Avneesh Bhatnagar, W. Speight, Daniel Crawl, J. Dunn, J. Bennett
{"title":"Application management techniques for the Bifrost system","authors":"Avneesh Bhatnagar, W. Speight, Daniel Crawl, J. Dunn, J. Bennett","doi":"10.1109/MCSA.2003.1240768","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240768","url":null,"abstract":"We describe the adaptive component migration facility in the Bifrost location-independent computing system. We present a facility that allows mobile clients to selectively invoke application component functionality locally or remotely in order to improve user response time. The Bifrost runtime system uses a decision-making process that takes into account a variety of issues affecting the migration decision, including client and server resources, component size, the size of the data associated with the component, and network characteristics. We present a detailed design of this system, while examining the options of function call re-direction and API wrappers as a means to extend the semantics of the underlying remote execution technology (DCOM). The adaptive functionality provided by Bifrost resulted in a minimum 29% reduction in response time experienced by the client over a default DCOM-based implementation for mobile client devices.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DeQing Chen, A. Messer, D. Milojicic, S. Dwarkadas
{"title":"Garbage collector assisted memory offloading for memory-constrained devices","authors":"DeQing Chen, A. Messer, D. Milojicic, S. Dwarkadas","doi":"10.1109/MCSA.2003.1240767","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240767","url":null,"abstract":"Our everyday lives are becoming increasingly filled with mobile devices of varying capabilities. The common practice of creating multiple versions of the same application to cope with diverse device resource capabilities increases software development and maintenance costs. We discuss an offloading method to mask out the memory constraints on devices running a typical Java virtual machine. The method allows the garbage collector to selectively offload part of the object heap into a nearby wired server. In comparison with traditional virtual memory techniques, the garbage collector can make wiser offloading choices using information about object access patterns at a finer granularity. Our experiments show that our prototype introduces modest overhead in the JVM while allowing applications to execute on devices without enough physical memory. In addition, when running with the Linux virtual memory system under intense memory constraints, the prototype achieves an average improvement of 24% in run-time performance and 53% in energy savings.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facile: a framework for attention-correlated local communication","authors":"K. Partridge, Sarah Newman, G. Borriello","doi":"10.1109/MCSA.2003.1240775","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240775","url":null,"abstract":"In ubiquitous computing systems, several devices may coordinate to help a user accomplish her tasks. Careful design of device-device and user-device interaction is crucial to protect the user from the complexity of these systems. Proxies that act on the user's behalf can significantly improve user-device interaction by \"invisibly\" providing personalization data and collecting information from devices. But correctly associating devices and user proxies is challenging, particularly in highly mobile, multiperson, multidevice environments. Highly accurate association generally requires an explicit action on the user's part, which distracts them from their task. We present Facile, a software framework for supporting applications that require invisible association. Facile is independent of the physical communication layer and is designed to minimize latency and power consumption. We describe the construction of three applications in Facile, and our work toward integrating Facile with a capacitively-coupled communication mechanism.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Justin Mazzola Paluska, David Saff, Tom Yeh, K. Chen
{"title":"Footloose: a case for physical eventual consistency and selective conflict resolution","authors":"Justin Mazzola Paluska, David Saff, Tom Yeh, K. Chen","doi":"10.1109/MCSA.2003.1240778","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240778","url":null,"abstract":"Users are increasingly inundated with small devices with communication and storage capabilities. Unfortunately, the user is still responsible for reconciling all of the devices whenever a change is made. We present Footloose, a user-centered data store that can share data and reconcile conflicts across diverse devices. Footloose is an optimistic system based on physical eventual consistency: consistency based on the movement of devices, and selective conflict resolution, which allows conflicts to flow through devices that cannot resolve the conflict to devices that can. Using these techniques, Footloose can present consistent views of data on the devices closest to the user without user interaction.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133596838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Graumann, Jeffrey Hightower, Walter Lara, G. Borriello
{"title":"Real-world implementation of the location stack: the universal location framework","authors":"D. Graumann, Jeffrey Hightower, Walter Lara, G. Borriello","doi":"10.1109/MCSA.2003.1240773","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240773","url":null,"abstract":"Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered location stack that provides appropriate abstractions, common terminology, and a clear API has been proposed in the last edition of WMCSA. We relate the experience gained in applying the location stack abstractions to the design and implementation of a location system using three separate location technologies integrated in a wireless computer. A single application interface, termed the universal location framework, is designed to aggregate indoor, outdoor, and proximity sensor technologies. Our focus is on how well partitioning and parameter passing between the layers worked for our purposes as well as identifying system requirements not currently part of the stack. In closing, we provide evidence in support of the location stack's usefulness and we make some recommendations for its potential evolution.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficiency through burstiness","authors":"A. Papathanasiou, M. Scott","doi":"10.1109/MCSA.2003.1240766","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240766","url":null,"abstract":"OS resource management policies traditionally employ buffering to \"smooth out\" fluctuations in resource demand. By minimizing the length of idle periods and the level of contention during nonidle periods, such smoothing tends to maximize overall throughput and minimize the latency of individual requests. For certain important devices, however (disks, network interfaces, or even computational elements), smoothing eliminates opportunities to save energy using low-power modes. As devices with such modes proliferate, and as energy efficiency becomes an increasingly important design consideration, we argue that OS policies should be redesigned to increase burstiness for energy-sensitive devices. We are currently experimenting with techniques to increase the disk access pattern burstiness of the Linux operating system. Our results indicate that the deliberate creation of bursty activity can save up to 78.5% of the energy consumed by a Hitachi DK23DA disk (in comparison with current policies), while simultaneously decreasing the negative impact of disk congestion and spin-up latency on application performance.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122000533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A historic name-trail service","authors":"Petros Maniatis, Mary Baker","doi":"10.1109/MCSA.2003.1240770","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240770","url":null,"abstract":"We consider the mobility of personal online identifiers. People change the identifiers through which they are reachable online as they change jobs or residences or Internet service providers. This kind of personal mobility makes reaching people online error-prone. As people move, they do not always know who or what has cached their now obsolete identifiers so as to inform them of the move. Use of these old identifiers can cause delivery failure of important messages, or worse, may cause delivery of messages to unintended recipients. For example, a sensitive email message sent to my now obsolete work address at a former place of employment may reach my unfriendly former boss instead of me. We describe HINTS, a historic name-trail service. This service provides a persistent way to name willing participants online using today's transient online identifiers. HINTS accomplishes this by connecting together the names a person uses along with the times during which those names were valid for that person. A correspondent who wishes to reach a mobile person can use an obsolete online name for that person, qualified with a time at which the online name was successfully used; HINTS resolves this historic name to a current valid online identifier for the intended recipient, if that recipient has chosen to leave a name trail in HINTS.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133977731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}