Coverart for item
The Resource Cyber foraging : bridging mobile and cloud computing, Jason Flinn, (electronic book)

Cyber foraging : bridging mobile and cloud computing, Jason Flinn, (electronic book)

Label
Cyber foraging : bridging mobile and cloud computing
Title
Cyber foraging
Title remainder
bridging mobile and cloud computing
Statement of responsibility
Jason Flinn
Creator
Subject
Language
eng
Summary
This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations
Member of
Cataloging source
CaBNVSL
http://library.link/vocab/creatorName
Flinn, Jason.
Dewey number
004.165
Illustrations
illustrations
Index
no index present
LC call number
QA76.59
LC item number
.F553 2012
Literary form
non fiction
Nature of contents
  • dictionaries
  • abstracts summaries
  • bibliography
http://library.link/vocab/subjectName
  • Mobile computing
  • Cloud computing
Target audience
  • adult
  • specialized
Label
Cyber foraging : bridging mobile and cloud computing, Jason Flinn, (electronic book)
Instantiates
Publication
Bibliography note
Includes bibliographical references (p. 83-91)
Color
multicolored
Contents
  • 1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview --
  • 2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary --
  • 3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary --
  • 4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion --
  • 5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary --
  • 6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts --
  • Bibliography -- Author's Biography
Control code
201209MPC010
Dimensions
unknown
Extent
1 electronic text (ix, 93 p.)
File format
multiple file formats
Form of item
online
Isbn
9781608458509
Issn
1933-902X
Other physical details
ill., digital file.
Reformatting quality
access
Specific material designation
remote
Label
Cyber foraging : bridging mobile and cloud computing, Jason Flinn, (electronic book)
Publication
Bibliography note
Includes bibliographical references (p. 83-91)
Color
multicolored
Contents
  • 1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview --
  • 2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary --
  • 3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary --
  • 4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion --
  • 5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary --
  • 6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts --
  • Bibliography -- Author's Biography
Control code
201209MPC010
Dimensions
unknown
Extent
1 electronic text (ix, 93 p.)
File format
multiple file formats
Form of item
online
Isbn
9781608458509
Issn
1933-902X
Other physical details
ill., digital file.
Reformatting quality
access
Specific material designation
remote

Library Locations

Processing Feedback ...