Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking 2010
DOI: 10.1145/1859995.1860005
|View full text |Cite
|
Sign up to set email alerts
|

Intentional networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(9 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Intentional networking [10] relies on the application's intent that provides information about the data to request. Applications declare labels which defines the importance and the urgency of the requested data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Intentional networking [10] relies on the application's intent that provides information about the data to request. Applications declare labels which defines the importance and the urgency of the requested data.…”
Section: Related Workmentioning
confidence: 99%
“…To solve this problem, some authors [4]- [10] use a multiuse interface connectivity, which can be supported at various layers in the network stack, such as TCP (MPTCP), sockets, and the HTTP layer, thereby enabling the mobile device to send and receive data through multiple network interfaces simultaneously. Some works modify the link layer [4] in a way that an application sends traffic by connecting to a virtual ethernet interface that stitches multiple interfaces together.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…One way Android mitigates Alarms' negative impact is batching, i.e., by executing alarms with (reasonably) proximate execution scheduled times together. Batching can greatly reduce total device awake time while increasing the chance that traffic from different applications can occur simultaneously (and thus greatly reducing energy consumption [26,33,79,98,112,149]). Unfortunately, the success of batching depends on the correct usage of alarm APIs (by applications) which widespread and impact are unknown.…”
Section: Execution Schedulingmentioning
confidence: 99%
“…However, Vergara et al [150] recognized that most traffic shaping algorithms (aggregation and delay) proposed in literature [26,33,79,98,112,149] were based on traffic simulation using pre-recorded packet traces. It claims that these approaches ignore application-protocol interactions and do not measure the energy consumption of the respective solutions.…”
Section: Android Energy Consumptionmentioning
confidence: 99%