Skip to main content

A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment

  • Conference paper
Recent Trends in Wireless and Mobile Networks (CoNeCo 2011, WiMo 2011)

Abstract

Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as onstatic computers. However, these devices oftenhave lower performance than static computers that is due to the constraints imposed on mobile devicesby weight, size, and mobility. Cyber foraging approaches have tried to amelioratethe lower performance of mobile devices by exploiting more powerful static computersto run some computational intensive taskson behalfof mobile devices. Unfortunately, these approaches havenot been effective in all contexts. In this paper, we propose a new context-aware cyber foraging approachto select the best location to run an application, based oncontext metrics such as application specification, computation cost and communication cost. Experimental results show the superiority of ourproposed approach in achieving lower response time andenergy consumptionin executing some benched applications compared to when these applications are solely run on mobile devices or when theseapplications aretotallyoffloaded blindly to surrogates for execution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 94–104 (September 1991)

    Google Scholar 

  2. Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communicatin 8 (August 2001)

    Google Scholar 

  3. Kolos-Mazuryk, L., et al.: Development of a Requirements Engineering Method for Pervasive Services. In: RE 2005 Doctoral Consortium, Paris,France (2005)

    Google Scholar 

  4. Balan, R.K., et al.: Simplifying Cyber Foraging for Mobile Devices. In: 5th USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), San Juan (2007)

    Google Scholar 

  5. Flinn, J., et al.: Balancing Performance, Energy, and Quality in Pervasive Computing. In: 22nd International Conference on Distributed Computing Systems, ICDCS 2002 (2002)

    Google Scholar 

  6. Murarasu, A.F., Magedanz, T.: Mobile Middleware Solution for Automatic Reconfiguration of Applications. In: 6th International IEEE Conference on Information Technology (2009)

    Google Scholar 

  7. Chun, B.G., Maniatis, P.: Augmented Smartphone Applications through Clone Cloud Execution. In: 8th Workshop on Hot Topics in Operating Systems (HotOS), Monte Verita (2009)

    Google Scholar 

  8. Balan, R.K.: Simplifying Cyber Foraging. PhD Thesis, Carnegie Mellon University, Pittsburgh (2006)

    Google Scholar 

  9. Balan, R.K., et al.: Tactics-Based Remote Execution for Mobile Computing. In: 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273–286 (2003)

    Google Scholar 

  10. Gu, X., et al.: Adaptive Offloading for Pervasive Computing. IEEE Pervasive Computing Magazine 3 (July 2004)

    Google Scholar 

  11. Ou, S., et al.: An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications, PERCOM 2006 (2006)

    Google Scholar 

  12. Ou, S., et al.: An Efficient Runtime Offloading Approach for Pervasive Services. In: IEEE Wireless Communications & Networking Conference, WCNC 2006, Las Vegas (2006)

    Google Scholar 

  13. Song, X.: Seamless Mobility in Ubiquitous Computing Environments. PhD Thesis, Georgia Institute of Technology (2008)

    Google Scholar 

  14. Song, X., Ramachandran, U.: MobiGo: A Middleware for Seamless Mobility. In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), Daegu, pp. 249–256 (2007)

    Google Scholar 

  15. Kristensen, M.D.: Empowering Mobile Devices Through Cyber Foraging:The Development of Scavenger, an Open Mobile Cyber Foraging System. PhD Thesis, Department of Computer Science, Aarhus University, Denmark (2010)

    Google Scholar 

  16. Othrnan, M., Hailes, S.: Power Conservation Strategy for Mobile Computers Using load sharing. Mobile Computing and Communications Review 2, 19–26 (1998)

    Article  Google Scholar 

  17. Cuervo, E., et al.: MAUI: Making Smartphones Last Longer with Code Offload. In: ACM MobiSys, San Francisco (2010)

    Google Scholar 

  18. Kemp, R., et al.: eyeDentify: Multimedia Cyber Foraging from a Smartphone. In: IEEE International Symposium on Multimedia (ISM 2009), San Diego (2009)

    Google Scholar 

  19. Satyanarayanan, M.: Avoiding Dead Batteries. IEEE Pervasive Computing 4, 2–3 (2005)

    Google Scholar 

  20. Zhang, J., Figueiredo, R.J.: Application Classification through Monitoring and Learning of Resource Consumption Patterns. In: 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS (2006)

    Google Scholar 

  21. Park, E., Shin, H., Kim, S.J.: Selective Grid Access for Energy-Aware Mobile Computing. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 798–807. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kafaie, S., Kashefi, O., Sharifi, M. (2011). A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment. In: Özcan, A., Zizka, J., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. CoNeCo WiMo 2011 2011. Communications in Computer and Information Science, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21937-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21937-5_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21936-8

  • Online ISBN: 978-3-642-21937-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics