CoNeCo 2011, WiMo 2011: Recent Trends in Wireless and Mobile Networks pp 358-367 | Cite as
A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment
Abstract
Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as onstatic computers. However, these devices oftenhave lower performance than static computers that is due to the constraints imposed on mobile devicesby weight, size, and mobility. Cyber foraging approaches have tried to amelioratethe lower performance of mobile devices by exploiting more powerful static computersto run some computational intensive taskson behalfof mobile devices. Unfortunately, these approaches havenot been effective in all contexts. In this paper, we propose a new context-aware cyber foraging approachto select the best location to run an application, based oncontext metrics such as application specification, computation cost and communication cost. Experimental results show the superiority of ourproposed approach in achieving lower response time andenergy consumptionin executing some benched applications compared to when these applications are solely run on mobile devices or when theseapplications aretotallyoffloaded blindly to surrogates for execution.
Keywords
Cyber Foraging Offloading Surrogate Pervasive Computing Mobile Computing Resource ConstraintPreview
Unable to display preview. Download preview PDF.
References
- 1.Weiser, M.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 94–104 (September 1991)Google Scholar
- 2.Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communicatin 8 (August 2001)Google Scholar
- 3.Kolos-Mazuryk, L., et al.: Development of a Requirements Engineering Method for Pervasive Services. In: RE 2005 Doctoral Consortium, Paris,France (2005)Google Scholar
- 4.Balan, R.K., et al.: Simplifying Cyber Foraging for Mobile Devices. In: 5th USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), San Juan (2007)Google Scholar
- 5.Flinn, J., et al.: Balancing Performance, Energy, and Quality in Pervasive Computing. In: 22nd International Conference on Distributed Computing Systems, ICDCS 2002 (2002)Google Scholar
- 6.Murarasu, A.F., Magedanz, T.: Mobile Middleware Solution for Automatic Reconfiguration of Applications. In: 6th International IEEE Conference on Information Technology (2009)Google Scholar
- 7.Chun, B.G., Maniatis, P.: Augmented Smartphone Applications through Clone Cloud Execution. In: 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita (2009)Google Scholar
- 8.Balan, R.K.: Simplifying Cyber Foraging. PhD Thesis, Carnegie Mellon University, Pittsburgh (2006)Google Scholar
- 9.Balan, R.K., et al.: Tactics-Based Remote Execution for Mobile Computing. In: 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273–286 (2003)Google Scholar
- 10.Gu, X., et al.: Adaptive Offloading for Pervasive Computing. IEEE Pervasive Computing Magazine 3 (July 2004)Google Scholar
- 11.Ou, S., et al.: An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 2006 (2006)Google Scholar
- 12.Ou, S., et al.: An Efficient Runtime Offloading Approach for Pervasive Services. In: IEEE Wireless Communications & Networking Conference, WCNC 2006, Las Vegas (2006)Google Scholar
- 13.Song, X.: Seamless Mobility in Ubiquitous Computing Environments. PhD Thesis, Georgia Institute of Technology (2008)Google Scholar
- 14.Song, X., Ramachandran, U.: MobiGo: A Middleware for Seamless Mobility. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, pp. 249–256 (2007)Google Scholar
- 15.Kristensen, M.D.: Empowering Mobile Devices Through Cyber Foraging:The Development of Scavenger, an Open Mobile Cyber Foraging System. PhD Thesis, Department of Computer Science, Aarhus University, Denmark (2010)Google Scholar
- 16.Othrnan, M., Hailes, S.: Power Conservation Strategy for Mobile Computers Using load sharing. Mobile Computing and Communications Review 2, 19–26 (1998)CrossRefGoogle Scholar
- 17.Cuervo, E., et al.: MAUI: Making Smartphones Last Longer with Code Offload. In: ACM MobiSys, San Francisco (2010)Google Scholar
- 18.Kemp, R., et al.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (ISM 2009), San Diego (2009)Google Scholar
- 19.Satyanarayanan, M.: Avoiding Dead Batteries. IEEE Pervasive Computing 4, 2–3 (2005)Google Scholar
- 20.Zhang, J., Figueiredo, R.J.: Application Classification through Monitoring and Learning of Resource Consumption Patterns. In: 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS (2006)Google Scholar
- 21.Park, E., Shin, H., Kim, S.J.: Selective Grid Access for Energy-Aware Mobile Computing. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 798–807. Springer, Heidelberg (2007)CrossRefGoogle Scholar