skip to main content
research-article

Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing

Published:17 February 2015Publication History
Skip Abstract Section

Abstract

With the proliferation of mobile devices, and their increasingly powerful embedded processors and storage, vast resources increasingly surround users. We have been investigating the concept of on-demand ad hoc forming of groups of nearby mobile devices in the midst of crowds to cooperatively perform computationally intensive tasks as a service to local mobile users, or what we call mobile crowd computing. As devices can vary in processing power and some can leave a group unexpectedly or new devices join in, there is a need for algorithms that can distribute work in a flexible manner and still work with different arrangements of devices that can arise in an ad hoc fashion. In this article, we first argue for the feasibility of such use of crowd-embedded computations using theoretical justifications and reporting on our experiments on Bluetooth-based proximity sensing. We then present a multilayered work-stealing style algorithm for distributing work efficiently among mobile devices and compare speedups attainable for different topologies of devices networked with Bluetooth, justifying a topology-flexible opportunistic approach. While our experiments are with Bluetooth and mobile devices, the approach is applicable to ecosystems of various embedded devices with powerful processors, networking technologies, and storage that will increasingly surround users.

References

  1. Yaniv Altshuler, Michael Fire, Nadav Aharony, Yuval Elovici, and Alex (Sandy) Pentland. 2012. How many makes a crowd? On the evolution of learning as a factor of community coverage. In Proceedings of the 5th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction (SBP'12). Springer-Verlag, Berlin, 43--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. He Ba, Wendi Rabiner Heinzelman, Charles-Antoine Janssen, and Jiye Shi. 2013. Mobile computing—A green computing resource. In WCNC. 4451--4456.Google ScholarGoogle Scholar
  3. Gustavo Callou, Paulo Maciel, Eduardo Tavares, Ermeson Andrade, Bruno Nogueira, Carlos Araujo, and Paulo Cunha. 2011. Energy consumption and execution time estimation of embedded system applications. Microprocess. Microsyst. 35, 4 (June 2011), 426--440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, and Ashwin Patti. 2011. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the 6th Conference on Computer Systems (EuroSys'11). ACM, New York, NY, 301--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, and Paramvir Bahl. 2010. Maui: Making smartphones last longer with code offload. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys'10). ACM, New York, NY, 49--62. DOI:http://dx.doi.org/10.1145/1814433.1814441 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Emiliano De Cristofaro and Claudio Soriente. 2011. Short paper: Pepsi—privacy-enhanced participatory sensing infrastructure. In Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec'11). ACM, New York, NY, 23--28. DOI:http://dx.doi.org/10.1145/1998412.1998418 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Nathan Eagle. 2009. Txteagle: Mobile crowdsourcing. In Proceedings of the 3rd International Conference on Internationalization, Design and Global Development: Held As Part of HCI International 2009 (IDGD'09). Springer-Verlag, Berlin, 447--456. DOI:http://dx.doi.org/10.1007/978-3-642-02767-3_50 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Nathan Eagle and Alex (Sandy) Pentland. 2006. Reality mining: Sensing complex social systems. Personal Ubiquitous Comput. 10, 4 (March 2006), 255--268. DOI:http://dx.doi.org/10.1007/s00779-005-0046-3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhe Fan, Feng Qiu, Arie Kaufman, and Suzanne Yoakum-Stover. 2004. GPU cluster for high performance computing. In Proceedings of the 2004 ACM/IEEE Conference on Supercomputing. IEEE Computer Society, Washington, DC, 47--58. DOI:http://dx.doi.org/10.1109/SC.2004.26 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Niroshinie Fernando, Seng Wai Loke, and Wenny Rahayu. 2012a. Honeybee: A programming framework for mobile crowd computing. In MobiQuitous. 224--236.Google ScholarGoogle Scholar
  11. Niroshinie Fernando, Seng Wai Loke, and Wenny Rahayu. 2012b. Mobile crowd computing with work stealing. In NBiS. 660--665. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. 2013. Mobile cloud computing: A survey. Future Gener. Comput. Syst. 29, 1 (Jan. 2013), 84--106. DOI:http://dx.doi.org/10.1016/j.future.2012.05.023 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Frank H. P. Fitzek and Marcos D. Katz. 2014. Mobile Clouds: Exploiting Distributed Resources in Wireless Networks. Wiley-Blackwell. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Simon Frohn, Sascha Gübner, and Christoph Lindemann. 2010. An accurate and analytically tractable model for human inter-contact times. In Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM'10). ACM, New York, NY, 275--282. DOI:http://dx.doi.org/10.1145/1868521.1868565 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Raghu K. Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Commun. Mag. 49, 11 (2011), 32--39.Google ScholarGoogle ScholarCross RefCross Ref
  16. Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (March 2010), 97--105. DOI:http://dx.doi.org/10.1145/1666420.1666444 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mario Gerla. 2012. Vehicular cloud computing. In Med-Hoc-Net. 152--155.Google ScholarGoogle Scholar
  18. Bo Han and Aravind Srinivasan. 2012. Ediscovery: Energy efficient device discovery for mobile opportunistic communications. In ICNP. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Goran Kalic, Iva Bojic, and Mario Kusek. 2012. Energy consumption in android phones when using wireless communication technologies. In MIPRO. 754--759.Google ScholarGoogle Scholar
