000 -LEADER |
fixed length control field |
05779nam a2200625 i 4500 |
001 - CONTROL NUMBER |
control field |
6813256 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152907.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
121018s2012 caua foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781608458509 (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781608458493 (pbk.) |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00447ED1V01Y201209MPC010 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)812346275 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00401507 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.59 |
Item number |
.F553 2012 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.165 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Flinn, Jason. |
245 10 - TITLE STATEMENT |
Title |
Cyber foraging |
Medium |
[electronic resource] : |
Remainder of title |
bridging mobile and cloud computing / |
Statement of responsibility, etc. |
Jason Flinn. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : |
Name of publisher, distributor, etc. |
Morgan & Claypool, |
Date of publication, distribution, etc. |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 electronic text (ix, 93 p.) : |
Other physical details |
ill., digital file. |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on mobile and pervasive computing, |
International Standard Serial Number |
1933-902X ; |
Volume/sequential designation |
# 10 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
500 ## - GENERAL NOTE |
General note |
Series from website. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 83-91). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Bibliography -- Author's Biography. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF t.p. (viewed on October 18, 2012). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Mobile computing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cloud computing. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cyber foraging |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
mobile code offload |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
dynamic partitioning of computation |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
data staging |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781608458493 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on mobile and pervasive computing ; |
Volume/sequential designation |
# 10. |
International Standard Serial Number |
1933-902X |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=6813256 |