This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a strongly-typed event-based communication paradigm with abstractions for frugal control, assuming a small footprint runtime. With our model, an application consists of a set of distributed reactive objects, called Frugal Objects (FROBs), that communicate through typed events and dynamically adapt their behavior according to notifications about changes in resource availability. FROBs have a logical time-slicing execution pattern that helps monitor resource consuming tasks and determine resource profiles in terms of CPU, memory, battery and bandwidth
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
Technologies such as mobile, edge, and cloud computing have the potential to form a computing contin...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
This paper presents a computing model for resource-limited mobile devices that might be ubiquitously...
This paper presents a computing model for resource-limited mobile devices. The originality of the mo...
This paper introduces a simple event-based model for programming resource-limited mobile devices. It...
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a ...
[EN] Personal devices are penetrating most technology market sectors nowadays. Despite their growing...
Cloud systems differ fundamentally in how they offer and charge for resources. While some systems pr...
We are moving towards a world of pervasive computing in which users can access and manipulate inform...
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016. ...
An application intended for a mobile computing environment is different from more traditional ones i...
Abstract. This paper describes an event dissemination algorithm that implements a topic-based publis...
Abstract — In this work we explore the opportunity Pervasive Spaces could provide as supplemental en...
AbstractFailing to control resources in mobile, concurrent and distributed systems may lead to impor...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
Technologies such as mobile, edge, and cloud computing have the potential to form a computing contin...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
This paper presents a computing model for resource-limited mobile devices that might be ubiquitously...
This paper presents a computing model for resource-limited mobile devices. The originality of the mo...
This paper introduces a simple event-based model for programming resource-limited mobile devices. It...
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a ...
[EN] Personal devices are penetrating most technology market sectors nowadays. Despite their growing...
Cloud systems differ fundamentally in how they offer and charge for resources. While some systems pr...
We are moving towards a world of pervasive computing in which users can access and manipulate inform...
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016. ...
An application intended for a mobile computing environment is different from more traditional ones i...
Abstract. This paper describes an event dissemination algorithm that implements a topic-based publis...
Abstract — In this work we explore the opportunity Pervasive Spaces could provide as supplemental en...
AbstractFailing to control resources in mobile, concurrent and distributed systems may lead to impor...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...
Technologies such as mobile, edge, and cloud computing have the potential to form a computing contin...
We present a novel approach to conserve power in networked mobile devices. Our approach exploits com...