Simplifying cyber foraging for mobile devices

Rajesh Krishna Balan*, Darren Gergle, Mahadev Satyanarayanan, James Herbsleb

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

113 Scopus citations

Abstract

Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines a "little language" for cyber foraging with an adaptive runtime system. We report results from a user study showing that even novice developers are able to successfully modify large, unfamiliar applications in just a few hours. We also show that the quality of novice-modified and expert-modified applications are comparable in most cases.

Original languageEnglish (US)
Title of host publicationMobiSys'07
Subtitle of host publicationProceedings of the 5th International Conference on Mobile Systems, Applications and Services
PublisherAssociation for Computing Machinery (ACM)
Pages272-285
Number of pages14
ISBN (Print)1595936149, 9781595936141
DOIs
StatePublished - 2007
EventMobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services - San Juan, Puerto Rico
Duration: Jun 11 2007Jun 14 2007

Publication series

NameMobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services

Other

OtherMobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
Country/TerritoryPuerto Rico
CitySan Juan
Period6/11/076/14/07

Keywords

  • Mobile computing
  • Programmer productivity
  • Rapid prototyping
  • Retargeting applications
  • Software engineering
  • User study

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Simplifying cyber foraging for mobile devices'. Together they form a unique fingerprint.

Cite this