It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 07603cam 2200973Ia 4500
001 ocn812346275
003 OCoLC
005 20210405083450.0
008 121009s2012 caua ob 000 0 eng d
006 m o d
007 cr |||||||||||
040 $aAZS$beng$epn$cAZS$dOCLCO$dYDXCP$dJ2I$dCOO$dEBLCP$dN$T$dE7B$dITD$dOCLCF$dUMI$dDEBSZ$dOCLCQ$dMHW$dMEAUC$dOCLCQ$dU3G$dOCLCQ$dRIU$dKIJ$dCEF$dINT$dAU@$dOCLCQ$dYOU$dLEAUB$dNJT$dOCLCQ$dUKAHL
019 $a815651609$a863221698$a988132191$a988798237$a1047637567
020 $a9781608458509$q(electronic bk.)
020 $a1608458504$q(electronic bk.)
020 $a1608458490
020 $a9781608458493
020 $z9781608458493$q(paperback)
024 7 $a10.2200/S00447ED1V01Y201209MPC010$2doi
035 $a(OCoLC)812346275$z(OCoLC)815651609$z(OCoLC)863221698$z(OCoLC)988132191$z(OCoLC)988798237$z(OCoLC)1047637567
037 $aCL0500000339$bSafari Books Online
050 4 $aQA76.59$b.F585 2012
072 7 $aCOM$x050020$2bisacsh
072 7 $aCOM$x050010$2bisacsh
082 04 $a004.165
100 1 $aFlinn, Jason.
245 10 $aCyber foraging :$bbridging mobile and cloud computing /$cJason Flinn.
260 $a[San Rafael, Calif.] :$bMorgan & Claypool,$c©2012.
300 $a1 online resource (ix, 93 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aSynthesis lectures on mobile and pervasive computing,$x1933-902X ;$v#10
504 $aIncludes bibliographical references (pages 83-91).
500 $aTitle from PDF title page (Morgan & Claypool, viewed Oct. 9, 2012).
520 3 $aThis lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations.
505 0 $a1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview.
505 8 $a2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary.
505 8 $a3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary.
505 8 $a4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion.
505 8 $a5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary.
505 8 $a6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts.
505 8 $aBibliography -- Author's Biography.
650 0 $aMobile computing.
650 0 $aCloud computing.
650 7 $aCOMPUTERS$xHardware$xPersonal Computers$xMacintosh.$2bisacsh
650 7 $aCOMPUTERS$xHardware$xPersonal Computers$xPCs.$2bisacsh
650 7 $aCloud computing.$2fast$0(OCoLC)fst01745899
650 7 $aMobile computing.$2fast$0(OCoLC)fst01024221
653 $acyber foraging
653 $amobile code offload
653 $adynamic partitioning of computation
653 $adata staging
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$z9781608458493
830 0 $aSynthesis lectures on mobile and pervasive computing ;$v#10.
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1021423
856 40 $3ebrary$uhttp://site.ebrary.com/id/10611343
856 40 $3EBSCOhost$uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=500494
856 40 $3Morgan & Claypool$uhttp://www.morganclaypool.com/doi/pdf/10.2200/S00447ED1V01Y201209MPC010
856 40 $3Morgan & Claypool$uhttps://doi.org/10.2200/S00447ED1V01Y201209MPC010
856 40 $3Safari Books Online$uhttp://proquest.safaribooksonline.com/9781608458493
856 40 $uhttp://www.library.yorku.ca/e/resolver/id/2525779
856 42 $3IEEE Xplore$uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813256
856 48 $3Abstract with links to full text$uhttps://doi.org/10.2200/S00447ED1V01Y201209MPC010
856 48 $uhttp://www.morganclaypool.com/doi/abs/10.2200/S00447ED1V01Y201209MPC010
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781608458509
938 $aAskews and Holts Library Services$bASKH$nAH32888976
938 $aProQuest Ebook Central$bEBLB$nEBL1021423
938 $aebrary$bEBRY$nebr10611343
938 $aEBSCOhost$bEBSC$n500494
938 $aYBP Library Services$bYANK$n9799983
029 1 $aAU@$b000050490620
029 1 $aAU@$b000052404466
029 1 $aCHBIS$b010275906
029 1 $aCHNEW$b000623199
029 1 $aCHVBK$b326803270
029 1 $aDEBBG$bBV040888341
029 1 $aDEBSZ$b39738016X
029 1 $aNLGGC$b402003209
029 1 $aNZ1$b14695057
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 164 OTHER HOLDINGS