Caching Hints in Distributed Systems
IEEE Transactions on Software Engineering - Special issue on distributed systems
Comparative performance evaluation of garbage collection algorithms
Comparative performance evaluation of garbage collection algorithms
Why cell phones will dominate the future internet
ACM SIGCOMM Computer Communication Review
Erasure-coding based routing for opportunistic networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces
Proceedings of the 4th international conference on Mobile systems, applications and services
A 3: application-aware acceleration for wireless data networks
Proceedings of the 12th annual international conference on Mobile computing and networking
Vehicular opportunistic communication under the microscope
Proceedings of the 5th international conference on Mobile systems, applications and services
Performance evaluation and analysis of delay tolerant networking
MobiEval '07 Proceedings of the 1st international workshop on System evaluation for mobile platforms
Adaptive contact probing mechanisms for delay tolerant applications
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Fair and efficient scheduling in data ferrying networks
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Design principles for robust opportunistic communication
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions
Hi-index | 0.00 |
Constrained computing environments, such as smartphones and embedded wireless devices, are becoming increasingly prevalent. Driven by the need to minimize power usage, these devices are characterized by their low-power CPUs, limited memory, slow yet vast amounts of persistent storage, and one or more wireless network interfaces. As the dominant form of future computing, understanding and adapting to the trade offs that exist between computing and communication resources and energy consumption will become increasingly important. In this paper we consider the effect of a constrained computing environment on opportunistic communication. Drawing from our experiences with two existing mobile systems, we detail the constraints that inhibit opportunistic communication. We also show how these constraints can be satisfied using a set of design principles for systems that depend on opportunistic communication.