1,501 Hits in 8.1 sec

Quantifying the energy cost of data movement for emerging smart phone workloads on mobile platforms

Dhinakaran Pandiyan, Carole-Jean Wu
2014 2014 IEEE International Symposium on Workload Characterization (IISWC)  
To our knowledge, this is the first study that quantifies the amount of data movement energy for emerging smart phone applications running on a recent, commercial smart phone device.  ...  We take a step further to utilize this calculated energy cost of data movement to characterize the portion of energy that an application spends in moving data for a wide range of popular smart phone workloads  ...  This work was partially supported by the NSF I/UCRC Center for Embedded Systems (NSF grant #0856090) and by Science Foundation of Arizona under the Bisgrove Early Career Scholarship.  ... 
doi:10.1109/iiswc.2014.6983056 dblp:conf/iiswc/PandiyanW14 fatcat:iyrmxt7pxfar3l2hjgoenl5zsi

Architectural Thermal Energy Harvesting Opportunities for Sustainable Computing

Carole-Jean Wu
2014 IEEE computer architecture letters  
Wu, "Quantifying the Energy Cost of Data Movement for Emerging Smart Phone Workloads on Mobile Platforms," Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), October  ...  Wu, "Performance, Energy Characterizations and Architectural Implications of An Emerging Mobile Platform Benchmark Suite -MobileBench," Proceedings of the IEEE International Symposium on Workload Characterization  ... 
doi:10.1109/l-ca.2013.16 fatcat:wpoyp4orbzb5lmzaiq4wddesfq

Leveraging smart phones to reduce mobility footprints

Stephen Smaldone, Benjamin Gilbert, Nilton Bila, Liviu Iftode, Eyal de Lara, Mahadev Satyanarayanan
2009 Proceedings of the 7th international conference on Mobile systems, applications, and services - Mobisys '09  
Since most users already carry cell phones for voice calls and texting, Horatio does not increase the size or weight aspects of a user's mobility footprint -there is only a small increase in the energy  ...  Mobility footprint refers to the size, weight, and energy demand of the hardware that must be carried by a mobile user to be effective at any time and place.  ...  , or the University of Toronto.  ... 
doi:10.1145/1555816.1555828 dblp:conf/mobisys/SmaldoneGBILS09 fatcat:4ssae5vjlrgcpaz3l3irlpn7pe

A Survey of Task Allocation: Contrastive Perspectives from Wireless Sensor Networks and Mobile Crowdsensing

Wenzhong Guo, Weiping Zhu, Zhiyong Yu, Jiangtao Wang, Bin Guo
2019 IEEE Access  
In this paper, we give a survey of task allocation in WSNs and MCS from the contrastive perspectives in terms of data quality and sensing cost, which help to better understand related objectives and strategies  ...  Then, we present some common issues in task allocation with objectives in data quality and sensing cost.  ...  Thus, we discuss the sensing cost from the perspectives of energy consume and workload balancing. 1) ENERGY CONSUMPTION Energy expenditure for a sensing node is inevitable.  ... 
doi:10.1109/access.2019.2896226 fatcat:ydat4ftjabgbxp6fjzlpctys44

A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era

Khalid Abualsaud, Tarek M. Elfouly, Tamer Khattab, Elias Yaacoub, Loay Sabry Ismail, Mohamed Hossam Ahmed, Mohsen Guizani
2019 IEEE Access  
Mobile crowd-sensing (MCS) is a new sensing paradigm that takes advantage of the extensive use of mobile phones that collect data efficiently and enable several significant applications.  ...  The aim of this paper is to identify and explore the new paradigm of MCS that is using smartphone for capturing and sharing the sensed data between many nodes.  ...  Finally, the survey in [5] addresses the use of mobile phones in detecting movements and actions.  ... 
doi:10.1109/access.2018.2885918 fatcat:zpkhumhpjzbstpno24u4appmri

The Fog Computing Paradigm: Scenarios and Security Issues

Ivan Stojmenovic, Sheng Wen
2014 Proceedings of the 2014 Federated Conference on Computer Science and Information Systems  
As an example, we study a typical attack, man-in-the-middle attack, for the discussion of security in Fog computing.  ...  We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.  ...  Video communication is set up on BCM5354 between a 3G mobile phone and a laptop which adopts Wifi for connection.  ... 
doi:10.15439/2014f503 dblp:conf/fedcsis/StojmenovicW14 fatcat:br4duwuewbhy3melxerzjtdx4y

Applications of Integrated IoT-Fog-Cloud Systems to Smart Cities: A Survey

Nader Mohamed, Jameela Al-Jaroodi, Sanja Lazarova-Molnar, Imad Jawhar
2021 Electronics  
These issues arise due to the characteristics of iIFCs on the one side and the requirements of different smart city applications on the other.  ...  Utilizing this powerful platform will provide many opportunities for enhancing and optimizing applications in energy, transportation, healthcare, and other areas.  ...  This kind of smart city application can cut traffic delays, lessen vehicle travel times, enhance the average velocity of vehicles on the road, and improve conditions for emergency vehicles' movements in  ... 
doi:10.3390/electronics10232918 fatcat:nvtuswyafjaexhf55bj6i36oey

Urban Sensing based on Mobile Phone Data: Approaches, Applications and Challenges [article]

