Utilizing nearby computing resources for resource-limited mobile devices

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

For the last decade, mobile devices have been significantly developed with powerful hardware facilities. Nevertheless, rapid growth in application functionality requires ever greater hardware capability. Thus ensuring the quality of service in resources-limited execution environments remains a major challenge of mobile software development. To reduce execution time and save battery power, some functionality of mobile applications is often executed remotely. However, such an optimization mechanism (i.e., computational offloading) has received attention only in the research literature. In this paper, we present a novel distribution infrastructure that can execute any functionality at either a powerful remote server or nearby mobile devices using two distributed execution models|client/server and peer to peer. Our evaluation results demonstrate that the presented approach can increase both performance and energy efficiency of mobile applications by virtually expanding the hardware capacity of an existing mobile device.

Original languageEnglish
Title of host publication32nd Annual ACM Symposium on Applied Computing, SAC 2017
PublisherAssociation for Computing Machinery
Pages572-575
Number of pages4
ISBN (Electronic)9781450344869
DOIs
StatePublished - 3 Apr 2017
Event32nd Annual ACM Symposium on Applied Computing, SAC 2017 - Marrakesh, Morocco
Duration: 4 Apr 20176 Apr 2017

Publication series

NameProceedings of the ACM Symposium on Applied Computing
VolumePart F128005

Conference

Conference32nd Annual ACM Symposium on Applied Computing, SAC 2017
Country/TerritoryMorocco
CityMarrakesh
Period4/04/176/04/17

Keywords

  • Mobile application
  • Offloading
  • Peer to peer
  • Remote execution
  • Run-time system

Fingerprint

Dive into the research topics of 'Utilizing nearby computing resources for resource-limited mobile devices'. Together they form a unique fingerprint.

Cite this