Cyber foraging

Cyber foraging is a pervasive computing technique where resource poor, mobile devices offload some of their heavy work to stronger surrogate machines… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2018
051020022018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Cyber foraging seeks to expand the capabilities and battery life of mobile devices by offloading intensive computations to nearby… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
2011
2011
There is increased demand to run applications on mobile devices in recent years. Although many of these alluring applications are… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cyber foraging is a pervasive computing technique where small mobile devices offload resource intensive tasks to stronger… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The recent introduction of smartphones has resulted in an explosion of innovative mobile applications. The computational… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2008
2008
Cyber foraging helps small devices perform heavy tasks by opportunistically discovering and utilising available resources (such… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2007
2007
This paper presents the LOCUSTS framework. The aim of the LOCUSTS project is to enable easy use of cyber foraging techniques when… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper, we propose cyber foraging: a mechanism to augment the computational and storage capabilities of mobile devices… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?