165 research outputs found

    Edge analytics in the internet of things

    Get PDF
    High-data-rate sensors are becoming ubiquitous in the Internet of Things. GigaSight is an Internet-scale repository of crowd-sourced video content that enforces privacy preferences and access controls. The architecture is a federated system of VM-based cloudlets that perform video analytics at the edge of the Internet

    Augmenting Cognition Through Edge Computing

    Get PDF
    Augmented cognition can transform human capabilities, but delivering its benefits in real-time will require low-latency wireless access to powerful infrastructure resources from lightweight wearable devices. Edge computing is the only viable approach to meeting these stringent requirements. In this paper, we explore the symbiotic relationship between augmented cognition and edge computing. We show how off-the-shelf wearable hardware, standard AI technologies such as computer vision, and edge computing can be combined to create a system that is much greater than the sum of its parts. Augmenting human cognition thus emerges as a prime example of a new class of edge-native applications that can become “killer apps” for edge computing

    Move Closer : The Benefits of A Flexible Approach to Display and Application Placement (Demo)

    Get PDF
    ABSTRACT Display appropriation provides a means by which mobile users can cyber-forage local display hardware to provide them with access to a high-quality output device. However, displays are of little use without applications to drive them and yet the nature of application support has been largely ignored in the field -with the prevailing assumption being that applications will be cloud-based and Web-centric. In this demonstration we show a system that presents an alternative vision in which users are able to cyber-forage for both display and compute resources in their local area -enabling them to execute high-performance applications that would not be possible using purely Web-centric technologies. The demonstration leverages a cohesive suite of existing systems, i.e. cloudlets, Internet Suspend/Resume (ISR), Yarely and Tacita, to deliver this vision

    Meeting the Software Engineering Challenges of Adaptive Mobile Applications

    Get PDF
    A critical factor for the commercial success of mobile and task-specific devices is the fast turnaround time of software development. However, developing software for mobile devices is especially hard since applications need to be aware of and adapt to changing resources such as bandwidth and battery. In thi

    Simplifying Cyber Foraging for Mobile Devices

    Get PDF
    Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines a “little language ” for cyber foraging with an adaptive runtime system. We report results from a user study showing that even novice developers are able to successfully modify large, unfamiliar applications in just a few hours. We also show that the quality of novice-modified and expert-modified applications are comparable in most cases. Categories and Subject Descriptor

    How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users

    Get PDF
    Transient use of displays by mobile users wasprophesied two decades ago. Today, convergence of a rangeof technologies enable the realization of this vision. Forresearchers in this space, one key question is where to physicallylocate the application for which the display has beenappropriated. The emergence of cloud and cloudlet computinghas increased the range of possible locations. In this paperwe focus on understanding the extent to which applicationlocation impacts user experience when appropriating displays.We describe a usage model in which public displays can beappropriated to support spontaneous use of interactive applications,present an example architecture based on cloudlets,and explore how application location impacts user experience

    Realistic Modeling of Human Timings for Wearable Cognitive Assistance

    Full text link
    Wearable Cognitive Assistance (WCA) applications present a challenge to benchmark and characterize due to their human-in-the-loop nature. Employing user testing to optimize system parameters is generally not feasible, given the scope of the problem and the number of observations needed to detect small but important effects in controlled experiments. Considering the intended mass-scale deployment of WCA applications in the future, there exists a need for tools enabling human-independent benchmarking. We present in this paper the first model for the complete end-to-end emulation of humans in WCA. We build this model through statistical analysis of data collected from previous work in this field, and demonstrate its utility by studying application task durations. Compared to first-order approximations, our model shows a ~36% larger gap between step execution times at high system impairment versus low. We further introduce a novel framework for stochastic optimization of resource consumption-responsiveness tradeoffs in WCA, and show that by combining this framework with our realistic model of human behavior, significant reductions of up to 50% in number processed frame samples and 20% in energy consumption can be achieved with respect to the state-of-the-art.Comment: 16 total pages. 12 figures, 2 tables, 1 appendix. Main document body by Manuel Olgu\'in Mu\~noz and Vishnu N. Moothedath; appendix by Vishu N. Moothedath and Jaya Prakash Champati; editing and feedback by all authors; funding by James Gross and Mahadev Satyanarayanan. Submitted to IEEE Transactions on Mobile Computin

    Giving Users the Steering Wheel for Guiding Resource-Adaptive Systems

    Get PDF
    This material is based upon work supported by the National Science Foundation (NSF) unde

    The case for cyber foraging

    Get PDF
    In this paper, we propose cyber foraging: a mechanism to augment the computational and storage capabilities of mobile devices. Cyber foraging uses opportunistically discovered servers in the environment to improve the performance of interactive applications and distributed file systems on mobile clients. We show how the performance of distributed file systems can be improved by staging data at these servers even though the servers are not trusted. We also show how the performance of interactive applications can be improved via remote execution. Finally, we present VERSUDS: a virtual interface to heteregeneous service discovery protocols that can be used to discover these servers
    corecore