Mohammadhossein Ghahramani, MengChu Zhou, Gang Wang
2020 arXiv   pre-print
This work aims to review the methods and techniques that have been implemented to discover knowledge from mobile phone data.  ...  Data volume grows explosively with the proliferation of powerful smartphones and innovative mobile applications. The ability to accurately and extensively monitor and analyze these data is necessary.  ...  This inability has led to the development of Big Data analytics platforms, and Cloud-based and Edge Computing [57] , [58] methodologies seem to be perfect solutions for not only hosting big data workloads  ... 
arXiv:2008.12992v1 fatcat:i7ffg23bpncehoadczgfkuoqe4

Fog Computing Approaches in Smart Cities: A State-of-the-Art Review [article]

Maryam Songhorabadi, Morteza Rahimi, Amir Mahdi Moghaddam Farid, Mostafa Haghi Kashani
2020 arXiv   pre-print
These days, the development of smart cities, specifically in location-aware, latency-sensitive, and security-crucial applications (such as emergency fire events, patient health monitoring, or real-time  ...  So as to obviate the limitations of cloud and other related computing paradigms such as edge computing, this paper proposes a systematic literature review (SLR) for the state-of-the-art fog-based approaches  ...  In order to provide resources for vehicular computing based on the mobility migration pattern of geographical, the status of the roads was quantified accurately.  ... 
arXiv:2011.14732v2 fatcat:cvof3r247rbt5gmyaxbqsdtcoy

Edge Computing Resource Allocation for Dynamic Networks: The DRUID-NET Vision and Perspective

Dimitrios Dechouniotis, Nikolaos Athanasopoulos, Aris Leivadeas, Nathalie Mitton, Raphael Jungers, Symeon Papavassiliou
2020 Zenodo  
It includes analytic dynamical modelling of the resources, offered workload, and networking environment, incorporating phenomena typically met in wireless communications and mobile edge computing, together  ...  Several key challenges should be addressed to optimally and jointly exploit the network, computing, and storage resources, guaranteeing at the same time feasibility for time-critical and mission-critical  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.5281/zenodo.5958132 fatcat:ag46ygtlejfxfn7pnxncuite3a

Edge Computing Resource Allocation for Dynamic Networks: The DRUID-NET Vision and Perspective

Dimitrios Dechouniotis, Nikolaos Athanasopoulos, Aris Leivadeas, Nathalie Mitton, Raphaël M. Jungers, Symeon Papavassiliou
2020 Sensors  
It includes analytic dynamical modeling of the resources, offered workload, and networking environment, incorporating phenomena typically met in wireless communications and mobile edge computing, together  ...  The potential offered by the abundance of sensors, actuators, and communications in the Internet of Things (IoT) era is hindered by the limited computational capacity of local nodes.  ...  Conflicts of Interest: The authors declare no conflict of interest. Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/s20082191 pmid:32294937 pmcid:PMC7218846 fatcat:j3hbgmgaarcpjegnnaqq4oq6ei

Technologies for fall risk assessment and conceptual design in personal health record system

Milla Sinikka Immonen, Heidi Similä, Mikko Lindholm, Raija Korpelainen, Timo Jämsä
2019 Finnish Journal of eHealth and eWelfare  
It should always be clear what kind of data are collected from users and how the data are utilised. The consent of the users should also always be collected.  ...  The study also presents one easy to use solution for assessing fall risk and suggests a concept-design for integrating sensor-based solutions into the Finnish national Kanta Personal Health Record.  ...  The authors would like to thank Timo Niemirepo for developing the mobile software for fall risk assessment.  ... 
doi:10.23996/fjhw.73258 fatcat:lprfyt64f5bwnkk7obc7ejcpwm

D2.1 Use Cases, Technical And Business Requirements

Carlos Parada, Francisco Fontes, Isabel Borges, Omer Gurewitz, Philip Eardley, Okung Ntofon, Andy Reid, Giuseppe Bianchi, Nicola Blefari Melazzi, Pierpaolo Loreti, Claudio Pisa, Stefano Salsano (+24 others)
2018 Zenodo  
The report includes a comprehensive set of 23 use cases, covering themes such as wireless access, mobile edge computing and on-the-fly monitoring.  ...  This document presents use cases and requirements for a "superfluid" network, which is one that will have the ability to instantiate services on-the-fly, run them anywhere in the network (core, aggregation  ...  on smart phones provide valuable data which can be fused with other data from the phone such as location to provide context.  ... 
doi:10.5281/zenodo.1219356 fatcat:4cayudykg5g77bahiwksv5q26y


Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, Junehwa Song
2008 Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08  
Proactively providing services to mobile individuals is essential for emerging ubiquitous applications.  ...  The context monitoring with rich sensors imposes heavy workloads on mobile devices with limited computing and battery power.  ...  PDAs and smart phones.  ... 
doi:10.1145/1378600.1378630 dblp:conf/mobisys/KangLJLLPPS08 fatcat:ou4rqayjgvctfngrgkl4wyr4c4

Big Data and cloud computing: innovation opportunities and challenges

Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu, Fei Hu
2016 International Journal of Digital Earth  
Big Data has emerged in the past few years as a new paradigm providing abundant data and opportunities to improve and/or enable research and decision-support applications with unprecedented value for digital  ...  This review introduces future innovations and a research agenda for cloud computing supporting the transformation of the volume, velocity, variety and veracity into values of Big Data for local to global  ...  Acknowledgements We thank the anonymous reviewers for their insightful comments and reviews. Dr George Taylor reviewed a previous version of this manuscript.  ... 
doi:10.1080/17538947.2016.1239771 fatcat:qbcgqj2pcvbgja6dnnakoj2saa
« Previous Showing results 1 — 15 out of 1,501 results