Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments

نویسندگان

  • Grace A. Lewis
  • Dominik Messinger
  • Grace Lewis
چکیده

vii

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enabling Cyber Foraging for Mobile Devices

This paper presents the LOCUSTS framework. The aim of the LOCUSTS project is to enable easy use of cyber foraging techniques when developing for small, resource-constrained devices. Cyber foraging, construed as “living off the land”, enables resource poor devices to offload tasks to nearby computing machinery, thereby enabling the small devices to 1) save energy and time, 2) take on tasks that ...

متن کامل

A Low-Energy Fast Cyber Foraging Mechanism for Mobile Devices

The ever increasing demands for using resource-constrained mobile devices for running more resource intensive applications nowadays has initiated the development of cyber foraging solutions that offloadparts or whole computational intensive tasks to more powerful surrogate stationary computers and run them on behalf of mobile devices as required. The choice of proper mix of mobile devices and s...

متن کامل

Using spatially explicit models to characterize foraging performance in heterogeneous landscapes.

The success of most foragers is constrained by limits to their sensory perception, memory, and locomotion. However, a general and quantitative understanding of how these constraints affect foraging benefits, and the trade-offs they imply for foraging strategies, is difficult to achieve. This article develops foraging performance statistics to assess constraints and define trade-offs for forager...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

A Multi-Mode Resource-Constrained Optimization of Time-Cost Trade-off Problems in Project Scheduling Using a Genetic Algorithm

In this paper, we present a genetic algorithm (GA) for optimization of a multi-mode resource constrained time cost trade off (MRCTCT) problem. The proposed GA, each activity has several operational modes and each mode identifies a possible executive time and cost of the activity. Beyond earlier studies on time-cost trade-off problem, in MRCTCT problem, resource requirements of each execution mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015