Characterization of Cyber-foraging Usage Contexts

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.
Original languageEnglish
Pages (from-to)195-211
JournalLecture Notes in Computer Science
Volume9278
DOIs
Publication statusPublished - 2015
Event9th European Conference on Software Architecture -
Duration: 7 Sep 201511 Sep 2015

Fingerprint

Foraging
Mobile devices
Requirements engineering
Software architecture
Quality assurance
Life cycle
Software engineering
Computer systems
Servers
Non-functional Requirements
Sensors
Mobile Devices
Software Quality
Requirements Engineering
Quality Assurance
Software Architecture
Context
Software Engineering
Battery
Life Cycle

Bibliographical note

Proceedings title: 9th European Conference on Software Architecture
Publisher: Springer
ISBN: 978-3-319-23727-5
Editors: Danny Weyns, Raffaela Mirandola, Ivica Crnkovic

Cite this

@article{a655261e84714ebf97040d6e33acc41a,
title = "Characterization of Cyber-foraging Usage Contexts",
abstract = "Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.",
author = "G.A. Lewis and P. Lago",
note = "Proceedings title: 9th European Conference on Software Architecture Publisher: Springer ISBN: 978-3-319-23727-5 Editors: Danny Weyns, Raffaela Mirandola, Ivica Crnkovic",
year = "2015",
doi = "10.1007/978-3-319-23727-5_16",
language = "English",
volume = "9278",
pages = "195--211",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

Characterization of Cyber-foraging Usage Contexts. / Lewis, G.A.; Lago, P.

In: Lecture Notes in Computer Science, Vol. 9278, 2015, p. 195-211.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - Characterization of Cyber-foraging Usage Contexts

AU - Lewis, G.A.

AU - Lago, P.

N1 - Proceedings title: 9th European Conference on Software Architecture Publisher: Springer ISBN: 978-3-319-23727-5 Editors: Danny Weyns, Raffaela Mirandola, Ivica Crnkovic

PY - 2015

Y1 - 2015

N2 - Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.

AB - Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. There are many domains and applications that can benefit from the longer battery life and better application performance on mobile devices that is typically associated to the use of cyber-foraging, such as field operations, sensor systems, and entertainment. However, obtaining these benefits in operational systems requires meeting functional and non-functional requirements that vary depending on the usage context of the cyber-foraging system. This paper presents a characterization of usage contexts for cyber-foraging defined in terms of functional and non-functional requirements for cyber-foraging systems. The goal of the characterization is to provide context for software engineering life cycle activities for cyber-foraging systems, such as requirements engineering, software architecture and quality assurance, with the intent of developing systems that fully realize the benefits of cyber-foraging.

U2 - 10.1007/978-3-319-23727-5_16

DO - 10.1007/978-3-319-23727-5_16

M3 - Article

VL - 9278

SP - 195

EP - 211

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -