English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113148/144119 (79%)
Visitors : 50707446      Online Users : 324
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/102498
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/102498


    Title: Gnafuy : 基於行動裝置下的分散式運算研究
    Gnafuy : a framework for ubiquitous mobile computation
    Authors: 陳晉杰
    Chen, Jin Jie
    Contributors: 郁方
    Fang, Yu
    陳晉杰
    Chen, Jin Jie
    Keywords: 行動運算
    雲端運算
    分散式運算
    群眾外包
    Mobile computing
    Cloud computing
    Distributed computing
    Crowdsourcing
    Date: 2016
    Issue Date: 2016-10-03 14:27:37 (UTC+8)
    Abstract: 隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。
    基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。
    我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。
    Reference: [1] gApache Hadoop.h http://hadoop.apache.org/. (Visited on 02/16/2016).
    [2] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, gSpark: Cluster Computing with Working Sets.,h
    [3] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin,S. Shenker, and I. Stoica, gResilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,h in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 2–2, USENIX Association, 2012.
    [4] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy, gHive-a petabyte scale data warehouse using hadoop,h in Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 996–1005, IEEE, 2010.
    [5] Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, gDryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.,h in OSDI, vol. 8, pp. 1–14, 2008. 25
    [6] gDashboards.h http://developer.android.com/about/dashboards/index.html, 2015. Online; Accessed 4 January 2015.
    [7] gCompare iPhone models..h http://www.apple.com/in/iphone/compare. Online; Accessed 4 January 2015.
    [8] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan, gA framework for partitioning and execution of data stream applications in mobile cloud computing,h ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, pp. 23–32, 2013.
    [9] G. Huerta-Canepa and D. Lee, gA virtual cloud computing provider for mobile devices,h in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6, ACM, 2010.
    [10] J. H. Christensen, gUsing restful web-services and cloud computing to create next generation mobile applications,h in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627–634, ACM, 2009.
    [11] E. E. Marinelli, gHyrax: cloud computing on mobile devices using MapReduce,h tech. rep., DTIC Document, 2009.
    [12] N. Palmer, R. Kemp, T. Kielmann, and H. Bal, gIbis for mobility: solving challenges of mobile computing using grid techniques,h in Proceedings of the 10th workshop on Mobile Computing Systems and Applications, p. 17, ACM, 2009.
    [13] gSelenium - web browser automation.h http://www.seleniumhq.org/. (Accessed on 02/22/2016).
    [14] P. J. Boland, gMajority systems and the condorcet jury theorem,h The Statistician, pp. 181–189, 1989. 26
    [15] gOn Distinguishing between Reliable and Unreliable Sensors Without a Knowledge of the Ground Truth (2015), author=Yazidi Anis, Oommen John and Goodwin Morten, year=2015,h
    [16] J. Dean and S. Ghemawat, gMapReduce: simplified data processing on large clusters,h Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008.
    [17] gApache phoenix.h https://phoenix.apache.org/. (Visited on 06/13/2016).
    [18] gThe Scala Programming Language.h http://www.scala-lang.org/. (Visited on 02/17/2016).
    [19] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, gDryad: distributed dataparallel programs from sequential building blocks,h in ACM SIGOPS Operating Systems Review, vol. 41, pp. 59–72, ACM, 2007.
    [20] N. Fernando, S. W. Loke, and W. Rahayu, gMobile cloud computing: A survey,h Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.
    [21] D. P. Anderson, gBoinc: A system for public-resource computing and storage,h in Grid Computing, 2004. Proceedings. Fifth IEEE/ACM International Workshop on, pp. 4–10, IEEE, 2004.
    [22] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D.Werthimer, gSETI@ home: an experiment in public-resource computing,h Communications of the ACM, vol. 45, no. 11, pp. 56–61, 2002.
    [23] gRosetta@home.h https://boinc.bakerlab.org/. (Visited on 02/18/2016).
    [24] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, gSerendipity: enabling remote computing among intermittently connected mobile devices,h in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp. 145–154, ACM, 2012. 27
    [25] S. Buchegger and J.-Y. Le Boudec, gA robust reputation system for peer-to-peer and mobile ad-hoc networks,h in P2PEcon 2004, no. LCA-CONF-2004-009, 2004.
    [26] C. Dellarocas, gImmunizing online reputation reporting systems against unfair ratings and discriminatory behavior,h in Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150–157, ACM, 2000.
    [27] S. Sen and N. Sajja, gRobustness of reputation-based trust: Boolean case,h in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 288–293, ACM, 2002.
    [28] gAkka.h http://akka.io/. (Visited on 02/17/2016).
    [29] gspray | rest/http for your akka/scala actors.h http://spray.io/. (Visited on 02/17/2016).
    [30] gRabbitMQ - Messaging that just works.h https://www.rabbitmq.com/. (Accessed on 02/22/2016).
    [31] gHow to Run Node.js with Express on Mobile Devices.h http://www.sitepoint. com/how-to-run-node-js-with-express-on-mobile-devices/. (Accessed on 02/22/2016).
    [32] gAndroid Permission.h https://developer.android.com/reference/android/ Manifest.permission.html. Online; Accessed 4 May 2016.
    [33] gGoogle reCAPTCHA.h https://www.google.com/recaptcha/intro/index.html. (Accessed on 04/22/2016).
    [34] A. Kirsch and M. Mitzenmacher, gLess hashing, same performance: Building a better bloom filter,h in Algorithms–ESA 2006, pp. 456–467, Springer, 2006.
    [35] L. K. Yan and H. Yin, gDroidscope: seamlessly reconstructing the os and dalviksemantic views for dynamic android malware analysis,h in Presented as part of the21st USENIX Security Symposium (USENIX Security 12), pp. 569–584, 2012.
    Description: 碩士
    國立政治大學
    資訊管理學系
    103356039
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0103356039
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File SizeFormat
    603901.pdf1652KbAdobe PDF2360View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback