Cyber-Foraging for Improving Survivability of Mobile Systems

被引:0
|
作者
Echeverria, Sebastian [1 ,2 ]
Lewis, Grace A. [2 ]
Root, James [2 ]
Bradshaw, Ben [2 ]
机构
[1] Carnegie Mellon Software Engn Inst, Pittsburgh, PA USA
[2] Univ Los Andes, Santiago, Chile
关键词
CLOUDLETS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-foraging is a technique for dynamically augmenting the computing power of resource-limited mobile devices by opportunistically exploiting nearby fixed computing infrastructure. Cloudlet-based cyber-foraging relies on discoverable, generic, forward-deployed servers located in single-hop proximity of mobile devices. In particular, we define tactical cloudlets as the infrastructure to support computation offload and data staging at the tactical edge. However, the characteristics of tactical environments, such as dynamic context, limited computing resources, disconnected-intermittent-limited (DIL) network connectivity, and high levels of stress pose a challenge for the continued operations of mobile systems that leverage cloudlets in tactical environments. This paper presents an architecture and experimental results that demonstrate that cyber-foraging using tactical cloudlets increases the survivability of mobile systems, defined as the capability of a system to be able to continue functioning in spite of adversity.
引用
收藏
页码:1421 / 1426
页数:6
相关论文
共 50 条
  • [1] A Decision Model for Cyber-Foraging Systems
    Lewis, Grace A.
    Lago, Patricia
    Avgeriou, Paris
    [J]. 2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 51 - 60
  • [2] Cloudlet-Based Cyber-Foraging for Mobile Systems in Resource-Constrained Edge Environments
    Lewis, Grace A.
    Echeverria, Sebastian
    Simanta, Soumya
    Bradshaw, Ben
    Root, James
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 412 - 415
  • [3] Characterization of Cyber-Foraging Usage Contexts
    Lewis, Grace A.
    Lago, Patricia
    [J]. SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 195 - 211
  • [4] A Catalog of Architectural Tactics for Cyber-Foraging
    Lewis, Grace
    Lago, Patricia
    [J]. QOSA'15 PROCEEDINGS OF THE 11TH INTERNATIONAL ACM SIGSOFT CONFERENCE ON QUALITY OF SOFTWARE ARCHITECTURES, 2015, : 53 - 62
  • [5] A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging
    Lewis, Grace
    Lago, Patricia
    Echeverria, Sebastian
    Simoens, Pieter
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 119 - 147
  • [6] Architectural tactics for cyber-foraging: Results of a systematic literature review
    Lewis, Grace
    Lago, Patricia
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 158 - 186
  • [7] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1377 - 1391
  • [8] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Robert Mitchell
    Ing-Ray Chen
    [J]. Wireless Personal Communications, 2013, 68 : 1377 - 1391
  • [9] Empirical validation of cyber-foraging architectural tactics for surrogate provisioning
    Moghaddam, Fahimeh Alizadeh
    Procaccianti, Giuseppe
    Lewis, Grace A.
    Lago, Patricia
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 138 : 37 - 51
  • [10] Improving Battery Life and Performance of Mobile Devices with Cyber Foraging
    Parkkila, Janne
    Porras, Jari
    [J]. 2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 91 - 95