CoNeCo 2011, WiMo 2011: Recent Trends in Wireless and Mobile Networks pp 358-367 | Cite as

A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment

  • Somayeh Kafaie
  • Omid Kashefi
  • Mohsen Sharifi
Part of the Communications in Computer and Information Science book series (CCIS, volume 162)

Abstract

Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as onstatic computers. However, these devices oftenhave lower performance than static computers that is due to the constraints imposed on mobile devicesby weight, size, and mobility. Cyber foraging approaches have tried to amelioratethe lower performance of mobile devices by exploiting more powerful static computersto run some computational intensive taskson behalfof mobile devices. Unfortunately, these approaches havenot been effective in all contexts. In this paper, we propose a new context-aware cyber foraging approachto select the best location to run an application, based oncontext metrics such as application specification, computation cost and communication cost. Experimental results show the superiority of ourproposed approach in achieving lower response time andenergy consumptionin executing some benched applications compared to when these applications are solely run on mobile devices or when theseapplications aretotallyoffloaded blindly to surrogates for execution.

Keywords

Cyber Foraging Offloading Surrogate Pervasive Computing Mobile Computing Resource Constraint 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Weiser, M.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 94–104 (September 1991)Google Scholar
  2. 2.
    Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communicatin 8 (August 2001)Google Scholar
  3. 3.
    Kolos-Mazuryk, L., et al.: Development of a Requirements Engineering Method for Pervasive Services. In: RE 2005 Doctoral Consortium, Paris,France (2005)Google Scholar
  4. 4.
    Balan, R.K., et al.: Simplifying Cyber Foraging for Mobile Devices. In: 5th USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), San Juan (2007)Google Scholar
  5. 5.
    Flinn, J., et al.: Balancing Performance, Energy, and Quality in Pervasive Computing. In: 22nd International Conference on Distributed Computing Systems, ICDCS 2002 (2002)Google Scholar
  6. 6.
    Murarasu, A.F., Magedanz, T.: Mobile Middleware Solution for Automatic Reconfiguration of Applications. In: 6th International IEEE Conference on Information Technology (2009)Google Scholar
  7. 7.
    Chun, B.G., Maniatis, P.: Augmented Smartphone Applications through Clone Cloud Execution. In: 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita (2009)Google Scholar
  8. 8.
    Balan, R.K.: Simplifying Cyber Foraging. PhD Thesis, Carnegie Mellon University, Pittsburgh (2006)Google Scholar
  9. 9.
    Balan, R.K., et al.: Tactics-Based Remote Execution for Mobile Computing. In: 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273–286 (2003)Google Scholar
  10. 10.
    Gu, X., et al.: Adaptive Offloading for Pervasive Computing. IEEE Pervasive Computing Magazine 3 (July 2004)Google Scholar
  11. 11.
    Ou, S., et al.: An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 2006 (2006)Google Scholar
  12. 12.
    Ou, S., et al.: An Efficient Runtime Offloading Approach for Pervasive Services. In: IEEE Wireless Communications & Networking Conference, WCNC 2006, Las Vegas (2006)Google Scholar
  13. 13.
    Song, X.: Seamless Mobility in Ubiquitous Computing Environments. PhD Thesis, Georgia Institute of Technology (2008)Google Scholar
  14. 14.
    Song, X., Ramachandran, U.: MobiGo: A Middleware for Seamless Mobility. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, pp. 249–256 (2007)Google Scholar
  15. 15.
    Kristensen, M.D.: Empowering Mobile Devices Through Cyber Foraging:The Development of Scavenger, an Open Mobile Cyber Foraging System. PhD Thesis, Department of Computer Science, Aarhus University, Denmark (2010)Google Scholar
  16. 16.
    Othrnan, M., Hailes, S.: Power Conservation Strategy for Mobile Computers Using load sharing. Mobile Computing and Communications Review 2, 19–26 (1998)CrossRefGoogle Scholar
  17. 17.
    Cuervo, E., et al.: MAUI: Making Smartphones Last Longer with Code Offload. In: ACM MobiSys, San Francisco (2010)Google Scholar
  18. 18.
    Kemp, R., et al.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (ISM 2009), San Diego (2009)Google Scholar
  19. 19.
    Satyanarayanan, M.: Avoiding Dead Batteries. IEEE Pervasive Computing 4, 2–3 (2005)Google Scholar
  20. 20.
    Zhang, J., Figueiredo, R.J.: Application Classification through Monitoring and Learning of Resource Consumption Patterns. In: 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS (2006)Google Scholar
  21. 21.
    Park, E., Shin, H., Kim, S.J.: Selective Grid Access for Energy-Aware Mobile Computing. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 798–807. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Somayeh Kafaie
    • 1
  • Omid Kashefi
    • 1
  • Mohsen Sharifi
    • 1
  1. 1.School of Computer EngineeringIran University of Science and TechnologyTehranIran

Personalised recommendations