Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review

G.A. Lewis, P. Lago, G. Procaccianti

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future. © 2014 Springer International Publishing Switzerland.
Original languageEnglish
Pages (from-to)154-169
JournalLecture Notes in Computer Science
Volume8627
DOIs
Publication statusPublished - 2014
Event8th European Conference, ECSA 2014, Vienna, Austria - Switzerland
Duration: 25 Aug 201429 Aug 2014

Fingerprint

Literature Review
Foraging
Mobile devices
Mobile Devices
Social Media
Computing
Mobile Applications
Period of time
Battery
Proximity
Latency
Servers
Server
Internet
Communication
Architecture
Strategy
Industry

Bibliographical note

Proceedings title: Software Architecture
Publisher: Springer International Publishing
Place of publication: Switzerland
ISBN: 978-3-319-09969-9
Editors: P. Avgeriou, U. Zdun

Cite this

@article{9ba3174a925b4a84872173daf809724b,
title = "Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review",
abstract = "Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future. {\circledC} 2014 Springer International Publishing Switzerland.",
author = "G.A. Lewis and P. Lago and G. Procaccianti",
note = "Proceedings title: Software Architecture Publisher: Springer International Publishing Place of publication: Switzerland ISBN: 978-3-319-09969-9 Editors: P. Avgeriou, U. Zdun",
year = "2014",
doi = "10.1007/978-3-319-09970-5_15",
language = "English",
volume = "8627",
pages = "154--169",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review. / Lewis, G.A.; Lago, P.; Procaccianti, G.

In: Lecture Notes in Computer Science, Vol. 8627, 2014, p. 154-169.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review

AU - Lewis, G.A.

AU - Lago, P.

AU - Procaccianti, G.

N1 - Proceedings title: Software Architecture Publisher: Springer International Publishing Place of publication: Switzerland ISBN: 978-3-319-09969-9 Editors: P. Avgeriou, U. Zdun

PY - 2014

Y1 - 2014

N2 - Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future. © 2014 Springer International Publishing Switzerland.

AB - Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future. © 2014 Springer International Publishing Switzerland.

U2 - 10.1007/978-3-319-09970-5_15

DO - 10.1007/978-3-319-09970-5_15

M3 - Article

VL - 8627

SP - 154

EP - 169

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -