A Survey of Cyber foraging systems: Open Issues, Research Challenges

نویسنده

  • Manas Kumar Yogi
چکیده

Manas Kumar Yogi Department of Computer Science and Engineering, Pragati Engineering College(Autonomous) Email: [email protected] Darapu Uma Department of Computer Science and Engineering, Pragati Engineering College(Autonomous) Email: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure archite...

متن کامل

Challenges and Research Directions in Medical Cyber-Physical Systems

Medical cyber-physical systems (MCPS) are lifecritical, context-aware, networked systems of medical devices. These systems are increasingly used in hospitals to provide highquality continuous care for patients. The need to design complex MCPS that are both safe and effective has presented numerous challenges, including achieving high assurance in system software, intoperability, context-aware i...

متن کامل

An Overview and Some Challenges in Cyber-Physical Systems

Technological advances in computing, communications, and control, have set the stage for a next generation of engineered systems, called cyber-physical systems (CPS). These systems can potentially be important in overcoming many challenges in energy, environment, transportation, and health care. In this paper, we discuss some of these grand challenges that necessitate further advances in CPS. W...

متن کامل

Pnm-25: Nursing Information Systems: Issues and Challenges

Background: The nursing process is often considered as core of the nursing care delivery and guides the care documentation. Currently, with rapid advance in Information and Communication Technology (ICT) this process can be supported electronically. Applying information systems improves care health processes. Nursing Information Systems (NISs) deal with nursing process. Materials and Methods: E...

متن کامل

Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems

Software is everywhere, from mission critical systems such as industrial power stations, pacemakers and even household appliances. This growing dependence on technology and the increasing complexity software has serious security implications as it means we are potentially surrounded by software that contain exploitable vulnerabilities. These challenges have made binary analysis an important are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017