Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/102498
題名: Gnafuy : 基於行動裝置下的分散式運算研究
Gnafuy : a framework for ubiquitous mobile computation
作者: 陳晉杰
Chen, Jin Jie
貢獻者: 郁方
Fang, Yu
陳晉杰
Chen, Jin Jie
關鍵詞: 行動運算
雲端運算
分散式運算
群眾外包
Mobile computing
Cloud computing
Distributed computing
Crowdsourcing
日期: 2016
上傳時間: 3-Oct-2016
摘要: 隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。\n基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。\n我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。
參考文獻: [1] gApache Hadoop.h http://hadoop.apache.org/. (Visited on 02/16/2016).\n[2] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, gSpark: Cluster Computing with Working Sets.,h\n[3] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin,S. Shenker, and I. Stoica, gResilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,h in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 2–2, USENIX Association, 2012.\n[4] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy, gHive-a petabyte scale data warehouse using hadoop,h in Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 996–1005, IEEE, 2010.\n[5] Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, gDryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.,h in OSDI, vol. 8, pp. 1–14, 2008. 25\n[6] gDashboards.h http://developer.android.com/about/dashboards/index.html, 2015. Online; Accessed 4 January 2015.\n[7] gCompare iPhone models..h http://www.apple.com/in/iphone/compare. Online; Accessed 4 January 2015.\n[8] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan, gA framework for partitioning and execution of data stream applications in mobile cloud computing,h ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, pp. 23–32, 2013.\n[9] G. Huerta-Canepa and D. Lee, gA virtual cloud computing provider for mobile devices,h in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6, ACM, 2010.\n[10] J. H. Christensen, gUsing restful web-services and cloud computing to create next generation mobile applications,h in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627–634, ACM, 2009.\n[11] E. E. Marinelli, gHyrax: cloud computing on mobile devices using MapReduce,h tech. rep., DTIC Document, 2009.\n[12] N. Palmer, R. Kemp, T. Kielmann, and H. Bal, gIbis for mobility: solving challenges of mobile computing using grid techniques,h in Proceedings of the 10th workshop on Mobile Computing Systems and Applications, p. 17, ACM, 2009.\n[13] gSelenium - web browser automation.h http://www.seleniumhq.org/. (Accessed on 02/22/2016).\n[14] P. J. Boland, gMajority systems and the condorcet jury theorem,h The Statistician, pp. 181–189, 1989. 26\n[15] gOn Distinguishing between Reliable and Unreliable Sensors Without a Knowledge of the Ground Truth (2015), author=Yazidi Anis, Oommen John and Goodwin Morten, year=2015,h\n[16] J. Dean and S. Ghemawat, gMapReduce: simplified data processing on large clusters,h Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008.\n[17] gApache phoenix.h https://phoenix.apache.org/. (Visited on 06/13/2016).\n[18] gThe Scala Programming Language.h http://www.scala-lang.org/. (Visited on 02/17/2016).\n[19] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, gDryad: distributed dataparallel programs from sequential building blocks,h in ACM SIGOPS Operating Systems Review, vol. 41, pp. 59–72, ACM, 2007.\n[20] N. Fernando, S. W. Loke, and W. Rahayu, gMobile cloud computing: A survey,h Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.\n[21] D. P. Anderson, gBoinc: A system for public-resource computing and storage,h in Grid Computing, 2004. Proceedings. Fifth IEEE/ACM International Workshop on, pp. 4–10, IEEE, 2004.\n[22] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D.Werthimer, gSETI@ home: an experiment in public-resource computing,h Communications of the ACM, vol. 45, no. 11, pp. 56–61, 2002.\n[23] gRosetta@home.h https://boinc.bakerlab.org/. (Visited on 02/18/2016).\n[24] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, gSerendipity: enabling remote computing among intermittently connected mobile devices,h in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp. 145–154, ACM, 2012. 27\n[25] S. Buchegger and J.-Y. Le Boudec, gA robust reputation system for peer-to-peer and mobile ad-hoc networks,h in P2PEcon 2004, no. LCA-CONF-2004-009, 2004.\n[26] C. Dellarocas, gImmunizing online reputation reporting systems against unfair ratings and discriminatory behavior,h in Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150–157, ACM, 2000.\n[27] S. Sen and N. Sajja, gRobustness of reputation-based trust: Boolean case,h in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 288–293, ACM, 2002.\n[28] gAkka.h http://akka.io/. (Visited on 02/17/2016).\n[29] gspray | rest/http for your akka/scala actors.h http://spray.io/. (Visited on 02/17/2016).\n[30] gRabbitMQ - Messaging that just works.h https://www.rabbitmq.com/. (Accessed on 02/22/2016).\n[31] gHow to Run Node.js with Express on Mobile Devices.h http://www.sitepoint. com/how-to-run-node-js-with-express-on-mobile-devices/. (Accessed on 02/22/2016).\n[32] gAndroid Permission.h https://developer.android.com/reference/android/ Manifest.permission.html. Online; Accessed 4 May 2016.\n[33] gGoogle reCAPTCHA.h https://www.google.com/recaptcha/intro/index.html. (Accessed on 04/22/2016).\n[34] A. Kirsch and M. Mitzenmacher, gLess hashing, same performance: Building a better bloom filter,h in Algorithms–ESA 2006, pp. 456–467, Springer, 2006.\n[35] L. K. Yan and H. Yin, gDroidscope: seamlessly reconstructing the os and dalviksemantic views for dynamic android malware analysis,h in Presented as part of the21st USENIX Security Symposium (USENIX Security 12), pp. 569–584, 2012.
描述: 碩士
國立政治大學
資訊管理學系
103356039
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0103356039
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
603901.pdf1.65 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.