A Survey and Taxonomy of Cyber Foraging of Mobile Devices

IEEE Communications Surveys &amp Tutorials (Impact Factor: 6.81). 01/2012; 14(4):1232-1243. DOI: 10.1109/SURV.2011.111411.00016

ABSTRACT With the ever-increasing advancement of mobile device technology and their pervasive usage, users expect to run their applications on mobile devices and get the same performance as if they used to run their applications on powerful non-mobile computers.
There is a challenge though in that mobile devices deliver lower performance than
traditional less-constrained and non-mobile computers because they are constrained by
weight, size, and mobility in spite of all their advancements in recent years. One of the ...

Download full-text


Available from: Omid Kashefi, Sep 27, 2015
253 Reads
  • Source
    • "The dependency of new generation on mobile devices is increasing each coming day. In the whole planet of around 6.8 billion people, 4.6 billion people reached to cell phone subscription at the end of 2009 and is likely reach to five billion by the end of 2010[1]. People are tied up in doing tasks all around them through their mobile devices, such as Internet banking, using routing applications, surfing internet and communications. "
    [Show description] [Hide description]
    DESCRIPTION: Under Review with World Applied Sciences Journal (WASJ)
  • Source
    • "To support better QoS to the resource constrained IoT devices cyber foraging technique where the resource poor IoT devices are reluctant in terms of performing heavy computations by offloading some of their heavy work to a nearby stronger surrogate machine. In [9] the authors have focused on the pervasive usage of the mobile devices according to the user requirement of running the same computation task that they use in more powerful devices. But there is a wide disparity between the mobile devices and non-mobile devices with stronger configuration that hinders providing the QoS to end user . "
    [Show abstract] [Hide abstract]
    ABSTRACT: The revolutionized vision of IoT has united heterogeneous devices to foster the systems of cohesive intelligent things. In addition, Fog computing has also envisioned a new form of cloud computing paradigm. Therefore, Fog provides edge computing to such IoT devices with varied capabilities and resources. However, a balanced and efficient pairing or matching strategy for edge IoT nodes is crucial to achieve the user requisite. Hence, this paper addresses the utility based matching or pairing problem within the same domain of IoT nodes by using Irving's matching algorithm under the node specified preferences to endure a stable IoT node pairing.We studied the performance of the proposed matching algorithm through simulation. The simulation results show the higher utility gain of the node pairs through refined matching algorithm over greedy approach.
    Asia-Pacific Network Operations and Management Symposium (APNOMS); 08/2015
  • Source
    • "Cloudlet [4] is an effort that exploited computing power of VM-based proximate public immobile computers to perform intensive computation with less communication latency. However, using only MgRs in Cloudlets causes lack of mobility, limited availability, and secure threats, especially due to decentralized architecture [1], [2]. The advantages of using MgRs are lower WAN latency and higher multiplicity compared to other granules.Usually MgRs are suitable for moderate computation-intensive tasks with moderate time sensitivity. "
    IEEE Mobile Cloud 2015, San Francisco, USA; 01/2015
Show more