European Conference on Software Architecture

Software Architecture pp 195-211 | Cite as

Characterization of Cyber-Foraging Usage Contexts

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9278)

Abstract

Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2009, pp. 280–293. ACM, New York (2009)Google Scholar
  2. 2.
    Lewis, G.A., Lago, P., Procaccianti, G.: Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 154–169. Springer, Heidelberg (2014) Google Scholar
  3. 3.
    Lewis, G., Lago, P.: A catalogue of architectural tactics for cyber-foraging, Tech. rep., VU University Amsterdam (2014). http://goo.gl/rDCt3V
  4. 4.
    Lewis, G.,Lago, P.: A catalogue of architectural tactics for cyber-foraging. In: Proceedings of the 11th International ACM Sigsoft Conference on the Quality of Software Architectures (QoSA 2015) (2015)Google Scholar
  5. 5.
    Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43(4), 51–56 (2010)CrossRefGoogle Scholar
  6. 6.
    Bass, L., Clements, P., Kazman, R.: Software architecture in practice, 3rd edn. Addison-Wesley (2012)Google Scholar
  7. 7.
    Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: A survey. Future Generation Computer Systems 29, 84106 (2012)Google Scholar
  8. 8.
    Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys Tutorials 16(1), 337–368 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Carnegie Mellon Software Engineering InstitutePittsburghUSA
  2. 2.VU University AmsterdamAmsterdamThe Netherlands

Personalised recommendations