An edition of Cyber foraging (2011)

Cyber foraging

bridging mobile and cloud computing

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
May 10, 2021 | History
An edition of Cyber foraging (2011)

Cyber foraging

bridging mobile and cloud computing

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations.

Publish Date
Publisher
Morgan & Claypool
Language
English
Pages
93

Buy this book

Previews available in: English

Edition Availability
Cover of: Cyber foraging
Cyber foraging: bridging mobile and cloud computing
2012, Morgan & Claypool
in English
Cover of: Cyber Foraging
Cyber Foraging: Bridging Mobile and Cloud Computing
2011, Springer International Publishing AG
in English

Add another edition?

Book Details


Table of Contents

1. Introduction
1.1 The motivation for cyber foraging
1.2 Potential benefits from using remote infrastructure
1.3 Potential costs of using remote infrastructure
1.4 Discussion
1.5 Lecture overview.
2. Partitioning
2.1 Partitioning goals
2.2 Choosing candidate partitions
2.3 Selecting a partition
2.4 Resource measurement and estimation
2.4.1 CPU
2.4.2 Network
2.4.3 Battery energy
2.4.4 File cache state
2.4.5 Memory
2.5 Dealing with errors during partitioning
2.6 Applications
2.7 Summary.
3. Management
3.1 Surrogate location
3.1.1 Surrogates near mobile computers
3.1.2 Surrogates in the cloud
3.1.3 Surrogate location for current cyber foraging systems
3.2 Isolation of remote operations
3.2.1 Design goals
3.2.2 Process-level isolation
3.2.3 Hardware virtualization
3.2.4 Application virtualization
3.3 Managing state
3.3.1 Application-specific state
3.3.2 Obtaining and caching application-specific state
3.4 Mechanics
3.5 Summary.
4. Security and privacy
4.1 Desired security and privacy properties
4.1.1 Properties for surrogate owners
4.1.2 Properties for mobile computer owners
4.2 Leveraging standard solutions
4.3 Trusted boot
4.3.1 Trusted boot for public kiosks
4.3.2 Application to cyber foraging and vulnerabilities
4.4 Verification via redundant execution
4.4.1 Verification in Slingshot
4.4.2 Enforcing determinism
4.5 Discussion.
5. Data staging
5.1 Motivation
5.2 Data staging for prefetching data
5.2.1 Infostations
5.2.2 Data staging
5.2.3 Sulula
5.3 Predicting the future
5.3.1 Mobility prediction
5.3.2 Data access prediction
5.3.3 Bandwidth prediction
5.4 Data staging for data sent to the cloud
5.5 Summary.
6. Challenges and opportunities
6.1 Trends that impact cyber foraging
6.2 Challenges
6.2.1 Finding the killer app
6.2.2 Defining the business case
6.2.3 Security and privacy
6.3 Opportunities for further research
6.3.1 Bringing benefit to more applications
6.3.2 Handling uncertainty and failure
6.3.3 Improving ease-of-management
6.4 Final thoughts.
Bibliography
Author's Biography.

Edition Notes

Title from PDF title page (Morgan & Claypool, viewed Oct. 9, 2012).

Includes bibliographical references (pages 83-91).

Published in
[San Rafael, Calif.]
Series
Synthesis lectures on mobile and pervasive computing -- #10, Synthesis lectures on mobile and pervasive computing -- #10.

Classifications

Dewey Decimal Class
004.165
Library of Congress
QA76.59 .F585 2012

The Physical Object

Pagination
1 online resource (ix, 93 pages)
Number of pages
93

ID Numbers

Open Library
OL32377511M
Internet Archive
cyberforagingbri0000flin
ISBN 10
1608458504, 1608458490
ISBN 13
9781608458509, 9781608458493
OCLC/WorldCat
812346275

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
May 10, 2021 Created by ImportBot import new book