Results 11 - 20
of
41
Pervasive Services Infrastructure
- In Proceedings of TES'01, 2001. LNCS
, 2002
"... Technology has been advancing in the past century at an incredible rate. All predictions about the limits have been consistently broken for processor speed, network bandwidth, and memory size. Nevertheless, the way we use computers has not kept pace with the technology itself. Computers are stil ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Technology has been advancing in the past century at an incredible rate. All predictions about the limits have been consistently broken for processor speed, network bandwidth, and memory size. Nevertheless, the way we use computers has not kept pace with the technology itself. Computers are still being used in a similar way as a couple of decades ago.
Provisioning web services from resource constrained mobile devices
- In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on
, 2010
"... constrained mobile devices ..."
(Show Context)
Context aware deployment for mobile users
- In Proceedings of the 7th International Computer Software and Applications Conference
, 2003
"... With the development of mobile computing, applications have to be accessible at any time, from any device and in any place in a wide variety of execution contexts. Conse-quently, applications have to adapt to different terminal ca-pabilities both for efficiency and ergonomics. In this paper, we pres ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
(Show Context)
With the development of mobile computing, applications have to be accessible at any time, from any device and in any place in a wide variety of execution contexts. Conse-quently, applications have to adapt to different terminal ca-pabilities both for efficiency and ergonomics. In this paper, we present a deployment infrastructure, called Smart Deployment Infrastructure (SDI), which aims to ease the installation of large distributed applications for any kind of user terminal. SDI is designed to take into ac-count the execution context (including available resources and the user’s terminal capabilities) in order to bring an application to the user and adapt it to the execution context. By considering an application as an assembly of distribu-ted software components, SDI provides the opportunity to decide at installation time which components, among pack-aged components, will be instantiated on the terminal and which ones will be installed on other hosts. SDI implementation demonstrates that the deployment infrastructure offers acceptable application deployment times and, at the same time, lowers both the application execution times and terminal resource consumption. 1.
ECOS: Leveraging Software-Defined Networks to Support Mobile Application Offloading
"... Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applicatio ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks to make offloading amenable to adoption by enterprises: (i) ensuring privacy and trustworthiness of offload, (ii) decoupling offloading systems from their reliance on the availability of dedicated resources and (iii) accommodating offload at scale. We present the design and implementation of ECOS, an enterprise-centric offloading framework that leverages Software-Defined Networking to augment prior offloading proposals and address these limitations. ECOS functions as an application running at an enterprise-wide controller to allocate resources to mobile applications based on privacy and performance requirements, to ensure fairness, and to enforce security constraints. Experiments using a prototype based on Android and OpenFlow establish the effectiveness of our approach.
P2P Systems Meet Mobile Computing: A Community-Oriented Software Infrastructure for Mobile Social Applications
"... The widespread adoption of powerful mobile devices creates an unprecedented potential for innovative mobile applications that can enhance users ’ social interactions. The current centralized mobile system and service architectures do not allow large-scale dynamic interactions between mobile devices, ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
(Show Context)
The widespread adoption of powerful mobile devices creates an unprecedented potential for innovative mobile applications that can enhance users ’ social interactions. The current centralized mobile system and service architectures do not allow large-scale dynamic interactions between mobile devices, as required by these applications. This paper proposes Mobius, a decentralized solution that supports mobile social applications via a two-tier software infrastructure. In Mobius, a socially-aware peer-to-peer tier provides community-oriented data and persistent services for the mobile tier that runs the applications. 1.
Ecos: practical mobile application offloading for enterprises
- in Proc. Int. Conf. Mobile Systems, Applications And Services
, 2012
"... Abstract Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-ofbusiness applications on handhelds. However, we must address two practical road ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-ofbusiness applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.
Virtual Personal Assistants in a Pervasive Computing World
- In Proceedings of IEEE Systems, Man and Cybernetics, UK-RI 3rd Workshop on Intelligent Cybernetic Systems, ICS'04
, 2004
"... Abstract ..."
(Show Context)
A Collective Approach to Harness Idle Resources of End Nodes
"... We propose a collective approach for harnessing the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet. Instead of a purely peer-to-peer (P2P) approach, we organize participating nodes to act collectively using collective managers (CMs). Parti ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
We propose a collective approach for harnessing the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet. Instead of a purely peer-to-peer (P2P) approach, we organize participating nodes to act collectively using collective managers (CMs). Participating nodes provide idle resources to CMs, which unify these resources to run meaningful distributed services for external clients. We do not assume altruistic users or employ a barterbased incentive model; instead, participating nodes provide resources to CMs for long durations and are compensated in proportion to their contribution. In this thesis we discuss the challenges faced by collective systems, present a design that addresses these challenges, and study the effect of selfish nodes. We believe that the collective service model is a useful alternative to the dominant pure P2P and centralized work queue models. It provides more effective utilization of idle resources, has a more meaningful economic model, and is better suited for building legal and commercial distributed services. We demonstrate the value of our work by building three distributed services using the collective approach. These services are: a collective content distrbution service, a collective data backup service, and a high-performance computing service on top of the collective overlay. 1
Automatic Distribution of Java Byte-Code Based on Dependence Analysis
"... One way to relieve resources when executing a program on constrained devices is to migrate parts of it to other machines in a distributed system. Ideally, a system can automatically decide where to place parts of a program to satisfy resource constrains (CPU, memory bandwidth, battery power, etc.). ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
One way to relieve resources when executing a program on constrained devices is to migrate parts of it to other machines in a distributed system. Ideally, a system can automatically decide where to place parts of a program to satisfy resource constrains (CPU, memory bandwidth, battery power, etc.). We describe a compiler and virtual machine infrastructure as the context for research in automatic program partitioning and optimization for distributed execution. We define program partitioning as the process of decomposing a program into multiple tasks. The main motivation for our design is to enable experimenting with optimizing program execution on resource-constrained devices with respect to memory consumption, CPU time, battery lifetime and communication.
Architecture strategies for cyber-foraging: Preliminary results from a systematic literature review.
- In Proceedings of the 8th European Conference on Software Architecture (ECSA 2014),
, 2014
"... Abstract. Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing ap ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
(Show Context)
Abstract. Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyberforaging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future.