This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a strongly-typed event-based communication paradigm with abstractions for frugal control, assuming a small footprint runtime. With our model, an application consists of a set of distributed reactive objects, called Frugal Objects (FROBs), that communicate through typed events and dynamically adapt their behavior according to notifications about changes in resource availability. FROBs have a logical time-slicing execution pattern that helps monitor resource consuming tasks and determine resource profiles in terms of CPU, memory, battery and bandwidth. The behavior of a FROB i...
In this dissertation, we explore the various limited resources involved in mobile applications --- b...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
This paper presents a computing model for resource-limited mobile devices that might be ubiquitously...
This paper presents a computing model for resource-limited mobile devices. The originality of the mo...
This paper introduces a simple event-based model for programming resource-limited mobile devices. It...
Whether it is a cell phone or a web server, an applet or a network packet, any software or hardware ...
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a ...
Cloud systems differ fundamentally in how they offer and charge for resources. While some systems p...
We are moving towards a world of pervasive computing in which users can access and manipulate inform...
The ever-growing adoption of smart mobile devices is a worldwide phenomenon that positions smartphon...
Modern mobile platforms are embracing not only heterogeneous but also loosely coupled computational ...
[EN] Personal devices are penetrating most technology market sectors nowadays. Despite their growing...
Smartphones have become more powerful than ever that they can process complex tasks and handle heavy...
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016. ...
In this dissertation, we explore the various limited resources involved in mobile applications --- b...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
This paper presents a computing model for resource-limited mobile devices that might be ubiquitously...
This paper presents a computing model for resource-limited mobile devices. The originality of the mo...
This paper introduces a simple event-based model for programming resource-limited mobile devices. It...
Whether it is a cell phone or a web server, an applet or a network packet, any software or hardware ...
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a ...
Cloud systems differ fundamentally in how they offer and charge for resources. While some systems p...
We are moving towards a world of pervasive computing in which users can access and manipulate inform...
The ever-growing adoption of smart mobile devices is a worldwide phenomenon that positions smartphon...
Modern mobile platforms are embracing not only heterogeneous but also loosely coupled computational ...
[EN] Personal devices are penetrating most technology market sectors nowadays. Despite their growing...
Smartphones have become more powerful than ever that they can process complex tasks and handle heavy...
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016. ...
In this dissertation, we explore the various limited resources involved in mobile applications --- b...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...