• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Towards a distributed platform for resourceconstrained devices. (2002)

by A Messer
Venue:In ICDCS,
Add To MetaCart

Tools

Sorted by:
Results 11 - 20 of 41
Next 10 →

Pervasive Services Infrastructure

by Dejan Milojicic, Dejan S. Milojicic - In Proceedings of TES'01, 2001. LNCS , 2002
"... Technology has been advancing in the past century at an incredible rate. All predictions about the limits have been consistently broken for processor speed, network bandwidth, and memory size. Nevertheless, the way we use computers has not kept pace with the technology itself. Computers are stil ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Technology has been advancing in the past century at an incredible rate. All predictions about the limits have been consistently broken for processor speed, network bandwidth, and memory size. Nevertheless, the way we use computers has not kept pace with the technology itself. Computers are still being used in a similar way as a couple of decades ago.

Provisioning web services from resource constrained mobile devices

by Mahbub Hassan, Weiliang Zhao, Jian Yang, Mahbub Hassan, Weiliang Zhao, Jian Yang - In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on , 2010
"... constrained mobile devices ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
constrained mobile devices
(Show Context)

Citation Context

...offloading some executions to a nearbyssurrogate node at run time. This type of partitioning is moreschallenging than static partitioning. More research in thissarea can be found in [3], [4], [5] and =-=[6]-=-.sNot much work has been published in the area of Websservice hosting on mobile devices. One of the earliest workssin this area was proposed by IBM. They developed asprototype for a shopper-kiosk appl...

Context aware deployment for mobile users

by Chantal Taconet, Erik Putrycz, Guy Bernard - In Proceedings of the 7th International Computer Software and Applications Conference , 2003
"... With the development of mobile computing, applications have to be accessible at any time, from any device and in any place in a wide variety of execution contexts. Conse-quently, applications have to adapt to different terminal ca-pabilities both for efficiency and ergonomics. In this paper, we pres ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
With the development of mobile computing, applications have to be accessible at any time, from any device and in any place in a wide variety of execution contexts. Conse-quently, applications have to adapt to different terminal ca-pabilities both for efficiency and ergonomics. In this paper, we present a deployment infrastructure, called Smart Deployment Infrastructure (SDI), which aims to ease the installation of large distributed applications for any kind of user terminal. SDI is designed to take into ac-count the execution context (including available resources and the user’s terminal capabilities) in order to bring an application to the user and adapt it to the execution context. By considering an application as an assembly of distribu-ted software components, SDI provides the opportunity to decide at installation time which components, among pack-aged components, will be instantiated on the terminal and which ones will be installed on other hosts. SDI implementation demonstrates that the deployment infrastructure offers acceptable application deployment times and, at the same time, lowers both the application execution times and terminal resource consumption. 1.
(Show Context)

Citation Context

...n in the Jini Lookup Service. Adaptation to mobile devices capabilities may be done by reconfiguration of the application during the execution of the application. One example of this approach is AIDE =-=[8]-=- which offloads portions of an application from a resource constrained device to a nearby server. The portion of the application offloaded is a part of the graph of java classes calculated during the ...

ECOS: Leveraging Software-Defined Networks to Support Mobile Application Offloading

by Aaron Gember, Christopher Dragga, Aditya Akella
"... Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applicatio ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Offloading has emerged as a promising idea to allow resourceconstrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks to make offloading amenable to adoption by enterprises: (i) ensuring privacy and trustworthiness of offload, (ii) decoupling offloading systems from their reliance on the availability of dedicated resources and (iii) accommodating offload at scale. We present the design and implementation of ECOS, an enterprise-centric offloading framework that leverages Software-Defined Networking to augment prior offloading proposals and address these limitations. ECOS functions as an application running at an enterprise-wide controller to allocate resources to mobile applications based on privacy and performance requirements, to ensure fairness, and to enforce security constraints. Experiments using a prototype based on Android and OpenFlow establish the effectiveness of our approach.
(Show Context)

Citation Context

...cation-independent offloading has long been recognized as an important mechanism for enabling smartphone users to access resource-intensive applications without incurring energy and performance costs =-=[9, 13, 15, 22, 25]-=-. As mobile devices become the primary platforms for some employees, we believe mobile application offloading will be essential for running resource-intensive enterprise applications—e.g., modeling an...

P2P Systems Meet Mobile Computing: A Community-Oriented Software Infrastructure for Mobile Social Applications

by Cristian Borcea
"... The widespread adoption of powerful mobile devices creates an unprecedented potential for innovative mobile applications that can enhance users ’ social interactions. The current centralized mobile system and service architectures do not allow large-scale dynamic interactions between mobile devices, ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
The widespread adoption of powerful mobile devices creates an unprecedented potential for innovative mobile applications that can enhance users ’ social interactions. The current centralized mobile system and service architectures do not allow large-scale dynamic interactions between mobile devices, as required by these applications. This paper proposes Mobius, a decentralized solution that supports mobile social applications via a two-tier software infrastructure. In Mobius, a socially-aware peer-to-peer tier provides community-oriented data and persistent services for the mobile tier that runs the applications. 1.
(Show Context)

Citation Context

... This module is used by local contextaware applications to adapt their functionality. Furthermore, it can be used by the Offloading Manager to provide support for application or component offloading =-=[17, 9]-=- when the local resources are insufficient or the battery costs are too high. The offloading process is done in collaboration with the Offloading Admission service in the P2P tier, which decides wheth...

