2010
DOI: 10.1016/j.pmcj.2010.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling and development support in the Scavenger cyber foraging system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(35 citation statements)
references
References 13 publications
0
35
0
Order By: Relevance
“…In recent work, Kristensen et al [9] propose Scavenger, a cyber foraging system in Python which outsources Python methods, and the scheduler orchestrating this outsourcing process uses history-based profiles. MAUI [8] offloads methods of Microsoft .Net applications in order to save energy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent work, Kristensen et al [9] propose Scavenger, a cyber foraging system in Python which outsources Python methods, and the scheduler orchestrating this outsourcing process uses history-based profiles. MAUI [8] offloads methods of Microsoft .Net applications in order to save energy.…”
Section: Related Workmentioning
confidence: 99%
“…Today many such cyber foraging systems exist, offloading applications either on a VM [4][3], software component [5][6] [7] or a method level [8] [9]. Although a lot of research has been done on profiling and partitioning applications and decision algorithms to decide when to offload, two important issues still remain.…”
Section: Introductionmentioning
confidence: 99%
“…Song et al [16,17] has proposed a middleware architecture, called MobiGo, for seamless mobility to choose the best available service according to the bandwidth and latency, and Kristensen [18,19] has introduced Scavenger as a cyber foraging framework whose focus is on CPU power of mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…Many researches [3,12,13,15,19,22] have considered this step.foraging is making -Remote execution control. The final step involves the establishment of a reliable connection between the mobile device and the appropriate surrogate to pass required information, remote execution, and the receipt of returned results.…”
Section: -Context Gatheringmentioning
confidence: 99%
See 1 more Smart Citation