In Proc. of ACM Cloud Computing Security Workshop , 2009
"... Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim ..."
Abstract - Cited by 29 (2 self) - Add to MetaCart
Cloud computing provides elastic computing infrastructure and resources which enable resource-on-demand and pay-as-you-go utility computing models. We believe that new applications can leverage these models to achieve new features that are not available for legacy applications. In our project we aim to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds. An elastic application consists of one or more weblets, each of which can be launched on a device or cloud, and can be migrated between them according to dynamic changes of the computing environment or user preferences on the device. This paper overviews the general concept of this new application model, analyzes its unique security requirements, and presents our design considerations to build secure elastic applications. As first steps we propose a solution for authentication and secure session management between weblets running device side and those on the cloud. We then propose secure migration and how to authorize cloud weblets to access sensitive user data such as via external web services. We believe some principles in our solution can be applied in other cloud computing scenarios such as application integration between private and public clouds in an enterprise environment.
(Show Context)

Citation Context

...be partitioned into components called weblets. Previous work has proposed many mechanisms for splitting an application into modular components for remote execution or cyber foraging purposes, such as =-=[7, 14, 11]-=-. For elastic devices we assume application developers have determined how to organize weblets based on their different behaviors such as computation demand, data dependency, and communication need. O...

Adaptive Offloading for Pervasive Computing

by Xiaohui Gu , Alan Messer, Ira Greenberg, Dejan Milojicic, Klara Nahrstedt
"... Pervasive computing allows a user to access an application on heterogeneous devices continuously and consistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices such as cell phones. Application-based or system-based adaptations have been proposed t ..."
Abstract - Cited by 28 (2 self) - Add to MetaCart
Pervasive computing allows a user to access an application on heterogeneous devices continuously and consistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices such as cell phones. Application-based or system-based adaptations have been proposed to address the problem, but they often require application fidelity to be significantly degraded. We believe that this problem can be overcome by dynamically partitioning the application, and by offloading part of the application execution with data to a powerful nearby surrogate. This allows the application to be delivered in a pervasive computing environment without significant fidelity degradation or expensive application rewriting. Runtime offloading needs to adapt to different application execution patterns and resource fluctuations in the pervasive computing environment. Hence, we have developed an offloading inference engine to adaptively solve two key decision-making problems in runtime offloading: (1) timely triggering of offloading, and (2) efficient partitioning of applications. Both trace-driven simulations and prototype experiments show the effectiveness of the adaptive offloading system.

On Composite Web Services Provisioning in an Environment of Fixed and Mobile Computing Resources

by Zakaria Maamar, Quan Z. Sheng, Boualem Benatallah - Information Technology and Management Journal, Special Issue on Workflow and e-Business, Kluwer Academic Publishers (forthcoming) 5 (2004 , 2003
"... We present a framework for Web services provisioning in a hybrid environment of fixed and mobile computing resources. Several obstacles still hinder the seamless provisioning of Web services in mobile environments. Examples of such obstacles are: throughput and connectivity of wireless networks, lim ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
We present a framework for Web services provisioning in a hybrid environment of fixed and mobile computing resources. Several obstacles still hinder the seamless provisioning of Web services in mobile environments. Examples of such obstacles are: throughput and connectivity of wireless networks, limited computing resources of mobile devices, and risks of communication channel disconnections. In the proposed framework, software agents represent users, providers of services, and providers of resources. The business logic of composite services is expressed as a process model using statecharts formalism. Among other things, the use of agents provides an infrastructure that has the ability to handle disconnections during service preparation for execution. The framework also integrates a service execution planning approach to optimally select computing resources (fixed or mobile) on top of which services will be executed.
(Show Context)

Citation Context

...:18; p.19s20 Maamar, Sheng, and Benatallah 6. Related Work There exist several research projects that aim at studying how mobile devices can change our way of doing business and performing operations =-=[6, 9, 12, 20, 21, 23]. At H-=-P, Milojicic et al. have worked on delivering Internet services to mobile users [21]. This work was conducted under the project Ψ for Pervasive Services Infrastructure (PSI). Ψ’s vision is “any ...

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments

by Xiaohui Gu, Klara Nahrstedt, Alan Messer, Dejan Milojicic, Ira Greenberg, Ira Greenberg, Hewlett Packard Laboratories - Proc. of IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), Dallas-Fort , 2003
"... Pervasive computing allows a user to access an application on heterogeneous devices continuously and consistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or syste ..."
Abstract - Cited by 26 (2 self) - Add to MetaCart
Pervasive computing allows a user to access an application on heterogeneous devices continuously and consistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or system-based adaptations, have been proposed to address the problem. However, existing solutions often require degrading application fidelity. We believe that this problem can be overcome by dynamically partitioning the application and offloading part of the application execution to a powerful nearby surrogate. This will enable pervasive application delivery to be realized without significant fidelity degradation or expensive application rewriting. Because pervasive computing environments are highly dynamic, the runtime offloading system needs to adapt to both application execution patterns and resource fluctuations. Using the Fuzzy Control model, we have developed an offloading inference engine to adaptively solve two key decision-making problems during runtime offloading: (1) timely triggering of adaptive offloading, and (2) intelligent selection of an application partitioning policy. Extensive trace-driven evaluations show the effectiveness of the offloading inference engine.
(Show Context)

Citation Context

...s expensive to rewrite an application according to the capacity of each mobile device. Hence, a fine-grained runtime offloading system, called adaptive infrastructure for distributed execution (AIDE) =-=[11]-=-, has been proposed to solve the problem without modifying the application or degrading its fidelity. The key idea is to dynamically partition the application during runtime, and migrate part of the a...

Context-Aware Migratory Services in Ad Hoc Networks

by Oriana Riva, Tamer Nadeem, Cristian Borcea, Liviu Iftode, Senior Member - IEEE Transactions on Mobile Computing
"... Abstract—Ad hoc networks can be used not only as data carriers for mobile devices but also as providers of a new class of services specific to ubiquitous computing environments. Building services in ad hoc networks, however, is challenging due to the rapidly changing operating contexts, which often ..."
Abstract - Cited by 24 (7 self) - Add to MetaCart
Abstract—Ad hoc networks can be used not only as data carriers for mobile devices but also as providers of a new class of services specific to ubiquitous computing environments. Building services in ad hoc networks, however, is challenging due to the rapidly changing operating contexts, which often lead to situations where a node hosting a certain service becomes unsuitable for hosting the service execution any longer. We propose a novel model of service provisioning in ad hoc networks based on the concept of contextaware migratory services. Unlike a regular service that executes always on the same node, a migratory service can migrate to different nodes in the network in order to accomplish its task. The migration is triggered by changes of the operating context, and it occurs transparently to the client application. We designed and implemented a framework for developing migratory services. We built TJam, a proof-of-concept migratory service that predicts traffic jams in a given region of a highway by using only car-to-car short-range wireless communication. The experimental results obtained over an ad hoc network of personal digital assistants (PDAs) show the effectiveness of our approach in the presence of frequent disconnections. We also present simulation results that demonstrate the benefits of migratory services in large-scale networks compared to a statically centralized approach. Index Terms—Mobile computing, mobile applications, ubiquitous computing, distributed programming, distributed systems. Ç
(Show Context)

Citation Context

...and dynamic reconfiguration in distributed systems [42], [43]. Research work that can be seen as precursors of our model includes process migration for load balancing and service component offloading =-=[44]-=-. MobiDesk [45] allows a user’s computing environment to be migrated transparently from one server to another by decoupling a user’s desktop computing session from the underlying operating system and ...

COMET: Code Offload by Migrating Execution Transparently

by Mark S. Gordon, D. Anoushe, Jamshidi Scott, Mahlke Z. Morley, Mao Xu Chen
"... In this paper we introduce a runtime system to allow unmodified multi-threaded applications to use multiple machines. The system allows threads to migrate freely between machines depending on the workload. Our prototype, COMET (Code Offload by Migrating Execution Transparently), is a realization of ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
In this paper we introduce a runtime system to allow unmodified multi-threaded applications to use multiple machines. The system allows threads to migrate freely between machines depending on the workload. Our prototype, COMET (Code Offload by Migrating Execution Transparently), is a realization of this design built on top of the Dalvik Virtual Machine. COMET leverages the underlying memory model of our runtime to implement distributed shared memory (DSM) with as few interactions between machines as possible. Making use of a new VM-synchronization primitive, COMET imposes little restriction on when migration can occur. Additionally, enough information is maintained so one machine may resume computation after a network failure. We target our efforts towards augmenting smartphones or tablets with machines available in the network. We demonstrate the effectiveness of COMET on several real applications available on Google Play. These applications include image editors, turn-based games, a trip planner, and math tools. Utilizing a server-class machine, COMET can offer significant speed-ups on these real applications when run on a modern smartphone. With WiFi and 3G networks, we observe geometric mean speed-ups of 2.88X and 1.27X relative to the Dalvik interpreter across the set of applications with speed-ups as high as 15X on some applications. 1
(Show Context)

Citation Context

...sting runtime and requiring no binary modifications. Other related offloading systems include OLIE [15], which applied offloading to Java to overcome resource constraints automatically. Messer et al. =-=[23]-=- proposed a system to automatically partition application components using MINCUT algorithms. Hera-JVM [22] used DSM to manage memory consistency while doing RPC-style offloading between cores on a Ce...

