Estimating attributes: analysis and extensions of RELIEF
ECML-94 Proceedings of the European conference on machine learning on Machine Learning
Bayanihan: building and studying web-based volunteer computing systems using Java
Future Generation Computer Systems - Special issue on metacomputing
The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Prisoner's Dilemma
Linked
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
An introduction to variable and feature selection
The Journal of Machine Learning Research
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
BOINC: A System for Public-Resource Computing and Storage
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
SODA: Service Oriented Device Architecture
IEEE Pervasive Computing
Loose Coupling and Healthcare Organizations: Deployment Strategies for Groupware
Computer Supported Cooperative Work
Overlay Node Placement: Analysis, Algorithms and Impact on Applications
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Construct Small Worlds in Wireless Networks Using Data Mules
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
The Proportional-Share Allocation Market for Computational Resources
IEEE Transactions on Parallel and Distributed Systems
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
A multi-agent system for managing adverse weather situations on the road network
Integrated Computer-Aided Engineering
Preserving interaction threads through the use of smartphones in hospitals
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
On cooperative and efficient overlay network evolution based on a group selection pattern
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Multi agent systems: An example of power system dynamic reconfiguration
Integrated Computer-Aided Engineering - Multi-Agent Systems for Energy Management
A real-time analysis approach in opportunistic networks
ACM SIGBED Review - Work-in-Progress (WiP) Session of the 23rd Euromicro Conference on Real-Time Systems (ECRTS 2011)
An efficient and robust content delivery solution for IEEE 802.11p vehicular environments
Journal of Network and Computer Applications
IEEE Communications Magazine
On credibility of simulation studies of telecommunication networks
IEEE Communications Magazine
Routing of multipoint connections
IEEE Journal on Selected Areas in Communications
Agent-based cloud workflow execution
Integrated Computer-Aided Engineering - Anniversary Volume: Celebrating 20 Years of Excellence
A scatter method for data and variable importance evaluation
Integrated Computer-Aided Engineering
A model for mining material properties for radiation shielding
Integrated Computer-Aided Engineering
Network management framework and lifetime evaluation method for wireless sensor networks
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
There currently are many mobile computing devices with various properties and capabilities. These devices may need to collaborate among them to allow nomad workers to perform a common activity. Unfortunately software developers in charge of creating infrastructures or applications allowing these devices to cooperate among them, do not count with clear guidelines to design such software components; particularly when these components must work in a scenario involving heterogeneous devices. This paper presents a study that tries to understand how to address collaboration among heterogeneous mobile devices, by exploring several variables affecting the process. In particular, this study explores various strategies to borrow CPU slots from peer mobile computing devices and return the favor back later on. The study outcomes indicate there is a short list of computing and network variables affecting the collaboration capability of the mobile devices. These findings have been verified using data mining techniques. Based on these findings and the lessons learned, the article presents a simulation method of computing scenarios that can help developers to determine which computing configuration would be suitable to be used in each particular work scenario. Software designers can take advantage of this simulation method and the design guidelines reported in this paper in order to develop applications able to work appropriately in heterogeneous computing scenarios.