VOLUNTARY DISCONNECTED OPERATIONS FOR ENERGY EFFICIENT MOBILE DEVICES IN PERVASIVE COMPUTING ENVIRONMENTS

被引:2
|
作者
Lim, Sung-Hwa [1 ]
Lee, Byoung-Hoon [2 ]
Kim, Jai-Hoon [3 ]
机构
[1] Sungkyunkwan Univ, Dept Syst Management Engn, Seoul, South Korea
[2] Inha Univ, Inst Informat & Elect Res, Inchon, South Korea
[3] Ajou Univ, Dept Informat & Comp Engn, Suwon 441749, South Korea
来源
基金
新加坡国家研究基金会;
关键词
Pervasive and mobile computing; Disconnected Operation; Energy Conservation;
D O I
10.1080/10798587.2013.771421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to support disconnected operations in mobile computing, because wireless communication requires substantial power consumption by mobile devices. Suitable usage of voluntary disconnected operations with pre-fetching of data in mobile environments can effectively save energy and money for mobile devices in wireless pervasive computing. In this paper, we analyze energy expenditure, including voluntary disconnected operations, to evaluate the energy efficiency of mobile computing. We estimate the energy expenditure using various parameters. The results of our analysis will assist efficient employment of disconnected operations and performance prediction.
引用
收藏
页码:39 / 49
页数:11
相关论文
共 50 条
  • [41] An efficient causal ordering algorithm for mobile computing environments
    Prakash, R
    Raynal, M
    Singhal, M
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1996, : 744 - 751
  • [42] A Survey of Mobile Cloud Computing for Extending Energy of Mobile Devices
    Thanapal, P.
    Durai, Saleem M. A.
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 549 - +
  • [43] Probability of Task Completion and Energy Consumption in Cooperative Pervasive Mobile Computing
    Duc V Le
    Thuong Nguyen
    Scholten, Hans
    Havinga, Paul
    2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2018,
  • [44] REPC: Reliable and Efficient Participatory Computing for Mobile Devices
    Dong, Zheng
    Kong, Linghe
    Cheng, Peng
    He, Liang
    Gu, Yu
    Fang, Lu
    Zhu, Ting
    Liu, Cong
    2014 ELEVENTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2014, : 257 - 265
  • [45] An Efficient Security Algorithm in Mobile Computing for Resource Constrained Mobile Devices
    Light, Janet
    David, Deepika
    Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 113 - 114
  • [46] A New Approach to Resource Discovery and Dissemination for Pervasive Computing Environments Based on Mobile Agents
    Bagheri, E.
    Naghibzadeh, M.
    SCIENTIA IRANICA, 2007, 14 (06) : 612 - 624
  • [47] Mobile agent connection establishment and management (CEMA) -: Message exchange for pervasive computing environments
    Kamangar, F
    Levine, D
    Záruba, GV
    Thomas, R
    JOURNAL OF SUPERCOMPUTING, 2005, 31 (01): : 79 - 99
  • [48] Mobile Agent Connection Establishment and Management (CEMA)—Message Exchange for Pervasive Computing Environments
    Farhad Kamangar
    David Levine
    Gergely V. Záruba
    Renjith Thomas
    The Journal of Supercomputing, 2005, 31 : 79 - 99
  • [49] A new approach to resource discovery and dissemination for pervasive computing environments based on mobile agents
    Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada
    不详
    Sci. Iran., 2007, 6 (612-624):
  • [50] Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments
    Yu, Alian
    Kang, Jian
    Jiang, Wei
    Lin, Dan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 234 - 245