Ecos: practical mobile application offloading for enterprises

by Aaron Gember , Chris Dragga , Aditya Akella - in Proc. Int. Conf. Mobile Systems, Applications And Services , 2012
"... Abstract Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-ofbusiness applications on handhelds. However, we must address two practical road ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-ofbusiness applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.
(Show Context)

Citation Context

...l business tools, and enterprises are targeting both specialized (e.g., lineof-business) and common (e.g., dictation and transcription) mobile applications to these platforms [15]. Unfortunately, the complexity and overhead of the applications [10, 12], and the accompanying data protection issues, are seen as major impediments to full-fledged deployment on handheld devices [2, 4]. Application-indepedent offloading frameworks have long been recognized as an important mechanism for enabling smartphone users to access resource-intensive applications without incurring energy and performance costs [7, 9, 10, 14, 16]. As handhelds become the primary platforms for some employees, we believe mobile application offloading will be essential for running resource-intensive enterprise applications–e.g., modeling and analysis tools, handwriting and speech recognition, etc.—with suitable performance and energy usage. However, two key roadblocks currently prevent enterprise adoption of mobile application offloading. 1. Privacy and trust: Enterprise applications frequently operate on data with strict privacy requirements, requiring the use of trusted resources (e.g., servers in an enterprise data center) for applica...

Virtual Personal Assistants in a Pervasive Computing World

by John F Bradley , Brian R Duffy , Gregory M P O'hare , Alan N Martin , Bianca Schön - In Proceedings of IEEE Systems, Man and Cybernetics, UK-RI 3rd Workshop on Intelligent Cybernetic Systems, ICS'04 , 2004
"... Abstract ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

... ubiquitously integrated into our environment. In this scenario, people will require the ability to perform tasks using any device at hand regardless of whether the device is suitable for the task [4]=-=[5]-=-[7]. With a wide variety of devices, each with varying constraints, it would be quite difficult to develop services that would operate in a uniform manner across all platforms. With this in mind we of...

A Collective Approach to Harness Idle Resources of End Nodes

by Sachin Goyal
"... We propose a collective approach for harnessing the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet. Instead of a purely peer-to-peer (P2P) approach, we organize participating nodes to act collectively using collective managers (CMs). Parti ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
We propose a collective approach for harnessing the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet. Instead of a purely peer-to-peer (P2P) approach, we organize participating nodes to act collectively using collective managers (CMs). Participating nodes provide idle resources to CMs, which unify these resources to run meaningful distributed services for external clients. We do not assume altruistic users or employ a barterbased incentive model; instead, participating nodes provide resources to CMs for long durations and are compensated in proportion to their contribution. In this thesis we discuss the challenges faced by collective systems, present a design that addresses these challenges, and study the effect of selfish nodes. We believe that the collective service model is a useful alternative to the dominant pure P2P and centralized work queue models. It provides more effective utilization of idle resources, has a more meaningful economic model, and is better suited for building legal and commercial distributed services. We demonstrate the value of our work by building three distributed services using the collective approach. These services are: a collective content distrbution service, a collective data backup service, and a high-performance computing service on top of the collective overlay. 1

Automatic Distribution of Java Byte-Code Based on Dependence Analysis

by Roxana E. Diaconescu, Lei Wang, Michael Franz
"... One way to relieve resources when executing a program on constrained devices is to migrate parts of it to other machines in a distributed system. Ideally, a system can automatically decide where to place parts of a program to satisfy resource constrains (CPU, memory bandwidth, battery power, etc.). ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
One way to relieve resources when executing a program on constrained devices is to migrate parts of it to other machines in a distributed system. Ideally, a system can automatically decide where to place parts of a program to satisfy resource constrains (CPU, memory bandwidth, battery power, etc.). We describe a compiler and virtual machine infrastructure as the context for research in automatic program partitioning and optimization for distributed execution. We define program partitioning as the process of decomposing a program into multiple tasks. The main motivation for our design is to enable experimenting with optimizing program execution on resource-constrained devices with respect to memory consumption, CPU time, battery lifetime and communication.

Architecture strategies for cyber-foraging: Preliminary results from a systematic literature review.

by Grace A Lewis , Patricia Lago , Giuseppe Procaccianti - In Proceedings of the 8th European Conference on Software Architecture (ECSA 2014), , 2014
"... Abstract. Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing ap ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract. Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyberforaging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future.
(Show Context)

Citation Context

...revious page System Where When What Granularity Payload P ro x .D is co n n ec te d P ro x . C o n n ec te d R em o te R u n ti m e D ec is io n A lw ay s O ffl o a d P ro ce ss F u n ct io n C o m p o n en t S er v ic e A p p li ca ti o n C o m p u ta ti o n P a rt it io n in g A lg o . P a ra m et er s A p p li ca ti o n S ta te D ev ic e C o n te x t S o u rc e L o ca ti o n S et u p In st ru ct io n s C o n ti n u o u s D a ta Cuckoo [27] X X X X X X ThinkAir [28] X X X X X MACS [29] X X X X X X Scavenger [30] X X X X X AMCO [31] X X X X X X MCo [32] X X X X X PowerSense [33] X X X X AIDE [34] X X X X X Application Virtualization [35] X X X X X PARM [36] X X X X Resource Furnishing System [37] X X X X X Cloud Personal Assistant [38] X X X X X SOME [39] X X X X SmartVirtCloud [40] X X X X X Odessa [41] X X X X X Smartphone-Based Social Sensing [42] X X X X X MAPCloud [43] X X X X X VM-Based Cloudlets [44] X X X X X IC-Cloud [45] X X X X X SPADE [46] X X X X Slingshot [47] X X X X Offloading Toolkit and Service [48] X X X X X X Mobile Data Stream Application Framework [49] X X X X X Heterogeneous AutoOffloading Framework [50] X X X X Weblets [51] X X X X DPartner [52] X X X X X Elast...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University