Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/102498
DC FieldValueLanguage
dc.contributor.advisor郁方zh_TW
dc.contributor.advisorFang, Yuen_US
dc.contributor.author陳晉杰zh_TW
dc.contributor.authorChen, Jin Jieen_US
dc.creator陳晉杰zh_TW
dc.creatorChen, Jin Jieen_US
dc.date2016en_US
dc.date.accessioned2016-10-03T06:27:37Z-
dc.date.available2016-10-03T06:27:37Z-
dc.date.issued2016-10-03T06:27:37Z-
dc.identifierG0103356039en_US
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/102498-
dc.description碩士zh_TW
dc.description國立政治大學zh_TW
dc.description資訊管理學系zh_TW
dc.description103356039zh_TW
dc.description.abstract隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。\n基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。\n我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。zh_TW
dc.description.tableofcontentsAbstract i\nContents ii\n1 Introduction 1\n2 Related Work 2\n3 Overview 4\n4 Programming Model 7\n5 Control Center 10\n5.1 Facade 10\n5.2 Task Manager 11\n5.3 Fault Correction 12\n6 Computing Node 12\n6.1 Job Loading 15\n6.2 States of Computing Node 16\n6.2.1 Library Required 16\n6.2.2 Task Required 16\n6.2.3 Data Required 17\n6.2.4 Stop 17\n6.3 Permissions 17\n7 Experiment 19\n7.1 Citation network 19\n7.2 IP Location Finder 22\n8 Future work 23\n8.1 Security 23\n8.2 Permission control 24\n9 Conclusion 24\nReferences 25zh_TW
dc.format.extent1691745 bytes-
dc.format.mimetypeapplication/pdf-
dc.source.urihttp://thesis.lib.nccu.edu.tw/record/#G0103356039en_US
dc.subject行動運算zh_TW
dc.subject雲端運算zh_TW
dc.subject分散式運算zh_TW
dc.subject群眾外包zh_TW
dc.subjectMobile computingen_US
dc.subjectCloud computingen_US
dc.subjectDistributed computingen_US
dc.subjectCrowdsourcingen_US
dc.titleGnafuy : 基於行動裝置下的分散式運算研究zh_TW
dc.titleGnafuy : a framework for ubiquitous mobile computationen_US
dc.typethesisen_US
dc.relation.reference[1] gApache Hadoop.h http://hadoop.apache.org/. (Visited on 02/16/2016).\n[2] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, gSpark: Cluster Computing with Working Sets.,h\n[3] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin,S. Shenker, and I. Stoica, gResilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,h in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 2–2, USENIX Association, 2012.\n[4] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy, gHive-a petabyte scale data warehouse using hadoop,h in Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 996–1005, IEEE, 2010.\n[5] Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, gDryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.,h in OSDI, vol. 8, pp. 1–14, 2008. 25\n[6] gDashboards.h http://developer.android.com/about/dashboards/index.html, 2015. Online; Accessed 4 January 2015.\n[7] gCompare iPhone models..h http://www.apple.com/in/iphone/compare. Online; Accessed 4 January 2015.\n[8] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan, gA framework for partitioning and execution of data stream applications in mobile cloud computing,h ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, pp. 23–32, 2013.\n[9] G. Huerta-Canepa and D. Lee, gA virtual cloud computing provider for mobile devices,h in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6, ACM, 2010.\n[10] J. H. Christensen, gUsing restful web-services and cloud computing to create next generation mobile applications,h in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627–634, ACM, 2009.\n[11] E. E. Marinelli, gHyrax: cloud computing on mobile devices using MapReduce,h tech. rep., DTIC Document, 2009.\n[12] N. Palmer, R. Kemp, T. Kielmann, and H. Bal, gIbis for mobility: solving challenges of mobile computing using grid techniques,h in Proceedings of the 10th workshop on Mobile Computing Systems and Applications, p. 17, ACM, 2009.\n[13] gSelenium - web browser automation.h http://www.seleniumhq.org/. (Accessed on 02/22/2016).\n[14] P. J. Boland, gMajority systems and the condorcet jury theorem,h The Statistician, pp. 181–189, 1989. 26\n[15] gOn Distinguishing between Reliable and Unreliable Sensors Without a Knowledge of the Ground Truth (2015), author=Yazidi Anis, Oommen John and Goodwin Morten, year=2015,h\n[16] J. Dean and S. Ghemawat, gMapReduce: simplified data processing on large clusters,h Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008.\n[17] gApache phoenix.h https://phoenix.apache.org/. (Visited on 06/13/2016).\n[18] gThe Scala Programming Language.h http://www.scala-lang.org/. (Visited on 02/17/2016).\n[19] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, gDryad: distributed dataparallel programs from sequential building blocks,h in ACM SIGOPS Operating Systems Review, vol. 41, pp. 59–72, ACM, 2007.\n[20] N. Fernando, S. W. Loke, and W. Rahayu, gMobile cloud computing: A survey,h Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.\n[21] D. P. Anderson, gBoinc: A system for public-resource computing and storage,h in Grid Computing, 2004. Proceedings. Fifth IEEE/ACM International Workshop on, pp. 4–10, IEEE, 2004.\n[22] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D.Werthimer, gSETI@ home: an experiment in public-resource computing,h Communications of the ACM, vol. 45, no. 11, pp. 56–61, 2002.\n[23] gRosetta@home.h https://boinc.bakerlab.org/. (Visited on 02/18/2016).\n[24] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, gSerendipity: enabling remote computing among intermittently connected mobile devices,h in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp. 145–154, ACM, 2012. 27\n[25] S. Buchegger and J.-Y. Le Boudec, gA robust reputation system for peer-to-peer and mobile ad-hoc networks,h in P2PEcon 2004, no. LCA-CONF-2004-009, 2004.\n[26] C. Dellarocas, gImmunizing online reputation reporting systems against unfair ratings and discriminatory behavior,h in Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150–157, ACM, 2000.\n[27] S. Sen and N. Sajja, gRobustness of reputation-based trust: Boolean case,h in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 288–293, ACM, 2002.\n[28] gAkka.h http://akka.io/. (Visited on 02/17/2016).\n[29] gspray | rest/http for your akka/scala actors.h http://spray.io/. (Visited on 02/17/2016).\n[30] gRabbitMQ - Messaging that just works.h https://www.rabbitmq.com/. (Accessed on 02/22/2016).\n[31] gHow to Run Node.js with Express on Mobile Devices.h http://www.sitepoint. com/how-to-run-node-js-with-express-on-mobile-devices/. (Accessed on 02/22/2016).\n[32] gAndroid Permission.h https://developer.android.com/reference/android/ Manifest.permission.html. Online; Accessed 4 May 2016.\n[33] gGoogle reCAPTCHA.h https://www.google.com/recaptcha/intro/index.html. (Accessed on 04/22/2016).\n[34] A. Kirsch and M. Mitzenmacher, gLess hashing, same performance: Building a better bloom filter,h in Algorithms–ESA 2006, pp. 456–467, Springer, 2006.\n[35] L. K. Yan and H. Yin, gDroidscope: seamlessly reconstructing the os and dalviksemantic views for dynamic android malware analysis,h in Presented as part of the21st USENIX Security Symposium (USENIX Security 12), pp. 569–584, 2012.zh_TW
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.openairetypethesis-
item.grantfulltextrestricted-
item.cerifentitytypePublications-
Appears in Collections:學位論文
Files in This Item:
File SizeFormat
603901.pdf1.65 MBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.