  20. Thomas Karagiannis, Jean-Yves Le Boudec, and Milan Vojnovic. 2010. Power law and exponential decay of intercontact times between mobile devices. IEEE Trans. Mob. Comput. 9, 10 (Oct. 2010), 1377--1390. DOI:http://dx.doi.org/10.1109/TMC.2010.99 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Karthik Kumar, Jibang Liu, Yung-Hsiang Lu, and Bharat Bhargava. 2013. A survey of computation offloading for mobile systems. Mob. Netw. Appl. 18, 1 (Feb. 2013), 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Chunlin Li and Layuan Li. 2010. Energy constrained resource allocation optimization for mobile grids. J. Parallel Distrib. Comput. 70, 3 (2010), 245--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. He Li, Kyoung Soo Bok, and Jae Soo Yoo. 2011. An efficient clustering method for unstructured mobile peer-to-peer networks. In Proceedings of the 2011 ACM Symposium on Research in Applied Computation (RACS'11). ACM, New York, NY, USA, 124--129. DOI:http://dx.doi.org/10.1145/2103380.2103407 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Xiaoqiang Ma, Yuan Zhao, Lei Zhang, Haiyang Wang, and Limei Peng. 2013. When mobile terminals meet the cloud: Computation offloading as the bridge. IEEE Network 27, 5 (2013), 28--33.Google ScholarGoogle ScholarCross RefCross Ref
  25. Eugene E. Marinelli. 2009. Hyrax: Cloud computing on mobile devices using mapreduce. (Sept. 2009). http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA512601.Google ScholarGoogle Scholar
  26. Derek G. Murray, Eiko Yoneki, Jon Crowcroft, and Steven Hand. 2010. The case for crowd computing. In Proceedings of the Second ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld'10). ACM, New York, NY, 39--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Rajesh Krishna Panta, Rittwik Jana, Fan Cheng, Yih-Farn Robin Chen, and Vinay A. Vaishampayan. 2013. Phoenix: Storage using an autonomous mobile infrastructure. IEEE Trans. Parallel Distrib. Syst. 24, 9 (2013), 1863--1873. http://dblp.uni-trier.de/db/journals/tpds/tpds24.html#PantaJCCV13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Eric Paulos and Elizabeth Goodman. 2004. The familiar stranger: Anxiety, comfort, and play in public places. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04). ACM, New York, NY, USA, 223--230. DOI:http://dx.doi.org/10.1145/985692.985721 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jurairat Phuttharak and Seng W. Loke. 2013. Declarative programming for mobile crowdsourcing: Energy considerations and applications. In Proceedings of the 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.Google ScholarGoogle Scholar
  30. Moo-Ryong Ra, Bin Liu, Tom F. La Porta, and Ramesh Govindan. 2012. Medusa: A programming framework for crowd-sensing applications. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys'12). ACM, New York, NY, USA, 337--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. 2011. For sale: Your data: By: You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X). ACM, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Juan Manuel Rodríguez, Cristian Mateos, and Alejandro Zunino. 2012. Are smartphones really useful for scientific computing?. In Proceedings of the Second International Conference on Advances in New Technologies, Interactive Interfaces and Communicability (ADNTIIC'11). Springer-Verlag, Berlin, 38--47. DOI:http://dx.doi.org/10.1007/978-3-642-34010-9_4 Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Juan Manuel Rodriguez, Cristian Mateos, and Alejandro Zunino. 2014. Energy-efficient job stealing for cpu-intensive processing in mobile devices. Computing 96, 2 (2014), 87--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Satyanarayanan. 2013. Cloudlets: At the leading edge of cloud-mobile convergence. In Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures (QoSA'13). ACM, New York, NY, 1--2. DOI:http://dx.doi.org/10.1145/2465478.2465494 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Satyanarayanan, G. Lewis, E. Morris, S. Simanta, J. Boleng, and Kiryong Ha. 2013. The role of cloudlets in hostile environments. In Proceedings of the 4th ACM Workshop on Mobile Cloud Computing and Services (MCS'13). ACM, New York, NY, USA, 1--2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Vincent Teo. 2011. Mobile cloud computing for data-intensive applications. Retrieved from http://www.cs.cmu.edu/afs/cs/user/mjs/ftp/thesis-program/2011/theses/teo.pdf.Google ScholarGoogle Scholar
  37. Tim Verbelen, Pieter Simoens, Filip De Turck, and Bart Dhoedt. 2012. Cloudlets: Bringing the cloud to the mobile user. In Proceedings of the 3rd ACM Workshop on Mobile Cloud Computing and Services (MCS'12). ACM, New York, NY, 29--36. DOI:http://dx.doi.org/10.1145/2307849.2307858 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Md Whaiduzzaman, Mehdi Sookhak, Abdullah Gani, and Rajkumar Buyya. 2013. A survey on vehicular cloud computing. J. Network Computer Appl. 40 (April 2014), 325--344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Graham Williamson, Davide Cellai, Simon Dobson, and Paddy Nixon. 2009. Self-management of routing on human proximity networks. In Proceedings of the 4th IFIP TC 6 International Workshop on Self-Organizing Systems (IWSOS'09). Springer-Verlag, Berlin, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle. 2013. Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14, 1 (2013), 284--294. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mobile Computations with Surrounding Devices: Proximity Sensing and MultiLayered Work Stealing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!