The swarm at the edge of the cloud

Edward A. Lee, Jan Rabaey, Björn Hartmann, John Kubiatowicz, Kris Pister, Tajana Simunic Rosing, John Wawrzynek, David Wessel, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, David Blaauw, Prabal Dutta, Kevin Fu, Carlos Guestrin, Ben Taskar, Roozbeh Jafari, Douglas L Jones, Vijay Kumar, Rahul Mangharam, George J. PappasRichard M. Murray, Anthony Rowe

Research output: Contribution to journalReview article

Abstract

TerraSwarm applications, or swarmlets, are characterized by their ability to dynamically recruit resources such as sensors, communication networks, computation, and information from the cloud; to aggregate and use that information to make or aid decisions; and then to dynamically recruit actuation resources. The TerraSwarm vision cannot be achieved by a single vendor providing the components as an integrated system. What is needed instead is the swarm equivalent of the common, general framework that has recently enabled smartphones and similar devices to rapidly deploy and serve a vast range of often unanticipated applications by recruiting resources and composing services. The SwarmOS must support continual reconfiguration of applications and of its own service definitions without ever having the luxury of a clean restart. It must also support richly heterogeneous computing. TerraSwarm protocols will need to detect compromises, distinguish trusted from untrusted data and resources, and be robust to the presence of a certain number of malicious nodes.

Original languageEnglish (US)
Article number6781658
Pages (from-to)8-20
Number of pages13
JournalIEEE Design and Test
Volume31
Issue number3
DOIs
StatePublished - Jun 2014

Fingerprint

Smartphones
Information use
Telecommunication networks
Sensors

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Lee, E. A., Rabaey, J., Hartmann, B., Kubiatowicz, J., Pister, K., Simunic Rosing, T., ... Rowe, A. (2014). The swarm at the edge of the cloud. IEEE Design and Test, 31(3), 8-20. [6781658]. https://doi.org/10.1109/MDAT.2014.2314600

The swarm at the edge of the cloud. / Lee, Edward A.; Rabaey, Jan; Hartmann, Björn; Kubiatowicz, John; Pister, Kris; Simunic Rosing, Tajana; Wawrzynek, John; Wessel, David; Sangiovanni-Vincentelli, Alberto; Seshia, Sanjit A.; Blaauw, David; Dutta, Prabal; Fu, Kevin; Guestrin, Carlos; Taskar, Ben; Jafari, Roozbeh; Jones, Douglas L; Kumar, Vijay; Mangharam, Rahul; Pappas, George J.; Murray, Richard M.; Rowe, Anthony.

In: IEEE Design and Test, Vol. 31, No. 3, 6781658, 06.2014, p. 8-20.

Research output: Contribution to journalReview article

Lee, EA, Rabaey, J, Hartmann, B, Kubiatowicz, J, Pister, K, Simunic Rosing, T, Wawrzynek, J, Wessel, D, Sangiovanni-Vincentelli, A, Seshia, SA, Blaauw, D, Dutta, P, Fu, K, Guestrin, C, Taskar, B, Jafari, R, Jones, DL, Kumar, V, Mangharam, R, Pappas, GJ, Murray, RM & Rowe, A 2014, 'The swarm at the edge of the cloud', IEEE Design and Test, vol. 31, no. 3, 6781658, pp. 8-20. https://doi.org/10.1109/MDAT.2014.2314600
Lee EA, Rabaey J, Hartmann B, Kubiatowicz J, Pister K, Simunic Rosing T et al. The swarm at the edge of the cloud. IEEE Design and Test. 2014 Jun;31(3):8-20. 6781658. https://doi.org/10.1109/MDAT.2014.2314600
Lee, Edward A. ; Rabaey, Jan ; Hartmann, Björn ; Kubiatowicz, John ; Pister, Kris ; Simunic Rosing, Tajana ; Wawrzynek, John ; Wessel, David ; Sangiovanni-Vincentelli, Alberto ; Seshia, Sanjit A. ; Blaauw, David ; Dutta, Prabal ; Fu, Kevin ; Guestrin, Carlos ; Taskar, Ben ; Jafari, Roozbeh ; Jones, Douglas L ; Kumar, Vijay ; Mangharam, Rahul ; Pappas, George J. ; Murray, Richard M. ; Rowe, Anthony. / The swarm at the edge of the cloud. In: IEEE Design and Test. 2014 ; Vol. 31, No. 3. pp. 8-20.
@article{e480f4d507fc4cad9f06965bf6b36fe4,
title = "The swarm at the edge of the cloud",
abstract = "TerraSwarm applications, or swarmlets, are characterized by their ability to dynamically recruit resources such as sensors, communication networks, computation, and information from the cloud; to aggregate and use that information to make or aid decisions; and then to dynamically recruit actuation resources. The TerraSwarm vision cannot be achieved by a single vendor providing the components as an integrated system. What is needed instead is the swarm equivalent of the common, general framework that has recently enabled smartphones and similar devices to rapidly deploy and serve a vast range of often unanticipated applications by recruiting resources and composing services. The SwarmOS must support continual reconfiguration of applications and of its own service definitions without ever having the luxury of a clean restart. It must also support richly heterogeneous computing. TerraSwarm protocols will need to detect compromises, distinguish trusted from untrusted data and resources, and be robust to the presence of a certain number of malicious nodes.",
author = "Lee, {Edward A.} and Jan Rabaey and Bj{\"o}rn Hartmann and John Kubiatowicz and Kris Pister and {Simunic Rosing}, Tajana and John Wawrzynek and David Wessel and Alberto Sangiovanni-Vincentelli and Seshia, {Sanjit A.} and David Blaauw and Prabal Dutta and Kevin Fu and Carlos Guestrin and Ben Taskar and Roozbeh Jafari and Jones, {Douglas L} and Vijay Kumar and Rahul Mangharam and Pappas, {George J.} and Murray, {Richard M.} and Anthony Rowe",
year = "2014",
month = "6",
doi = "10.1109/MDAT.2014.2314600",
language = "English (US)",
volume = "31",
pages = "8--20",
journal = "IEEE Design and Test",
issn = "2168-2356",
publisher = "IEEE Computer Society",
number = "3",

