Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cyber foraging

Cyber foraging is a pervasive computing technique where resource poor, mobile devices offload some of their heavy work to stronger surrogate machines… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Gace Alandra ew is Sftw re Arctecture Sttegies or CybeForaging Sstem s Cyber-foraging — the leverage of proximate servers to… Expand
  • figure 1.1
  • table 2.2
  • table 2.3
  • table 2.4
  • figure 2.1
Is this relevant?
2014
2014
First responders and others operating in crisis environments increasingly make use of handheld devices to help with tasks such as… Expand
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
As the popularity of smartphones and tablets increases, the mobile platform is becoming a very important target for application… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
  • Jason Flinn
  • Cyber Foraging: Bridging Mobile and Cloud…
  • 2012
  • Corpus ID: 34022974
This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cyber foraging is a pervasive computing technique where small mobile devices offload resource intensive tasks to stronger… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2006
2006
The rapid proliferation of mobile handheld computing devices, such as cellphones and PDAs, has led to an unfortunate conflict. On… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper, we propose cyber foraging: a mechanism to augment the computational and storage capabilities of mobile devices… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?