A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing

by Muhammad Shiraz, Abdullah Gani, Senior Member, Rashid Hafeez Khokhar, Rajkumar Buyya, Senior Member - IEEE Communication Surveys & Tutorials , 2012
"... Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all th ..."
Abstract - Cited by 17 (9 self) - Add to MetaCart
Abstract—The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potential computing devices, which are constrained by CPU potentials, memory capacity and battery life time. Mobile Cloud Computing (MCC) is the latest practical solution for alleviating this incapacitation by extending the services and resources of computational clouds to SMDs on demand basis. In MCC, application offloading is ascertained as a software level solution for augmenting application processing capabilities of SMDs. The current offloading algorithms offload computational intensive applications to remote servers by employing different cloud models. A challenging
(Show Context)

Citation Context

...c mobile applications. Elastic applications are partitioned at runtime for the establishment of distributed processing platform. Elastic mobile applications are attributed with the following features =-=[34]-=-. a) Ad-hoc platform creation is an important attribute of elastic mobile applications. Distributed application processing platform is established on ad-hoc basis at runtime in which elastic mobile ap...

A Compiler and Runtime Infrastructure for Automatic Program Distribution

by Roxana E. Diaconescu, Lei Wang, Zachary Mouri, Matt Chu - In IEEE International Parallel and Distributed Processing Symposium (IPDPS , 2005
"... This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping strategies and the study of automatic distribution ’ ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping strategies and the study of automatic distribution ’ s effect on resource consumption (e.g., CPU, memory, communication). Since many optimization techniques are faced with conflicting optimization targets (e.g., memory and communication), we believe that it is important to be able to study their interaction. We present a set of techniques that enable flexible resource modeling and program distribution. These are: dependence analysis, weighted graph partitioning, code and communication generation, and profiling. We have developed these ideas in the context of the Java language. We present in detail the design and implementation of each of the techniques as part of our compiler and runtime infrastructure. Then, we evaluate our design and present preliminary experimental data for each component, as well as for the entire system. 1.
(Show Context)

Citation Context

...ct without extending Java syntax. However, we do not give the user any control over distribution. Messer et al.’s approach, though entirely dynamic, has an objective that more closely matches our own =-=[15]-=-. The goal is to transparently off-load services to relieve memory and processing constraints on resource-constrained devices. The main difference is the handling of object references. In this approac...

Energy-aware mobile service overlays: Cooperative dynamic power management in distributed mobile systems

by Balasubramanian Seshasayee, Ripal Nathuji, Karsten Schwan - In Proceedings of the IEEE International Conference on Autonomic Computing (ICAC , 2007
"... With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on collections of cooperative end devices. Mobility, however, requires dynamic management of these platforms’ distributed res ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on collections of cooperative end devices. Mobility, however, requires dynamic management of these platforms’ distributed resources, and such management can also be used to meet application quality requirements and prolong application lifetimes, the latter by best using available energy resources. This paper presents energy-aware Mobile Service Overlays (MSOs), a set of mechanisms and associated policies for running mobile applications across multiple, cooperating machines while actively performing power management to extend system usability lifetimes. MSO policies manage energy consumption by (i) allocating application components to available nodes based upon their current energy capacities and resource availabilities, (ii) monitoring for, and responding to changes in energy and resource characteristics, and (iii) dynamically exploiting energy-performance tradeoffs in overprovisioned situations. Coupled with mobility, such cooperation enables multiple mobile platforms to bring their joint resources to bear on complex application tasks, providing significant benefits to application lifetimes and performance. Evaluations of MSOs on a MANET computing testbed indicate an extension in system lifetime of upto 10 % for an example application. 1
(Show Context)

Citation Context

...], coordinated actions of geographically dispersed agents in an emergency rescue operation [17], distributed surveillance in the battlefield, distributed gaming, and ubiquitous computing environments =-=[18]-=-. Since cooperative mobile applications like those listed above operate in highly dynamic execution environments, their effective execution requires them to adapt, online, to changes in requirements a...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University