Abstract

The exploitation of the opportunistic infrastructure via Deviceto-Device (D2D) communication is a critical component towards the adoption of new paradigms such as edge and fog computing. While a lot of work has demonstrated the great potential of D2D communication, it is still unclear whether the benefits of the D2D approach can really be leveraged in practice. In this paper, we develop a software sensor, namely Detector, which senses the infrastructure in proximity of a mobile user. We analyze and evaluate D2D on the wild, i.e., not in simulations. We found that in a realistic environment, a mobile is always co-located in proximity to at least one other mobile device throughout the day. This suggests that a device can schedule tasks processing in coordination with other devices, potentially more powerful, instead of handling the processing of the tasks by itself. © 2016 ACM.

Keywords:
Computer science Mobile device Schedule Software Enhanced Data Rates for GSM Evolution Mobile computing Mobile telephony Human–computer interaction Component (thermodynamics) Embedded system Distributed computing Computer network Mobile radio Telecommunications Operating system

Metrics

17
Cited By
3.88
FWCI (Field Weighted Citation Impact)
16
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Opportunistic and Delay-Tolerant Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Personal Information Management and User Behavior
Social Sciences →  Decision Sciences →  Information Systems and Management
IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.