2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems 2007
DOI: 10.1109/mobhoc.2007.4428751
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic computing for wireless sensor networks

Abstract: Wireless sensor networks are moving from academia to real world scenarios. This will involve, in the near future, the design and production of hardware platforms characterized by low-cost and small form factor. As a consequence, the amount of resources available on a single node, i.e. computing power, storage, and energy, will be even more constrained than today. This paper faces the problem of storing and executing an application that exceeds the memory resources available on a single node. The proposed solut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…This concept considers the opportunistic and collaborative use of any resource available in the network, exploiting the functionality of the other available devices in the environment and maybe changing node roles during runtime (Avvenuti et al, 2007).…”
Section: Resultsmentioning
confidence: 99%
“…This concept considers the opportunistic and collaborative use of any resource available in the network, exploiting the functionality of the other available devices in the environment and maybe changing node roles during runtime (Avvenuti et al, 2007).…”
Section: Resultsmentioning
confidence: 99%
“…It became an interesting field for research and development [36]. The study in [37] addresses the problem of storing and executing an application that surpasses the memory resources available on a single node. Their work was based on dividing the code into a number of modules that are cooperating opportunistically.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, opportunistic computing, as a new pervasive computing paradigm, has received much attention [6], [7], [8], [9]. Essentially, opportunistic computing is characterized by exploiting all available computing resources in an opportunistic environment to provide a platform for the distributed execution of a computing-intensive task [9].…”
Section: Fig 1 Pervasive Health Monitoring In M-healthcare Systemmentioning
confidence: 99%
“…Essentially, opportunistic computing is characterized by exploiting all available computing resources in an opportunistic environment to provide a platform for the distributed execution of a computing-intensive task [9]. For example, once the execution of a task exceeds the energy and computing power available on a single node, other opportunistically contacted nodes can contribute to the execution of the original task by running a subset of task, so that the original task can be reliably performed [6]. Obviously, opportunistic computing paradigm can be applied in m-Healthcare emergency to resolve the challenging reliability issue in PHI process.…”
Section: Fig 1 Pervasive Health Monitoring In M-healthcare Systemmentioning
confidence: 99%