Abstract
Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as onstatic computers. However, these devices oftenhave lower performance than static computers that is due to the constraints imposed on mobile devicesby weight, size, and mobility. Cyber foraging approaches have tried to amelioratethe lower performance of mobile devices by exploiting more powerful static computersto run some computational intensive taskson behalfof mobile devices. Unfortunately, these approaches havenot been effective in all contexts. In this paper, we propose a new context-aware cyber foraging approachto select the best location to run an application, based oncontext metrics such as application specification, computation cost and communication cost. Experimental results show the superiority of ourproposed approach in achieving lower response time andenergy consumptionin executing some benched applications compared to when these applications are solely run on mobile devices or when theseapplications aretotallyoffloaded blindly to surrogates for execution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser, M.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 94–104 (September 1991)
Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communicatin 8 (August 2001)
Kolos-Mazuryk, L., et al.: Development of a Requirements Engineering Method for Pervasive Services. In: RE 2005 Doctoral Consortium, Paris,France (2005)
Balan, R.K., et al.: Simplifying Cyber Foraging for Mobile Devices. In: 5th USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), San Juan (2007)
Flinn, J., et al.: Balancing Performance, Energy, and Quality in Pervasive Computing. In: 22nd International Conference on Distributed Computing Systems, ICDCS 2002 (2002)
Murarasu, A.F., Magedanz, T.: Mobile Middleware Solution for Automatic Reconfiguration of Applications. In: 6th International IEEE Conference on Information Technology (2009)
Chun, B.G., Maniatis, P.: Augmented Smartphone Applications through Clone Cloud Execution. In: 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita (2009)
Balan, R.K.: Simplifying Cyber Foraging. PhD Thesis, Carnegie Mellon University, Pittsburgh (2006)
Balan, R.K., et al.: Tactics-Based Remote Execution for Mobile Computing. In: 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273–286 (2003)
Gu, X., et al.: Adaptive Offloading for Pervasive Computing. IEEE Pervasive Computing Magazine 3 (July 2004)
Ou, S., et al.: An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 2006 (2006)
Ou, S., et al.: An Efficient Runtime Offloading Approach for Pervasive Services. In: IEEE Wireless Communications & Networking Conference, WCNC 2006, Las Vegas (2006)
Song, X.: Seamless Mobility in Ubiquitous Computing Environments. PhD Thesis, Georgia Institute of Technology (2008)
Song, X., Ramachandran, U.: MobiGo: A Middleware for Seamless Mobility. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, pp. 249–256 (2007)
Kristensen, M.D.: Empowering Mobile Devices Through Cyber Foraging:The Development of Scavenger, an Open Mobile Cyber Foraging System. PhD Thesis, Department of Computer Science, Aarhus University, Denmark (2010)
Othrnan, M., Hailes, S.: Power Conservation Strategy for Mobile Computers Using load sharing. Mobile Computing and Communications Review 2, 19–26 (1998)
Cuervo, E., et al.: MAUI: Making Smartphones Last Longer with Code Offload. In: ACM MobiSys, San Francisco (2010)
Kemp, R., et al.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (ISM 2009), San Diego (2009)
Satyanarayanan, M.: Avoiding Dead Batteries. IEEE Pervasive Computing 4, 2–3 (2005)
Zhang, J., Figueiredo, R.J.: Application Classification through Monitoring and Learning of Resource Consumption Patterns. In: 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS (2006)
Park, E., Shin, H., Kim, S.J.: Selective Grid Access for Energy-Aware Mobile Computing. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 798–807. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kafaie, S., Kashefi, O., Sharifi, M. (2011). A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment. In: Özcan, A., Zizka, J., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. CoNeCo WiMo 2011 2011. Communications in Computer and Information Science, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21937-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-21937-5_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21936-8
Online ISBN: 978-3-642-21937-5
eBook Packages: Computer ScienceComputer Science (R0)