eyeDentify: Multimedia Cyber Foraging from a Smartphone

被引:38
作者
Kemp, Roelof [1 ]
Palmer, Nicholas [1 ]
Kielmann, Thilo [1 ]
Seinstra, Frank [1 ]
Drost, Niels [1 ]
Maassen, Jason [1 ]
Bal, Henri [1 ]
机构
[1] Vrije Univ Amsterdam, Amsterdam, Netherlands
来源
2009 11TH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2009) | 2009年
关键词
content analysis; object recognition; mobile; middleware; cyber foraging;
D O I
10.1109/ISM.2009.21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The recent introduction of smartphones has resulted in an explosion of innovative mobile applications. The computational requirements of many of these applications, however, can not be met by the smartphone itself. The compute power of the smartphone can be enhanced by distributing the application over other compute resources. Existing solutions comprise of a light weight client running on the smartphone and a heavy weight compute server running on, for example, a cloud. This places the user in a dependent position, however, because the user only controls the client application. In this paper, we follow a different model, called cyber foraging, that gives users full control over all parts of the application. We have implemented the model using the Ibis middleware. We evaluate the model using an innovative application in the domain of multimedia computing, and show that cyber foraging increases the application's responsiveness and accuracy whilst decreasing its energy usage.
引用
收藏
页码:392 / 399
页数:8
相关论文
共 20 条
[1]  
*ANDR, ANDR MARK
[2]  
[Anonymous], AM EL COMP CLOUD
[3]  
[Anonymous], P 2007 ACM IEEE C SU
[4]  
[Anonymous], IPHONE APP STORE
[5]   The smart phone: A ubiquitous input device [J].
Ballagas, R ;
Borchers, J ;
Rohs, M ;
Sheridan, JG .
IEEE PERVASIVE COMPUTING, 2006, 5 (01) :70-77
[6]  
*BLACKBERRY, BLACKBERRY APP WORLD
[7]  
Chun B.G., 2009, C HOT TOP OP SYST US
[8]   Connecting the physical world with pervasive networks [J].
Estrin, Deborah ;
Culler, David ;
Pister, Kris ;
Sukhatme, Gaurav .
IEEE Pervasive Computing, 2002, 1 (01) :59-69
[9]   A lightweight secure cyber foraging infrastructure for resource-constrained devices [J].
Goyal, S ;
Carter, J .
SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, :186-195
[10]  
Kallonen T, 2006, SOFTCOM 2006: INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, P281