Cyber foraging seeks to expand the capabilities and battery life of mobile devices by offloading intensive computations to nearby computing nodes (the surrogates). Although promising, current approaches to cyber foraging tend to impose a strict separation between the application state maintained on the mobile device, and data processed on the surrogates. In this paper, we argue that this separation limits the applicability of cyber foraging, and explore how state sharing could be implemented in practice.
ACM Copyright Notice: © ACM, 2014. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 13th Workshop on Reflective and Adaptive Middleware (ARM 2014, Bordeaux, France, December 9, 2014)..complete documentdoi:http://doi.org/10.1145/2677017.2677023 (publisher's link)