Cyber foraging

Cyber foraging is a pervasive computing technique where resource-poor mobile devices offload some of their heavy work to stronger surrogate machines in the vicinity. The term cyber foraging was coined by M. Satyanarayanan in his 2001 paper "Pervasive Computing: Vision and Challenges".[1]

A number of cyber foraging systems have been proposed within academia:

  1. Framework for Power Aware Remote Processing, by Gerald Kaefer et al.[2][3][4][5][6]
  2. Puppeteer, by de Lara et al.[7]
  3. Spectra, by Flinn. et al.[8]
  4. Chroma, by Balan et al.[9]
  5. Goyal & Carter's system[10]
  6. Slingshot, by Su & Flinn[11]
  7. Scavenger, by Kristensen [12]

References

  1. Satyanarayanan, Mahadev (2001). "Pervasive Computing: Vision and Challenges". IEEE Personal Communications. IEEE. 8 (4): 10–17. doi:10.1109/98.943998.
  2. Käfer, Gerald; Josef Haid; Gerhard Schall; Reinhold Weiss (2001). "The Standard Power Estimation Interface for Software Components". Proceedings of the Workshop on Mobile Computing (TCMC 2001).
  3. Käfer, Gerald; Josef Haid; Gerhard Schall; Reinhold Weiss (2001). "Framework for Power Aware Remote Processing: The Dynamic Power Estimation Process". Proceedings of the Workshop on Mobile Computing (TCMC 2001).
  4. Käfer, Gerald; Josef Haid; Bernd Hofer; Gerhard Schall; Reinhold Weiss (2001). "Framework for Power Aware Remote Processing: Design and Implementation of a Dynamic Power Estimation Unit". Proceedings of the IEEE Symposium on Wearable Computers (ISWC 2001): 159–160. doi:10.1109/ISWC.2001.962121. ISBN 0-7695-1318-2.
  5. Käfer, Gerald; Josef Haid; Karl Voit; Reinhold Weiss (2002). "Architectural Software Power Estimation Support for Power Aware Remote Processing". Proceedings of the Fourteenth IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2002).
  6. Voit, Karl (2003). "Implementation of a Transparent Code Migration Unit for Power Aware Remote Processing using JAVA". Archived from the original on 2012-12-17. Cite journal requires |journal= (help)
  7. de Lara, Eyal; Wallach, Dan S.; Zwaenepoel, Willy (2001). "Puppeteer: Component-based Adaptation for Mobile Computing". Proceedings of the 3rd Conference on USENIX Symposium on Internet Technologies and Systems. USENIX Association.
  8. Flinn, Jason; Park, Soyoung; Satyanarayanan, Mahadev (2002). Balancing performance, energy, and quality in pervasive computing. 22nd International Conference on Distributed Computing Systems. IEEE.
  9. Balan, Rajesh (2003). "Tactics-based remote execution for mobile computing". Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. ACM.
  10. Goyal, S.; Carter, J. (2004). "A lightweight secure cyber foraging infrastructure for resource-constrained devices". Sixth IEEE Workshop on Mobile Computing Systems and Applications. IEEE: 186–195. doi:10.1109/MCSA.2004.2. ISBN 0-7695-2258-0.
  11. Ya-Yunn, Su; Flinn, Jason (2005). "Slingshot: deploying stateful services in wireless hotspots". Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM.
  12. "The Scavenger Cyber Foraging System". Archived from the original on 2012-07-17.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.