Explore open access research and scholarly works from STORE - University of Staffordshire Online Repository

Advanced Search

Automated negotiated user profiling across distributed social mobile clouds for resource optimisation

BENKHELIFA, Elhadj, WELSH, Thomas, Tawalbeh, Lo'ai and Jararweh, Yaser (2018) Automated negotiated user profiling across distributed social mobile clouds for resource optimisation. Concurrency and Computation: Practice and Experience. e4349. ISSN 1532-0626

Full text not available from this repository. (Request a copy)
Official URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/cp...

Abstract or description

With mobile computing being the number one user paradigm of choice, and cloud computing becoming the chosen supporting infrastructure, the aggregation of these two areas is inevitable. Yet due to their novelty, they suffer from both inherited and new issues. Social computing theory can apply well to this fusion, such as pooling together in a social model to create ad hoc mobile clouds or by providing a greater functionality for mobile devices through resource augmentation from an external cloud. However, due to the highly contested resources within this setting, these resources must be negotiated within a social context. This paper argues that the application of social models to mobile cloud computing can allow mobile devices to employ cooperative strategies for resource sharing to allow aspects such as energy and costs to be minimised. Social computing is the means of using computing resources to augment human intelligence, mobiles can provide these enhancements to social intelligences but in a peer‐to‐peer manner. This paper proposes the design of a novel system which employs aggregated user and application resource profiling, in order to determine the most optimal place to process data, locally or on a remote cloud. Negotiation with the local cloud will then find a balance between optimum energy and resource utilisation.

Item Type: Article
Additional Information: ** From Crossref via Jisc Publications Router. ** Licence for VoR version of this article starting on 28-02-2018: http://onlinelibrary.wiley.com/termsAndConditions#vor
Uncontrolled Keywords: Theoretical Computer Science, Computer Networks and Communications, Computational Theory and Mathematics, Software, Computer Science Applications
Faculty: School of Computing and Digital Technologies > Computing
SWORD Depositor: JISC pubrouter
Depositing User: JISC pubrouter
Date Deposited: 20 Aug 2018 13:29
Last Modified: 24 Feb 2023 13:52
Related URLs:
URI: https://eprints.staffs.ac.uk/id/eprint/4673

Actions (login required)

View Item
View Item