Abstract
1. Introduction
2. Case study design
3. Case study 1: Tactical Cloudlets
4. Case study 2: GigaSight
5. Case study 3: AgroTempus
6. Threats to validity
7. Related work
8. Conclusions and next steps
Acknowledgment
Appendix. Architectural tactics for cyber-foraging
References
Abstract
Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems.