Open Access Open Access  Restricted Access Subscription Access

A Survey of Cyber foraging Systems:Open Issues, Research Challenges


Affiliations
1 Department of Computer Science and Engineering, Pragati Engineering College (Autonomous), India
 

This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.

Keywords

Cyber Foraging, Resource Deficient, LOCUSTS, Sligshot, Pupetter, Task Migration.
User
Notifications
Font Size

  • Perry,Mark, O'hara,Kenton, Sellen,Abigail, Brown,Barry&Harper,Richard, (2001) "Dealing with Mobility: Understanding Access Anytime, Anywhere,"Transactions on Computer-Human Interaction (TOCHI), Vol. 8, No. 4, pp. 323-347.
  • M. Satyanarayanan, (2001) "Pervasive Computing: Vision and Challenges," IEEE Personal Communication, Vol. 8, No. 4, pp. 10-17..
  • Balan, Rajesh Krishna, Flinn, Jason, Satyanarayanan, Mahadev, Sinnamohideen,S.&Yang, H.I.,(2002) "The Case for Cybef Foraging," presented at the 10th Workshop on ACM SIGOPS European Workshop: beyond the PC, New York, NY, USA, pp. 87-92..
  • Chun, Byung-Gon & Maniatis, Petros, (2010) "Dynamically Partitioning Applications between Weak Devices and Clouds," in 1st ACM Workshop on Mobile Cloud Computing and Services(MCS 2010), San Francisco, pp. 1-5.
  • Kemp, Roelof, Palmer, Nicholas, Kielmann, Thilo, Seinstra, Frank, Drost, Niels, Maassen,Jason&Bal, Henri, (2009) "eyeDentify: Multimedia Cyber Foraging from a Smartphone," in IEEE International Symposium on Multimedia (ISM2009), San Diego, pp. 392-399.
  • A. Fox, S. D. Gribble, E. A. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. Sigplan Notices, 31(9):160–170, September 1996.
  • Randy H. Katz. Adaptation and mobility in wireless information systems. IEEE Personal Communications, 1(1):6–17, 1994.
  • Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, and Kevin R. Walker. Agile application-aware adaptation for mobility. Operating Systems Review (ACM), 51(5):276–287, December 1997.
  • M. Satyanarayanan, (2001) "Pervasive Computing: Vision and Challenges," IEEE Personal Communication, Vol. 8, No. 4, pp. 10-17.
  • Balan, Rajesh Krishna, Flinn, Jason, Satyanarayanan, Mahadev, Sinnamohideen,S.&Yang, H.I., (2002) "The Case for Cybef Foraging," presented at the 10th Workshop on ACM SIGOPS European Workshop: beyond the PC, New York, NY, USA, pp. 87-92.
  • Balan, Rajesh Krishna, Satyanarayanan, Mahadev, Park, SoYoung&Okoshi, Tadashi,(2003) "Tactics-Based Remote Execution for Mobile Computing," in 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273-286.
  • Gu, Xiaohui, Messer, Alan, Greenbergx, Ira, Milojicic, Dejan&Nahrstedt, Klara, (2004) "Adaptive Offloading for Pervasive Computing," IEEE Pervasive Computing Magazine, Vol. 3, No. 3, pp. 66-73.
  • Ou, Shumao, Yang, Kun&Liotta, Antonio,(2006) "An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems," in 4th Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06), Pisa, Italy, pp. 116-125.

Abstract Views: 181

PDF Views: 4




  • A Survey of Cyber foraging Systems:Open Issues, Research Challenges

Abstract Views: 181  |  PDF Views: 4

Authors

Manas Kumar Yogi
Department of Computer Science and Engineering, Pragati Engineering College (Autonomous), India
Darapu Uma
Department of Computer Science and Engineering, Pragati Engineering College (Autonomous), India

Abstract


This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.

Keywords


Cyber Foraging, Resource Deficient, LOCUSTS, Sligshot, Pupetter, Task Migration.

References