000 04485nam a22005655i 4500
001 978-3-031-02481-8
003 DE-He213
005 20240730163940.0
007 cr nn 008mamaa
008 220601s2012 sz | s |||| 0|eng d
020 _a9783031024818
_9978-3-031-02481-8
024 7 _a10.1007/978-3-031-02481-8
_2doi
050 4 _aQA1-939
072 7 _aPB
_2bicssc
072 7 _aMAT000000
_2bisacsh
072 7 _aPB
_2thema
082 0 4 _a510
_223
100 1 _aFlinn, Jason.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981321
245 1 0 _aCyber Foraging
_h[electronic resource] :
_bBridging Mobile and Cloud Computing /
_cby Jason Flinn.
250 _a1st ed. 2012.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2012.
300 _aX, 93 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Mobile & Pervasive Computing,
_x1933-902X
505 0 _aIntroduction -- Partitioning -- Management -- Security and Privacy -- Data Staging -- Challenges and Opportunities.
520 _aThis lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations. This lecture first describes how cyber foraging systems dynamically partition data and computation. It shows how dynamic partitioning can often yield better performance, energy efficiency, and application quality than static thin-client or thick-client approaches for dividing functionality between cloud and mobile computers. The lecture then describes the design of the surrogate computing tier. It shows how strong isolation can enable third-party computers to host computation and store data on behalf of nearby mobile devices. It then describes how surrogates can provide reasonable security and privacy guarantees to the mobile computers that use them. The lecture concludes with a discussion of data staging, in which surrogates temporarily store data in transit between cloud servers and mobile computers in order to improve transfer bandwidth and energy efficiency. Table of Contents: Introduction / Partitioning / Management / Security and Privacy / Data Staging / Challenges and Opportunities.
650 0 _aMathematics.
_911584
650 0 _aEngineering.
_99405
650 0 _aMobile computing.
_93438
650 0 _aCooperating objects (Computer systems).
_96195
650 0 _aUser interfaces (Computer systems).
_911681
650 0 _aHuman-computer interaction.
_96196
650 1 4 _aMathematics.
_911584
650 2 4 _aTechnology and Engineering.
_981322
650 2 4 _aMobile Computing.
_93438
650 2 4 _aCyber-Physical Systems.
_932475
650 2 4 _aUser Interfaces and Human Computer Interaction.
_931632
710 2 _aSpringerLink (Online service)
_981323
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031013539
776 0 8 _iPrinted edition:
_z9783031036095
830 0 _aSynthesis Lectures on Mobile & Pervasive Computing,
_x1933-902X
_981324
856 4 0 _uhttps://doi.org/10.1007/978-3-031-02481-8
912 _aZDB-2-SXSC
942 _cEBK
999 _c85155
_d85155