}

TY - JOUR

T1 - The swarm at the edge of the cloud

AU - Lee, Edward A.

AU - Rabaey, Jan

AU - Hartmann, Björn

AU - Kubiatowicz, John

AU - Pister, Kris

AU - Simunic Rosing, Tajana

AU - Wawrzynek, John

AU - Wessel, David

AU - Sangiovanni-Vincentelli, Alberto

AU - Seshia, Sanjit A.

AU - Blaauw, David

AU - Dutta, Prabal

AU - Fu, Kevin

AU - Guestrin, Carlos

AU - Taskar, Ben

AU - Jafari, Roozbeh

AU - Jones, Douglas L

AU - Kumar, Vijay

AU - Mangharam, Rahul

AU - Pappas, George J.

AU - Murray, Richard M.

AU - Rowe, Anthony

PY - 2014/6

Y1 - 2014/6

N2 - TerraSwarm applications, or swarmlets, are characterized by their ability to dynamically recruit resources such as sensors, communication networks, computation, and information from the cloud; to aggregate and use that information to make or aid decisions; and then to dynamically recruit actuation resources. The TerraSwarm vision cannot be achieved by a single vendor providing the components as an integrated system. What is needed instead is the swarm equivalent of the common, general framework that has recently enabled smartphones and similar devices to rapidly deploy and serve a vast range of often unanticipated applications by recruiting resources and composing services. The SwarmOS must support continual reconfiguration of applications and of its own service definitions without ever having the luxury of a clean restart. It must also support richly heterogeneous computing. TerraSwarm protocols will need to detect compromises, distinguish trusted from untrusted data and resources, and be robust to the presence of a certain number of malicious nodes.

AB - TerraSwarm applications, or swarmlets, are characterized by their ability to dynamically recruit resources such as sensors, communication networks, computation, and information from the cloud; to aggregate and use that information to make or aid decisions; and then to dynamically recruit actuation resources. The TerraSwarm vision cannot be achieved by a single vendor providing the components as an integrated system. What is needed instead is the swarm equivalent of the common, general framework that has recently enabled smartphones and similar devices to rapidly deploy and serve a vast range of often unanticipated applications by recruiting resources and composing services. The SwarmOS must support continual reconfiguration of applications and of its own service definitions without ever having the luxury of a clean restart. It must also support richly heterogeneous computing. TerraSwarm protocols will need to detect compromises, distinguish trusted from untrusted data and resources, and be robust to the presence of a certain number of malicious nodes.

UR - http://www.scopus.com/inward/record.url?scp=84905224451&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84905224451&partnerID=8YFLogxK

U2 - 10.1109/MDAT.2014.2314600

DO - 10.1109/MDAT.2014.2314600

M3 - Review article

AN - SCOPUS:84905224451

VL - 31

SP - 8

EP - 20

JO - IEEE Design and Test

JF - IEEE Design and Test

SN - 2168-2356

IS - 3

M1 - 6781658

ER -