The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Policy-Enabled Handoffs Across Heterogeneous Wireless Networks
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Plutarch: an argument for network pluralism
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Horde: separating network striping policy from mechanism
Proceedings of the 3rd international conference on Mobile systems, applications, and services
An architecture for internet data transfer
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Persistent personal names for globally connected mobile devices
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Perspective: semantic data management for the home
FAST '09 Proccedings of the 7th conference on File and storage technologies
Cimbiosys: a platform for content-based partial replication
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Haggle: seamless networking for mobile applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Hi-index | 0.00 |
We present an approach to optimizing the transfer of data objects within a user's collection of computers and personal devices, subject to a variety of user-defined quality metrics such as cost, power consumption, and latency. By abstracting object transfer as a high-level service, and employing declarative networking techniques to cast object transfer as a constrained optimization problem, we show how to transparently exploit techniques as diverse as swarming and multi-hop transfer through virtual machines. Using a data replication system as a driving application, we demonstrate that our approach can easily accommodate flexible policies not easily implemented with existing solutions, and can thereby result in savings in time, power, bandwidth, or other costs.