Proceedings of the 10th Workshop on ACM SIGOPS European Workshop: Beyond the PC - EW10 2002
DOI: 10.1145/1133373.1133390
|View full text |Cite
|
Sign up to set email alerts
|

The case for cyber foraging

Abstract: In this paper, we propose cyber foraging: a mechanism to augment the computational and storage capabilities of mobile devices. Cyber foraging uses opportunistically discovered servers in the environment to improve the performance of interactive applications and distributed file systems on mobile clients. We show how the performance of distributed file systems can be improved by staging data at these servers even though the servers are not trusted. We also show how the performance of interactive applications ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
130
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 237 publications
(131 citation statements)
references
References 9 publications
0
130
0
1
Order By: Relevance
“…The origins of computational offloading are in cyberforaging, which aimed at distributing computations from a resource constrained (mobile) device to nearby infrastructure [21]. Since then, most of the work has focused on linking the device with remote infrastructure or a hybrid that combines remote and local connectivity.…”
Section: Related Workmentioning
confidence: 99%
“…The origins of computational offloading are in cyberforaging, which aimed at distributing computations from a resource constrained (mobile) device to nearby infrastructure [21]. Since then, most of the work has focused on linking the device with remote infrastructure or a hybrid that combines remote and local connectivity.…”
Section: Related Workmentioning
confidence: 99%
“…Offloading computation from mobile devices to remote surrogates, known as cyber foraging [13] has been subject for over a decade. In recent work, Kristensen et al [9] propose Scavenger, a cyber foraging system in Python which outsources Python methods, and the scheduler orchestrating this outsourcing process uses history-based profiles.…”
Section: Related Workmentioning
confidence: 99%
“…Plenty of research has been conducted to outsource computing tasks to external computing sources [10,18,26,11]. Typically, these schemes focus on how to properly split the job and deploy on the external computing sources.…”
Section: Related Workmentioning
confidence: 99%
“…Flinn et al [18] also propose a similar idea, in which remote execution simultaneously leverages the mobility of mobile devices and the richer resources of large devices. Balan et al [10,11] propose to augment the computation and storage capabilities of mobile devices by exploiting the nearby (surrogate) computers. Recently, MAUI [14] is proposed to partition the program dynamically and submit it on surrogate computers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation