Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing
With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform...
Gespeichert in:
Veröffentlicht in: | ACM transactions on embedded computing systems 2015-03, Vol.14 (2), p.1-25 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 25 |
---|---|
container_issue | 2 |
container_start_page | 1 |
container_title | ACM transactions on embedded computing systems |
container_volume | 14 |
creator | Loke, Seng W. Napier, Keegan Alali, Abdulaziz Fernando, Niroshinie Rahayu, Wenny |
description | With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users. |
doi_str_mv | 10.1145/2656214 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1744702517</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1744702517</sourcerecordid><originalsourceid>FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</originalsourceid><addsrcrecordid>eNotkEtLxDAYRYMoOI7iX-hOF1bz5dE0S6njA0ZcqOuQVzXSNjVpFf-9M8ys7l0cLpeD0DngawDGb0jFKwLsAC2A87qkrOKH205lKXEtjtFJzl8YgyCML9DVczSh80UT-3Ge9BTikIvfMH0Wr3NKcR5cGD6KO_8TrM-n6KjVXfZn-1yi9_vVW_NYrl8enprbdWkJwVPJnK4JcUyDkQ5LxhjBHAzRAozdXKRSttQAaNFKTYyroJXOEl1pajVuPV2iy93umOL37POk-pCt7zo9-DhnBYIxgQkHsUEvdqhNMefkWzWm0Ov0pwCrrQ-190H_AUOCUNE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1744702517</pqid></control><display><type>article</type><title>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</title><source>ACM Digital Library Complete</source><creator>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</creator><creatorcontrib>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</creatorcontrib><description>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/2656214</identifier><language>eng</language><subject>Algorithms ; Bluetooth ; Detection ; Devices ; Embedded computer systems ; Mobile communication systems ; Mobile computing ; Proximity</subject><ispartof>ACM transactions on embedded computing systems, 2015-03, Vol.14 (2), p.1-25</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Loke, Seng W.</creatorcontrib><creatorcontrib>Napier, Keegan</creatorcontrib><creatorcontrib>Alali, Abdulaziz</creatorcontrib><creatorcontrib>Fernando, Niroshinie</creatorcontrib><creatorcontrib>Rahayu, Wenny</creatorcontrib><title>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</title><title>ACM transactions on embedded computing systems</title><description>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</description><subject>Algorithms</subject><subject>Bluetooth</subject><subject>Detection</subject><subject>Devices</subject><subject>Embedded computer systems</subject><subject>Mobile communication systems</subject><subject>Mobile computing</subject><subject>Proximity</subject><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNotkEtLxDAYRYMoOI7iX-hOF1bz5dE0S6njA0ZcqOuQVzXSNjVpFf-9M8ys7l0cLpeD0DngawDGb0jFKwLsAC2A87qkrOKH205lKXEtjtFJzl8YgyCML9DVczSh80UT-3Ge9BTikIvfMH0Wr3NKcR5cGD6KO_8TrM-n6KjVXfZn-1yi9_vVW_NYrl8enprbdWkJwVPJnK4JcUyDkQ5LxhjBHAzRAozdXKRSttQAaNFKTYyroJXOEl1pajVuPV2iy93umOL37POk-pCt7zo9-DhnBYIxgQkHsUEvdqhNMefkWzWm0Ov0pwCrrQ-190H_AUOCUNE</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Loke, Seng W.</creator><creator>Napier, Keegan</creator><creator>Alali, Abdulaziz</creator><creator>Fernando, Niroshinie</creator><creator>Rahayu, Wenny</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Mobile Computations with Surrounding Devices</title><author>Loke, Seng W. ; Napier, Keegan ; Alali, Abdulaziz ; Fernando, Niroshinie ; Rahayu, Wenny</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c220t-4da822d4a1b9d094442051b2a71bc145399f3b11a7f9a2bd61f9dc2a6a3ca0fe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Bluetooth</topic><topic>Detection</topic><topic>Devices</topic><topic>Embedded computer systems</topic><topic>Mobile communication systems</topic><topic>Mobile computing</topic><topic>Proximity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Loke, Seng W.</creatorcontrib><creatorcontrib>Napier, Keegan</creatorcontrib><creatorcontrib>Alali, Abdulaziz</creatorcontrib><creatorcontrib>Fernando, Niroshinie</creatorcontrib><creatorcontrib>Rahayu, Wenny</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Loke, Seng W.</au><au>Napier, Keegan</au><au>Alali, Abdulaziz</au><au>Fernando, Niroshinie</au><au>Rahayu, Wenny</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2015-03-01</date><risdate>2015</risdate><volume>14</volume><issue>2</issue><spage>1</spage><epage>25</epage><pages>1-25</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.</abstract><doi>10.1145/2656214</doi><tpages>25</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1539-9087 |
ispartof | ACM transactions on embedded computing systems, 2015-03, Vol.14 (2), p.1-25 |
issn | 1539-9087 1558-3465 |
language | eng |
recordid | cdi_proquest_miscellaneous_1744702517 |
source | ACM Digital Library Complete |
subjects | Algorithms Bluetooth Detection Devices Embedded computer systems Mobile communication systems Mobile computing Proximity |
title | Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T05%3A25%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20Computations%20with%20Surrounding%20Devices:%20Proximity%20Sensing%20and%20MultiLayered%20Work%20Stealing&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Loke,%20Seng%20W.&rft.date=2015-03-01&rft.volume=14&rft.issue=2&rft.spage=1&rft.epage=25&rft.pages=1-25&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/2656214&rft_dat=%3Cproquest_cross%3E1744702517%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1744702517&rft_id=info:pmid/&rfr_iscdi=true |