A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging

Grace Lewis, Patricia Lago, Sebastián Echeverria, Pieter Simoens

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems.
LanguageEnglish
Pages119-147
Number of pages29
JournalFuture generations computer systems: FGCS
Volume96
DOIs
Publication statusPublished - 1 Jul 2019

Fingerprint

Mobile devices
Demonstrations
Servers

Keywords

  • Mobile cloud computing
  • Cyber-foraging
  • Computation offload
  • Data staging
  • Architectural tactics
  • Software architecture
  • Software engineering
  • Case study
  • Green IT

VU Research Profile

  • Connected World
  • Science for Sustainability

Cite this

@article{764f6c5b5f704252821b516a02d5d393,
title = "A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging",
abstract = "Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems.",
keywords = "Mobile cloud computing, Cyber-foraging, Computation offload, Data staging, Architectural tactics, Software architecture, Software engineering, Case study, Green IT",
author = "Grace Lewis and Patricia Lago and Sebasti{\'a}n Echeverria and Pieter Simoens",
year = "2019",
month = "7",
day = "1",
doi = "10.1016/j.future.2019.01.052",
language = "English",
volume = "96",
pages = "119--147",
journal = "Future generations computer systems: FGCS",

}

A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging. / Lewis, Grace; Lago, Patricia; Echeverria, Sebastián; Simoens, Pieter.

In: Future generations computer systems: FGCS, Vol. 96, 01.07.2019, p. 119-147.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - A tale of three systems: Case studies on the application of architectural tactics for cyber-foraging

AU - Lewis, Grace

AU - Lago, Patricia

AU - Echeverria, Sebastián

AU - Simoens, Pieter

PY - 2019/7/1

Y1 - 2019/7/1

N2 - Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems.

AB - Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems.

KW - Mobile cloud computing

KW - Cyber-foraging

KW - Computation offload

KW - Data staging

KW - Architectural tactics

KW - Software architecture

KW - Software engineering

KW - Case study

KW - Green IT

U2 - 10.1016/j.future.2019.01.052

DO - 10.1016/j.future.2019.01.052

M3 - Article

VL - 96

SP - 119

EP - 147

JO - Future generations computer systems: FGCS

T2 - Future generations computer systems: FGCS

JF - Future generations computer systems: FGCS

ER -