Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2737182.2737188acmconferencesArticle/Chapter ViewAbstractPublication PagescomparchConference Proceedingsconference-collections
research-article

A Catalog of Architectural Tactics for Cyber-Foraging

Published: 04 May 2015 Publication History

Abstract

Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power or battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique enabling mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents a catalog of architectural tactics for cyber-foraging that was derived from the results of a systematic literature review on architectures for cyber-foraging systems. Elements of the architectures identified in the primary studies were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning towards cyber-foraging as a way to support the mobile applications of the present and the future.

References

[1]
P. Angin and B. Bhargava. An agent-based optimization framework for mobile-cloud computing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4:1--17, 2013.
[2]
T. Armstrong, O. Trescases, C. Amza, and E. de Lara. Efficient and transparent dynamic content updates for mobile clients. In Proceedings of the 4th international conference on Mobile systems, applications and services, pages 56--68. ACM, 2006.
[3]
N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy consumption in mobile phones: A measurement study and implications for network applications. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC '09, pages 280--293, New York, NY, USA, 2009. ACM.
[4]
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal. Pattern-oriented Software Architecture: A System of Patterns. John Wiley & Sons, Inc., New York, NY, USA, 1996.
[5]
B.-G. Chun and P. Maniatis. Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th conference on Hot topics in operating systems, pages 8--8. USENIX Association, 2009.
[6]
E. Cuervo. Enhancing Mobile Devices through Code Offload. PhD thesis, Duke University, 2012.
[7]
M. Dong and L. Zhong. Self-constructive high-rate system energy modeling for battery-powered mobile systems. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, pages 335--348, New York, NY, USA, 2011. ACM.
[8]
J. Flinn. Cyber foraging: Bridging mobile and cloud computing. In M. Satyanarayanan, editor, Synthesis Lectures on Mobile and Pervasive Computing. Morgan & Claypool Publishers, 2012.
[9]
J. Flinn, S. Sinnamohideen, N. Tolia, and M. Satyanarayanan. Data staging on untrusted surrogates. In Proceedings 2nd USENIX Conference on File and Storage Technologies (FAST03), Mar 31-Apr 2, 2003, San Francisco, CA., 2003.
[10]
S. Goyal. A Collective Approach to Harness Idle Resources of End Nodes. PhD thesis, School of Computing, University of Utah, 2011.
[11]
T. Guan. A System Architecture to Provide Enhanced Grid Access for Mobile Devices. PhD thesis, University of Southampton, 2008.
[12]
S.-H. Hung, J.-P. Shieh, and C.-P. Lee. Migrating android applications to the cloud. International Journal of Grid and High Performance Computing (IJGHPC), 3(2):14--28, 2011.
[13]
S. Imai. Task offloading between smartphones and distributed computational resources. Master's thesis, Rensselaer Polytechnic Institute, 2012.
[14]
R. Kemp, N. Palmer, T. Kielmann, and H. Bal. Cuckoo: a computation offloading framework for smartphones. In Mobile Computing, Applications, and Services, pages 59--79. Springer, 2012.
[15]
S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In INFOCOM, 2012 Proceedings IEEE, pages 945--953. IEEE, 2012.
[16]
D. Kovachev and R. Klamma. Framework for computation offloading in mobile cloud computing. International Journal of Interactive Multimedia and Artificial Intelligence, 1(7):6--15, 2012.
[17]
K. Kumar and Y.-H. Lu. Cloud computing for mobile users: Can offloading computation save energy? Computer, 43(4):51--56, Apr. 2010.
[18]
G. Lewis and P. Lago. A catalogue of architectural tactics for cyber-foraging. Technical Report 2014--12.001, VU University Amsterdam, Dec. 2014. http://www.cs.vu.nl/ patricia/Patricia_Lago/Shared_files/report-tactics-cyber-foraging.pdf.
[19]
G. Lewis, P. Lago, and G. Procaccianti. Architecture strategies for cyber-foraging: Preliminary results from a systematic literature review. In Proceedings of the 8th European Conference on Software Architecture (ECSA 2014), volume 8627 of Lecture Notes in Computer Science, pages 154--169. Springer, 2014.
[20]
J. Matthews, M. Chang, Z. Feng, R. Srinivas, and M. Gerla. PowerSense: power aware dengue diagnosis on mobile phones. In Proceedings of the First ACM Workshop on Mobile Systems, Applications, and Services for Healthcare, page 6. ACM, 2011.
[21]
T. Phokas, H. Efstathiades, G. Pallis, and M. Dikaiakos. Feel the world: A mobile framework for participatory sensing. In Mobile Web Information Systems, volume 8093 of Lecture Notes in Computer Science, pages 143--156. Springer, 2013.
[22]
M. Satyanarayanan. Pervasive computing: vision and challenges. Personal Communications, IEEE, 8(4):10--17, Aug 2001.
[23]
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for VM-based cloudlets in mobile computing. Pervasive Computing, IEEE, 8(4):14--23, 2009.
[24]
Y. Xiao, P. Simoens, P. Pillai, K. Ha, and M. Satyanarayanan. Lowering the barriers to large-scale mobile crowdsensing. In Mobile Computing Systems and Applications, 2013.
[25]
K. Yang, S. Ou, and H.-H. Chen. On effective offloading services for resource-constrained mobile devices running heavier mobile internet applications. Communications Magazine, IEEE, 46(1):56--63, 2008.

Cited By

View all
  • (2023)Architectural tactics in software architectureJournal of Systems and Software10.1016/j.jss.2022.111558197:COnline publication date: 13-Feb-2023
  • (2022)Edge Computing as an Architectural Solution: An Umbrella ReviewEdge Analytics10.1007/978-981-19-0019-8_45(601-616)Online publication date: 4-Apr-2022
  • (2021)Mining the ROS ecosystem for Green Architectural Tactics in Robotics and an Empirical Evaluation2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)10.1109/MSR52588.2021.00042(300-311)Online publication date: May-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
QoSA '15: Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures
May 2015
152 pages
ISBN:9781450334709
DOI:10.1145/2737182
  • General Chair:
  • Philippe Kruchten,
  • Program Chairs:
  • Ipek Ozkaya,
  • Heiko Koziolek
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 May 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. architectural tactics
  2. cyber-foraging
  3. mobile cloud computing
  4. mobile computing
  5. software architecture

Qualifiers

  • Research-article

Conference

CompArch '15
Sponsor:

Acceptance Rates

QoSA '15 Paper Acceptance Rate 14 of 42 submissions, 33%;
Overall Acceptance Rate 46 of 131 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Architectural tactics in software architectureJournal of Systems and Software10.1016/j.jss.2022.111558197:COnline publication date: 13-Feb-2023
  • (2022)Edge Computing as an Architectural Solution: An Umbrella ReviewEdge Analytics10.1007/978-981-19-0019-8_45(601-616)Online publication date: 4-Apr-2022
  • (2021)Mining the ROS ecosystem for Green Architectural Tactics in Robotics and an Empirical Evaluation2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)10.1109/MSR52588.2021.00042(300-311)Online publication date: May-2021
  • (2020)Architectural Resilience in Cloud, Fog and Edge Systems: A SurveyIEEE Access10.1109/ACCESS.2020.29710078(28078-28095)Online publication date: 2020
  • (2019)Conf-Adaption: Adaptive Adjustment of Software Configuration On UAV by Resource Dependency Analysis2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)10.1109/ITAIC.2019.8785785(155-161)Online publication date: May-2019
  • (2018)Guaranteed latency applications in edge-cloud environmentProceedings of the 12th European Conference on Software Architecture: Companion Proceedings10.1145/3241403.3241448(1-4)Online publication date: 24-Sep-2018
  • (2018)Uncertainty reduction in self-adaptive systemsProceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems10.1145/3194133.3194144(51-57)Online publication date: 28-May-2018
  • (2018)Augmentation Techniques for Mobile Cloud ComputingACM Computing Surveys10.1145/315239751:1(1-38)Online publication date: 4-Jan-2018
  • (2017)Efficient Edge Storage Management Based on Near Real-Time Forecasts2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC)10.1109/ICFEC.2017.9(21-30)Online publication date: May-2017
  • (2017)Router-Based Brokering for Surrogate Discovery in Edge Computing2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)10.1109/ICDCSW.2017.61(145-150)Online publication date: Jun-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media