Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing

With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on embedded computing systems 2015-03, Vol.14 (2), p.1-25
Hauptverfasser: Loke, Seng W., Napier, Keegan, Alali, Abdulaziz, Fernando, Niroshinie, Rahayu, Wenny
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 25
container_issue 2
container_start_page 1
container_title ACM transactions on embedded computing systems
container_volume 14
creator Loke, Seng W.
Napier, Keegan
Alali, Abdulaziz
Fernando, Niroshinie
Rahayu, Wenny
description With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.
doi_str_mv 10.1145/2656214
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1744702517</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1744702517</sourcerecordid><originalsourceid>FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</originalsourceid><addsrcrecordid>eNotkEtLxDAYRYMoOI7iX-hOF1bz5dE0S6njA0ZcqOuQVzXSNjVpFf-9M8ys7l0cLpeD0DngawDGb0jFKwLsAC2A87qkrOKH205lKXEtjtFJzl8YgyCML9DVczSh80UT-3Ge9BTikIvfMH0Wr3NKcR5cGD6KO_8TrM-n6KjVXfZn-1yi9_vVW_NYrl8enprbdWkJwVPJnK4JcUyDkQ5LxhjBHAzRAozdXKRSttQAaNFKTYyroJXOEl1pajVuPV2iy93umOL37POk-pCt7zo9-DhnBYIxgQkHsUEvdqhNMefkWzWm0Ov0pwCrrQ-190H_AUOCUNE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1744702517</pqid></control><display><type>article</type><title>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</title><source>ACM Digital Library Complete</source><creator>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</creator><creatorcontrib>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</creatorcontrib><description>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/2656214</identifier><language>eng</language><subject>Algorithms ; Bluetooth ; Detection ; Devices ; Embedded computer systems ; Mobile communication systems ; Mobile computing ; Proximity</subject><ispartof>ACM transactions on embedded computing systems, 2015-03, Vol.14 (2), p.1-25</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Loke, Seng W.</creatorcontrib><creatorcontrib>Napier, Keegan</creatorcontrib><creatorcontrib>Alali, Abdulaziz</creatorcontrib><creatorcontrib>Fernando, Niroshinie</creatorcontrib><creatorcontrib>Rahayu, Wenny</creatorcontrib><title>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</title><title>ACM transactions on embedded computing systems</title><description>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</description><subject>Algorithms</subject><subject>Bluetooth</subject><subject>Detection</subject><subject>Devices</subject><subject>Embedded computer systems</subject><subject>Mobile communication systems</subject><subject>Mobile computing</subject><subject>Proximity</subject><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNotkEtLxDAYRYMoOI7iX-hOF1bz5dE0S6njA0ZcqOuQVzXSNjVpFf-9M8ys7l0cLpeD0DngawDGb0jFKwLsAC2A87qkrOKH205lKXEtjtFJzl8YgyCML9DVczSh80UT-3Ge9BTikIvfMH0Wr3NKcR5cGD6KO_8TrM-n6KjVXfZn-1yi9_vVW_NYrl8enprbdWkJwVPJnK4JcUyDkQ5LxhjBHAzRAozdXKRSttQAaNFKTYyroJXOEl1pajVuPV2iy93umOL37POk-pCt7zo9-DhnBYIxgQkHsUEvdqhNMefkWzWm0Ov0pwCrrQ-190H_AUOCUNE</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Loke, Seng W.</creator><creator>Napier, Keegan</creator><creator>Alali, Abdulaziz</creator><creator>Fernando, Niroshinie</creator><creator>Rahayu, Wenny</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Mobile Computations with Surrounding Devices</title><author>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Bluetooth</topic><topic>Detection</topic><topic>Devices</topic><topic>Embedded computer systems</topic><topic>Mobile communication systems</topic><topic>Mobile computing</topic><topic>Proximity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Loke, Seng W.</creatorcontrib><creatorcontrib>Napier, Keegan</creatorcontrib><creatorcontrib>Alali, Abdulaziz</creatorcontrib><creatorcontrib>Fernando, Niroshinie</creatorcontrib><creatorcontrib>Rahayu, Wenny</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Loke, Seng W.</au><au>Napier, Keegan</au><au>Alali, Abdulaziz</au><au>Fernando, Niroshinie</au><au>Rahayu, Wenny</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2015-03-01</date><risdate>2015</risdate><volume>14</volume><issue>2</issue><spage>1</spage><epage>25</epage><pages>1-25</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</abstract><doi>10.1145/2656214</doi><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1539-9087
ispartof ACM transactions on embedded computing systems, 2015-03, Vol.14 (2), p.1-25
issn 1539-9087
1558-3465
language eng
recordid cdi_proquest_miscellaneous_1744702517
source ACM Digital Library Complete
subjects Algorithms
Bluetooth
Detection
Devices
Embedded computer systems
Mobile communication systems
Mobile computing
Proximity
title Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T05%3A25%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20Computations%20with%20Surrounding%20Devices:%20Proximity%20Sensing%20and%20MultiLayered%20Work%20Stealing&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Loke,%20Seng%20W.&rft.date=2015-03-01&rft.volume=14&rft.issue=2&rft.spage=1&rft.epage=25&rft.pages=1-25&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/2656214&rft_dat=%3Cproquest_cross%3E1744702517%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1744702517&rft_id=info:pmid/&rfr_iscdi=true