2014
DOI: 10.1007/978-3-319-09970-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review

Abstract: Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more power… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(26 citation statements)
references
References 43 publications
0
26
0
Order By: Relevance
“…Cloudlet discovery is based on the Avahi daemon 1 that implements Zeroconf (Zero Configuration Networking). 2 Avahi uses DNS Service Discovery (DNS-SD) along with Multicast DNS to enable a client to request a service without knowing the IP address of the server that provide the service. Cloudlet discovery by cloudlet-ready apps takes place as follows: replies with a DNS-SD Response indicating the IP address and port of the cloudlet server.…”
Section: Surrogate Broadcastmentioning
confidence: 99%
See 2 more Smart Citations
“…Cloudlet discovery is based on the Avahi daemon 1 that implements Zeroconf (Zero Configuration Networking). 2 Avahi uses DNS Service Discovery (DNS-SD) along with Multicast DNS to enable a client to request a service without knowing the IP address of the server that provide the service. Cloudlet discovery by cloudlet-ready apps takes place as follows: replies with a DNS-SD Response indicating the IP address and port of the cloudlet server.…”
Section: Surrogate Broadcastmentioning
confidence: 99%
“…In addition to successful test results, data collected included cloudlet provisioning time, energy consumption on the mobile device, payload size and response time. All implementation details and supporting data are available in several publications [2,6,10,11].…”
Section: Mapping Between Tactics and Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…One of these system-level concerns is security [19]. A scenario for Security is the following: A mobile app is enabled for cyber-foraging and is in the process of discovering a surrogate for computation offload.…”
Section: Securitymentioning
confidence: 99%
“…A set of 57 primary studies was identified (their preliminary analysis is available in [19]). The studies were categorized based on decisions regarding the following concerns:…”
Section: Introductionmentioning
confidence: 99%