Skip to main content

Characterization of Cyber-Foraging Usage Contexts

  • Conference paper
  • First Online:
Software Architecture (ECSA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9278))

Included in the following conference series:

Abstract

Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2009, pp. 280–293. ACM, New York (2009)

    Google Scholar 

  2. Lewis, G.A., Lago, P., Procaccianti, G.: Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 154–169. Springer, Heidelberg (2014)

    Google Scholar 

  3. Lewis, G., Lago, P.: A catalogue of architectural tactics for cyber-foraging, Tech. rep., VU University Amsterdam (2014). http://goo.gl/rDCt3V

  4. Lewis, G.,Lago, P.: A catalogue of architectural tactics for cyber-foraging. In: Proceedings of the 11th International ACM Sigsoft Conference on the Quality of Software Architectures (QoSA 2015) (2015)

    Google Scholar 

  5. Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43(4), 51–56 (2010)

    Article  Google Scholar 

  6. Bass, L., Clements, P., Kazman, R.: Software architecture in practice, 3rd edn. Addison-Wesley (2012)

    Google Scholar 

  7. Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: A survey. Future Generation Computer Systems 29, 84106 (2012)

    Google Scholar 

  8. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys Tutorials 16(1), 337–368 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Grace A. Lewis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lewis, G.A., Lago, P. (2015). Characterization of Cyber-Foraging Usage Contexts. In: Weyns, D., Mirandola, R., Crnkovic, I. (eds) Software Architecture. ECSA 2015. Lecture Notes in Computer Science(), vol 9278. Springer, Cham. https://doi.org/10.1007/978-3-319-23727-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23727-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23726-8

  • Online ISBN: 978-3-319-23727-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics