• No results found

Software Architecture Strategies for Cyber-Foraging Systems

N/A
N/A
Protected

Academic year: 2021

Share "Software Architecture Strategies for Cyber-Foraging Systems"

Copied!
2
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

VU Research Portal

Software Architecture Strategies for Cyber-Foraging Systems Lewis, G.A.

2016

document version

Publisher's PDF, also known as Version of record

Link to publication in VU Research Portal

citation for published version (APA)

Lewis, G. A. (2016). Software Architecture Strategies for Cyber-Foraging Systems.

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.

• Users may download and print one copy of any publication from the public portal for the purpose of private study or research.

• You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ?

Take down policy

If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

E-mail address:

vuresearchportal.ub@vu.nl

Download date: 17. Oct. 2021

(2)

Software Architecture Strategies for Cyber-Foraging Systems

Grace Alexandra Lewis

Grace Alexandra Lewis Software Architecture Strategies for Cyber-Foraging Systems Cyber-foraging — the leverage of proximate servers to augment the computation and

storage capabilities of resource-limited mobile devices — has tremendous poten- tial for supporting mobile computing at the edge. With increasing number of mobile devices and users, increased network traffic cause by trends in the Internet of Things (IoT), and increasing complexity of an always-connected-user experience, there is reason to believe that cyber-foraging will become a standard feature of mobile applications. However, while there is a large amount of research in cyber-foraging, the reality is that there are not many deployed, operational cyber-foraging systems.

As these systems become more prevalent due to their proven benefits, in terms of energy efficiency, reduced latency, and increased availability, combined with the emer- gence of micro data centers and edge clouds, a need will arise for guidance on their architecture and development.

Grace Alexandra Lewis (1968) was born in Elizabeth, New Jersey USA. She obtained her B.Eng. in Software Systems Engineering at Icesi University in Cali, Colombia in 1991. She later obtained a Specialization in Business Administration from Icesi Univer- sity in 1997, and then a Master in Software Engineering from Carnegie Mellon Univer- sity in Pittsburgh, Pennsylvania USA in 2001. Her work experience started in software development in industry, from developer, to software architect, to chief of software development. She currently conducts research at the Carnegie Mellon Software En- gineering Institute in the areas of mobile cloud computing and software architecture.

ISBN 978-94-6295-483-0

Referenties

GERELATEERDE DOCUMENTEN

The goal of this case study is to discover the architectural design decisions in the existing implementation of the GigaSight data staging system for crowd-sourced video [113], and

oName: Report Valid&Priced To GUI oDescription: Send message to GUI oProcess Name: /ProcesseslLogging/MsgToGUI.process oProcess Name Dynamic Override: oSpawn: false oCustom

a) Concisely list and explain the steps of ADD, Attribute-Driven Design b) Give three reasons why it is hard to make purely rational design decisions. c) Concisely explain the

connector view and a module view. b) Provide one viewpoint specification for the Cubos case study. Explain why and for whom that viewpoint is relevant. c) Give the architectural

a) Concisely explain the main characteristic of a component & connector view. b) Provide one viewpoint specification for the EASYMOVE case study. Explain why and for whom

As shown in the FAM, the Administration module consists of four main submodules: Registration, Validation, Storage and Notification.. After Registration, the data is sent to

Explain the main elements of the functional architecture model based on the above model (5p)... Draw a scenario as overlay that describes the main flows of TSD, explain your

The model of ​rationally ​ contains the general information that is shown on the top right of the decision sheet and the data present in all enhanced containers on the