165 research outputs found
Edge analytics in the internet of things
High-data-rate sensors are becoming ubiquitous in the Internet of Things. GigaSight is an Internet-scale repository of crowd-sourced video content that enforces privacy preferences and access controls. The architecture is a federated system of VM-based cloudlets that perform video analytics at the edge of the Internet
Augmenting Cognition Through Edge Computing
Augmented cognition can transform human capabilities, but delivering its benefits in real-time will require low-latency wireless access to powerful infrastructure resources from lightweight wearable devices. Edge computing is the only viable approach to meeting these stringent requirements. In this paper, we explore the symbiotic relationship between augmented cognition and edge computing. We show how off-the-shelf wearable hardware, standard AI technologies such as computer vision, and edge computing can be combined to create a system that is much greater than the sum of its parts. Augmenting human cognition thus emerges as a prime example of a new class of edge-native applications that can become “killer apps” for edge computing
Move Closer : The Benefits of A Flexible Approach to Display and Application Placement (Demo)
ABSTRACT Display appropriation provides a means by which mobile users can cyber-forage local display hardware to provide them with access to a high-quality output device. However, displays are of little use without applications to drive them and yet the nature of application support has been largely ignored in the field -with the prevailing assumption being that applications will be cloud-based and Web-centric. In this demonstration we show a system that presents an alternative vision in which users are able to cyber-forage for both display and compute resources in their local area -enabling them to execute high-performance applications that would not be possible using purely Web-centric technologies. The demonstration leverages a cohesive suite of existing systems, i.e. cloudlets, Internet Suspend/Resume (ISR), Yarely and Tacita, to deliver this vision
Meeting the Software Engineering Challenges of Adaptive Mobile Applications
A critical factor for the commercial success of mobile and task-specific devices is the fast turnaround time of software development. However, developing software for mobile devices is especially hard since applications need to be aware of and adapt to changing resources such as bandwidth and battery. In thi
Simplifying Cyber Foraging for Mobile Devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines a “little language ” for cyber foraging with an adaptive runtime system. We report results from a user study showing that even novice developers are able to successfully modify large, unfamiliar applications in just a few hours. We also show that the quality of novice-modified and expert-modified applications are comparable in most cases. Categories and Subject Descriptor
How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users
Transient use of displays by mobile users wasprophesied two decades ago. Today, convergence of a rangeof technologies enable the realization of this vision. Forresearchers in this space, one key question is where to physicallylocate the application for which the display has beenappropriated. The emergence of cloud and cloudlet computinghas increased the range of possible locations. In this paperwe focus on understanding the extent to which applicationlocation impacts user experience when appropriating displays.We describe a usage model in which public displays can beappropriated to support spontaneous use of interactive applications,present an example architecture based on cloudlets,and explore how application location impacts user experience
Realistic Modeling of Human Timings for Wearable Cognitive Assistance
Wearable Cognitive Assistance (WCA) applications present a challenge to
benchmark and characterize due to their human-in-the-loop nature. Employing
user testing to optimize system parameters is generally not feasible, given the
scope of the problem and the number of observations needed to detect small but
important effects in controlled experiments. Considering the intended
mass-scale deployment of WCA applications in the future, there exists a need
for tools enabling human-independent benchmarking.
We present in this paper the first model for the complete end-to-end
emulation of humans in WCA. We build this model through statistical analysis of
data collected from previous work in this field, and demonstrate its utility by
studying application task durations. Compared to first-order approximations,
our model shows a ~36% larger gap between step execution times at high system
impairment versus low. We further introduce a novel framework for stochastic
optimization of resource consumption-responsiveness tradeoffs in WCA, and show
that by combining this framework with our realistic model of human behavior,
significant reductions of up to 50% in number processed frame samples and 20%
in energy consumption can be achieved with respect to the state-of-the-art.Comment: 16 total pages. 12 figures, 2 tables, 1 appendix. Main document body
by Manuel Olgu\'in Mu\~noz and Vishnu N. Moothedath; appendix by Vishu N.
Moothedath and Jaya Prakash Champati; editing and feedback by all authors;
funding by James Gross and Mahadev Satyanarayanan. Submitted to IEEE
Transactions on Mobile Computin
Giving Users the Steering Wheel for Guiding Resource-Adaptive Systems
This material is based upon work supported by the National Science Foundation (NSF) unde
The case for cyber foraging
In this paper, we propose cyber foraging: a mechanism to augment the computational and storage capabilities of mobile devices. Cyber foraging uses opportunistically discovered servers in the environment to improve the performance of interactive applications and distributed file systems on mobile clients. We show how the performance of distributed file systems can be improved by staging data at these servers even though the servers are not trusted. We also show how the performance of interactive applications can be improved via remote execution. Finally, we present VERSUDS: a virtual interface to heteregeneous service discovery protocols that can be used to discover these servers
- …
