A Catalog of Architectural Tactics for Cyber-Foraging

被引:11
|
作者
Lewis, Grace [1 ,2 ]
Lago, Patricia [2 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
cyber-foraging; software architecture; architectural tactics; mobile cloud computing; mobile computing;
D O I
10.1145/2737182.2737188
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power or battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique enabling mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents a catalog of architectural tactics for cyber-foraging that was derived from the results of a systematic literature review on architectures for cyber-foraging systems. Elements of the architectures identified in the primary studies were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning towards cyber-foraging as a way to support the mobile applications of the present and the future.
引用
收藏
页码:53 / 62
页数:10
相关论文
共 50 条
  • [41] FORAGING TACTICS OF AN AQUATIC INSECT - PARTIAL CONSUMPTION OF PREY
    FORMANOWICZ, DR
    [J]. ANIMAL BEHAVIOUR, 1984, 32 (AUG) : 774 - 781
  • [42] FORAGING TACTICS OF A TERRESTRIAL SALAMANDER - ASSESSING PREY DENSITY
    JAEGER, RG
    BARNARD, DE
    JOSEPH, RG
    [J]. AMERICAN NATURALIST, 1982, 119 (06): : 885 - 890
  • [43] Cyber-Defense: A Taxonomy of Tactics for Managing Cyberstalking
    Tokunaga, Robert S.
    Aune, Krystyna S.
    [J]. JOURNAL OF INTERPERSONAL VIOLENCE, 2017, 32 (10) : 1451 - 1475
  • [44] A Framework for Selecting Architectural Tactics Using Fuzzy Measures
    Alashqar, Abdelkareem M.
    El-Bakry, Hazem M.
    Elfetouh, Ahmad Abo
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (03) : 475 - 498
  • [45] Developing Cyber Foraging Applications for Portable Devices
    Kristensen, Mads Daro
    Bouvin, Niels Olof
    [J]. 2008 IEEE CONFERENCE ON POLYMERS AND ADHESIVES IN MICROELECTRONICS AND PHOTONICS AND 2008 IEEE INTERDISCIPLINARY CONFERENCE ON PORTABLE INFORMATION DEVICES, 2008, : 64 - 69
  • [46] Architectural Tactics for the Design of Efficient PaaS Cloud Applications
    Gesvindr, David
    Buhnova, Barbora
    [J]. 2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 158 - 167
  • [47] Un-Working New Tactics for Architectural Pedagogy
    Jacobs, Daniel
    Utting, Brittany
    [J]. JOURNAL OF ARCHITECTURAL EDUCATION, 2019, 73 (02) : 261 - 263
  • [48] ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code
    Ge, Ning
    Wang, Ze
    Zhang, Li
    Zhao, Jiuang
    Zhou, Yufei
    Liu, Zewei
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 566 - 576
  • [49] Centralized Management of Scalable Cyber Foraging Systems
    Nir, Manjinder
    Matrawy, Ashraf
    [J]. 4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 265 - 273
  • [50] eyeDentify: Multimedia Cyber Foraging from a Smartphone
    Kemp, Roelof
    Palmer, Nicholas
    Kielmann, Thilo
    Seinstra, Frank
    Drost, Niels
    Maassen, Jason
    Bal, Henri
    [J]. 2009 11TH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2009), 2009, : 392 - 399