Developing Collaborative Applications with Mobile Cloud - A Case Study of Speech Recognition
نویسندگان
چکیده
While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, we believe that the real potentials of mobile cloud computing is far from been fully explored due to several practical issues. The quality of the mobile networks is not adequate for delivering satisfactory user experiences via close collaboration over mobile networks. A dynamic workload partitioning scheme would help solve this problem, but the distribution of computation and data storage geographically can lead to serious security and privacy concerns, which makes user to take the risk of exposing the data to eavesdroppers in the middle of the network. Since we have yet to see collaborative mobile cloud applications which could dynamically migrate the workload to efficiently take advantage of the resources in the cloud, in this paper, we present a paradigm to guide the design of the following: the system architecture, the principle for partitioning applications, the method for offloading computation, and the control policy for data access. We argue that the proposed paradigm provides a unified solution to the performance and privacy issues, with a case study, a cloud-assisted speech recognition application, to illustrate our experimental results.
منابع مشابه
Rethinking Speech Recognition on Mobile Devices
In this paper, we describe our experiences and thoughts on building speech applications on mobile devices for developing countries. We describe three models of use for automatic speech recognition (ASR) systems on mobile devices that are currently used – embedded speech recognition, speech recognition in the cloud, and distributed speech recognition; evaluate their advantages and disadvantages;...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملPoster Abstract:Proximity-Triggered Speech Recognition in Mobile Cloud Computing
Speech recognition applications have become very popular and have changed our behaviors of using Smart phones. However, users still have to initiate the voice recording by touching the small icons on the screens of smart phones. This action brings users great inconvenience especially for those who are driving. To overcome this issue, we propose a proximity triggered no-touch" mechanism for smar...
متن کاملPoster Abstract: Exploring Cloud Services with Body Area Networks for Medical Care
Recent studies [1][2] use mobile phones as data aggregators of body area networks. To better support body network applications, mobile phones can also utilize cloud services. In this paper, we explore the opportunities to design and develop personal health care applications with cloud services. Specifically, relay service, rendezvous service, speech to text service, and other web services are i...
متن کاملThe Case for Complexity Prediction in Automatic Partitioning of Cloud-enabled Mobile Applications
As application demands out-pace the evolution of battery technology, many smartphone “app” developers will soon explore offloading compute-intensive tasks to the cloud. Such cloud-enabled mobile applications effectively partition application functionality between the phone and the cloud. Application partitioning must be dynamic, to successfully adapt to variability in resource availability. Dyn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 1 شماره
صفحات -
تاریخ انتشار 2011