A distributed resource furnishing to offload resource-constrained devices in cyber foraging toward pervasive computing

Min Hwan Ok, Ja Won Seo, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Mobile devices are pursuing the succession of desktop PCs these days. Cyber Foraging is the project that investigated overcoming scarce computing resources and reducing the power consumptions of mobile devices. In this paper, we propose a framework for remote execution of mobile devices in the way of delivering user data and invoking and manipulating the software of a surrogate with VNC-style interface. This resource furnishing system has the merits of remote application execution, and automatic file transfer. Remote execution is provided via VNC-style interface that is user-friendly. Performance evaluation shows the feasibility of the resource furnishing system, for both data transfers over wired and wireless network.

Original languageEnglish
Title of host publicationNetwork-Based Information Systems - First International Conference, NBiS 2007, Proceedings
PublisherSpringer Verlag
Pages416-425
Number of pages10
ISBN (Print)9783540745723
DOIs
Publication statusPublished - 2007
Event1st International Conference on Network-Based Information Systems, NBiS 2007 - Regensburg, Germany
Duration: 2007 Sept 32007 Sept 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4658 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Network-Based Information Systems, NBiS 2007
Country/TerritoryGermany
CityRegensburg
Period07/9/307/9/7

Keywords

  • Cyber foraging
  • Mobile device
  • Remote execution
  • Storage server
  • Virtual network computing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'A distributed resource furnishing to offload resource-constrained devices in cyber foraging toward pervasive computing'. Together they form a unique fingerprint.

Cite this