ABSTRACT
Allowing mobile users to find and access resources available in the surrounding environment opportunistically via their smart devices could enable them to create and use a rich set of services. Such services can go well beyond what is possible for a mobile phone acting alone. In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution. In this paper, we discuss the SCAMPI architecture designed to support distributed task execution in opportunistic pervasive networks. The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded in the local environment. The SCAMPI architecture abstracts resources as service components following a service-oriented model. This enables composing rich applications that utilize a collection of service components available in the environment.
- Boincoid project, http://boincoid.sourceforge.net.Google Scholar
- V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H.Weiss. Delay-Tolerant Network Architecture. RFC 4838, April 2007.Google Scholar
- M. Conti, S. Giordano, M. May, and A. Passarella. From opportunistic networks to opportunistic computing. Comm. Mag., 48(9):126--139, Sept. 2010. Google ScholarDigital Library
- M. Conti and M. Kumar. Opportunities in opportunistic computing. Computer, 43(1):42--50, jan. 2010. Google ScholarDigital Library
- T. Hossmann, F. Legendre, G. Nomikos, and T. Spyropoulos. Stumbl: Using facebook to collect rich datasets for opportunistic networking research. In Proceedings of IEEE WoWMoM'11, June 2011. Google ScholarDigital Library
- T. Hossmann, T. Spyropoulos, and F. Legendre. Putting contacts into context: mobility modeling beyond inter-contact times. In Proceedings of Mobihoc '11. ACM, 2011. Google ScholarDigital Library
- P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, WDTN '05, pages 244--251, 2005. Google ScholarDigital Library
- S. Isaacman, S. Ioannidis, A. Chaintreau, and M. Martonosi. Distributed rating prediction in user generated content streams. In Proc. ACM RecSys, Oct 2011. Google ScholarDigital Library
- A. Keränen, M. Pitkänen, M. Vuori, and J. Ott. Effect of non-cooperative nodes in mobile DTNs. In Proceedings of the Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC). IEEE, June 2011. Google ScholarDigital Library
- N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell. A survey of mobile phone sensing. Comm. Mag., 48(9):140--150, Sept. 2010. Google ScholarDigital Library
- A. Passarella and M. Conti. Characterising aggregate inter-contact times in heterogeneous opportunistic networks. In Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II, NETWORKING'11, pages 301--313, 2011. Google ScholarDigital Library
- A. Passarella, M. Kumar, M. Conti, and E. Borgia. Minimum-delay service provisioning in opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 22:1267--1275, 2011. Google ScholarDigital Library
- M. Pitkanen, K. T., and J. Ott. Mobility and service discovery in opportunistic networks. In Proceedings of Permoby 2012, March 2012.Google ScholarCross Ref
- D. Puccinelli, O. Gnawali, S. Yoon, S. Santini, U. Colesanti, S. Giordano, and L. Guibas. The impact of network topology on collection performance. In Proceedings of the 8th European conference on Wireless sensor networks, EWSN'11, pages 17--32, 2011. Google ScholarDigital Library
- K. K. Rachuri, C. Mascolo, M. Musolesi, and P. J. Rentfrow. SociableSense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing. In Proc. ACM MobiCom, 2011. Google ScholarDigital Library
- U. Sadiq, M. Kumar, A. Passarella, and M. Conti. Modeling and simulation of service composition in opportunistic networks. In Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '11, pages 159--168, 2011. Google ScholarDigital Library
- P. Shankar, W. Huang, P. Castro, B. Nath, and I. L. Crowds replace experts: Building better location-based services using mobile social network interactions. In IEEE Percom 2012, March 2012.Google ScholarCross Ref
- Z. Zhou and D. Huang. Efficient and secure data storage operations for mobile cloud computing. IACR Cryptology ePrint Archive, 2011:185, 2011.Google Scholar
- G. Zyba, G. M. Voelker, S. Ioannidis, and C. Diot. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. In INFOCOM, pages 1179--1187. IEEE, 2011.Google ScholarCross Ref
Index Terms
SCAMPI: service platform for social aware mobile and pervasive computing
Recommendations
SCAMPI: service platform for social aware mobile and pervasive computing
Special october issue SIGCOMM '12Allowing mobile users to find and access resources available in the surrounding environment opportunistically via their smart devices could enable them to create and use a rich set of services. Such services can go well beyond what is possible for a ...
SARA: A service architecture for resource aware ubiquitous environments
Realizing the potential of pervasive computing will be predicated upon the availability of a flexible, mobility-aware infrastructure and technologies to support seamless service management, provisioning and delivery. Despite advances in routing and ...
ubiSOAP: A Service-Oriented Middleware for Ubiquitous Networking
The computing and networking capacities of today's wireless portable devices allow for ubiquitous services, which are seamlessly networked. Indeed, wireless handheld devices now embed the necessary resources to act as both service clients and providers. ...
Comments