Architectural Tactics for Cyber-Foraging: Results of a Systematic Literature Review

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time, or for executing applications that require extensive communication, computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This article presents the results of a systematic literature review (SLR) on architectures that support cyber-foraging. Elements of the identified architectures were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning toward cyber-foraging as a way to support the mobile applications of the present and the future.
Original languageEnglish
Pages (from-to)158-186
Number of pages48
JournalJournal of Systems and Software
Volume107
DOIs
Publication statusPublished - 2015

Fingerprint

Mobile devices
Servers
Internet
Communication
Industry

Cite this

@article{16e0d15ab60d4a4c80f203fb75349009,
title = "Architectural Tactics for Cyber-Foraging: Results of a Systematic Literature Review",
abstract = "Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time, or for executing applications that require extensive communication, computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This article presents the results of a systematic literature review (SLR) on architectures that support cyber-foraging. Elements of the identified architectures were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning toward cyber-foraging as a way to support the mobile applications of the present and the future.",
author = "G.A. Lewis and P. Lago",
year = "2015",
doi = "10.1016/j.jss.2015.06.005",
language = "English",
volume = "107",
pages = "158--186",
journal = "Journal of Systems and Software",
issn = "0164-1212",
publisher = "Elsevier",

}

Architectural Tactics for Cyber-Foraging: Results of a Systematic Literature Review. / Lewis, G.A.; Lago, P.

In: Journal of Systems and Software, Vol. 107, 2015, p. 158-186.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - Architectural Tactics for Cyber-Foraging: Results of a Systematic Literature Review

AU - Lewis, G.A.

AU - Lago, P.

PY - 2015

Y1 - 2015

N2 - Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time, or for executing applications that require extensive communication, computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This article presents the results of a systematic literature review (SLR) on architectures that support cyber-foraging. Elements of the identified architectures were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning toward cyber-foraging as a way to support the mobile applications of the present and the future.

AB - Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time, or for executing applications that require extensive communication, computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This article presents the results of a systematic literature review (SLR) on architectures that support cyber-foraging. Elements of the identified architectures were codified in the form of Architectural Tactics for Cyber-Foraging. These tactics will help architects extend their design reasoning toward cyber-foraging as a way to support the mobile applications of the present and the future.

U2 - 10.1016/j.jss.2015.06.005

DO - 10.1016/j.jss.2015.06.005

M3 - Article

VL - 107

SP - 158

EP - 186

JO - Journal of Systems and Software

JF - Journal of Systems and Software

SN - 0164-1212

ER -