dc.creatorHirsch Jofré, Matías Eberardo
dc.creatorMateos Diaz, Cristian Maximiliano
dc.creatorZunino Suarez, Alejandro Octavio
dc.date.accessioned2019-11-29T19:38:39Z
dc.date.accessioned2022-10-15T15:20:27Z
dc.date.available2019-11-29T19:38:39Z
dc.date.available2022-10-15T15:20:27Z
dc.date.created2019-11-29T19:38:39Z
dc.date.issued2018-11
dc.identifierHirsch Jofré, Matías Eberardo; Mateos Diaz, Cristian Maximiliano; Zunino Suarez, Alejandro Octavio; Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey; Elsevier Science; Future Generation Computer Systems; 88; 11-2018; 644-662
dc.identifier0167-739X
dc.identifierhttp://hdl.handle.net/11336/91007
dc.identifierCONICET Digital
dc.identifierCONICET
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/4402091
dc.description.abstractThe ever-growing adoption of smart mobile devices is a worldwide phenomenon that positions smartphones and tablets as primary devices, i.e., that people mostly use. In addition to this, the computing capabilities of such devices, often under-utilized by their owners, are in continuous improvement. Today, smart mobile devices have multi-core CPUs, several gigabytes of RAM, and the ability to communicate through several wireless networking technologies. These facts caught the attention of researchers who propose to leverage smart mobile devices aggregated computing capabilities for running resource intensive software at the edge of the network. Such idea is conditioned by key features, named singularities in the context of this work, that makes smart mobile devices resource exploitation a difficult problem. These are the ability of devices to change location (user mobility), the shared condition -i.e., non-dedicated nature- of resources provided (lack of ownership) and the limited operation time given by the finite energy source (exhaustible resources). In this paper, we provide an in-depth analysis of proposals materializing this idea. We show that (a) existing approaches differ in the singularities combinations they target and the way they address each singularity through novel taxonomies, and (b) this fact makes them suitable for distinct goals and resource exploitation opportunities also schematized in this paper. The latter are represented by real life situations where resources provided by groups of smart mobile devices can be exploited, which in turn, are characterized by a social context and a networking support used to link and coordinate devices. The behavior of people in a given social context configure a special availability level of resources, while the networking support imposes restrictions on how data/computational tasks are distributed and results are collected. We conclude our analysis by discussing strong/weak points of the approaches and by identifying prospective future lines in the area.
dc.languageeng
dc.publisherElsevier Science
dc.relationinfo:eu-repo/semantics/altIdentifier/doi/https://doi.org/10.1016/j.future.2018.06.005
dc.relationinfo:eu-repo/semantics/altIdentifier/url/https://www.sciencedirect.com/science/article/pii/S0167739X1732767X
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/2.5/ar/
dc.rightsinfo:eu-repo/semantics/restrictedAccess
dc.subjectEDGE COMPUTING
dc.subjectMOBILE CLOUD COMPUTING
dc.subjectRESOURCE ALLOCATION
dc.subjectRESOURCE-INTENSIVE APPLICATIONS
dc.subjectSMART MOBILE DEVICES
dc.titleAugmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:ar-repo/semantics/artículo
dc.typeinfo:eu-repo/semantics/publishedVersion


Este ítem pertenece a la siguiente institución