{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:18:16Z","timestamp":1773886696854,"version":"3.50.1"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2018,6]]},"abstract":"<jats:p>\n            In an\n            <jats:italic>edge<\/jats:italic>\n            deployment model, Internet-of-Things (IoT) applications, e.g. for building automation or video surveillance, must process data\n            <jats:italic>locally<\/jats:italic>\n            on IoT devices without relying on permanent connectivity to a cloud backend. The ability to harness the combined resources of multiple IoT devices for computation is influenced by the quality of wireless network connectivity. An open challenge is how practical edge-based IoT applications can be realised that are robust to changes in network bandwidth between IoT devices, due to interference and intermittent connectivity.\n          <\/jats:p>\n          <jats:p>\n            We present\n            <jats:italic>Frontier<\/jats:italic>\n            , a distributed and resilient edge processing platform for IoT devices. The key idea is to express data-intensive IoT applications as continuous data-parallel streaming queries and to improve query throughput in an unreliable wireless network by exploiting\n            <jats:italic>network path diversity<\/jats:italic>\n            : a query includes\n            <jats:italic>operator replicas<\/jats:italic>\n            at different IoT nodes, which increases possible network paths for data. Frontier dynamically routes stream data to operator replicas based on network path conditions. Nodes probe path throughput and use\n            <jats:italic>backpressure stream routing<\/jats:italic>\n            to decide on transmission rates, while exploiting multiple operator replicas for data-parallelism. If a node loses network connectivity, a\n            <jats:italic>transient disconnection recovery<\/jats:italic>\n            mechanism reprocesses the lost data. Our experimental evaluation of Frontier shows that network path diversity improves throughput by 1.3\u00d7\u22122.8\u00d7for different IoT applications, while being resilient to intermittent network connectivity.\n          <\/jats:p>","DOI":"10.14778\/3231751.3231767","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T12:21:07Z","timestamp":1532694067000},"page":"1178-1191","source":"Crossref","is-referenced-by-count":39,"title":["Frontier"],"prefix":"10.14778","volume":"11","author":[{"given":"Dan","family":"O'Keeffe","sequence":"first","affiliation":[{"name":"Imperial College London"}]},{"given":"Theodoros","family":"Salonidis","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[{"name":"Imperial College London"}]}],"member":"320","published-online":{"date-parts":[[2018,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680218"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536229"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0357-y"},{"key":"e_1_2_1_4_1","first-page":"73","volume-title":"17th International Conference on Extending Database Technology (EDBT).","author":"Aly A. M.","year":"2014","unstructured":"A. M. Aly , W. G. Aref , M. Ouzzani , and H. M. Mahmoud . JISC: adaptive stream processing using just-in-time state completion . In 17th International Conference on Extending Database Technology (EDBT). , pages 73 -- 84 , 2014 . A. M. Aly, W. G. Aref, M. Ouzzani, and H. M. Mahmoud. JISC: adaptive stream processing using just-in-time state completion. In 17th International Conference on Extending Database Technology (EDBT)., pages 73--84, 2014."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/382006.383209"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0147-z"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335420"},{"key":"e_1_2_1_9_1","volume-title":"https:\/\/azure.microsoft.com\/en-us\/services\/iot-edge","author":"Edge Microsoft Azure","year":"2017","unstructured":"Microsoft Azure IoT Edge . https:\/\/azure.microsoft.com\/en-us\/services\/iot-edge , 2017 . Microsoft Azure IoT Edge. https:\/\/azure.microsoft.com\/en-us\/services\/iot-edge, 2017."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066160"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080833"},{"key":"e_1_2_1_12_1","unstructured":"Bluetooth.com. Bluetooth technology adding mesh networking to spur new wave of innovation. https:\/\/www.bluetooth.com\/news\/pressreleases\/2015\/02\/24\/bluetoothtechnology-adding-mesh-networking-to-spur-new-wave-of-innovation.  Bluetooth.com. Bluetooth technology adding mesh networking to spur new wave of innovation. https:\/\/www.bluetooth.com\/news\/pressreleases\/2015\/02\/24\/bluetoothtechnology-adding-mesh-networking-to-spur-new-wave-of-innovation."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:TELS.0000029048.24942.65"},{"key":"e_1_2_1_14_1","volume-title":"RFC Editor","author":"Clausen T.","year":"2003","unstructured":"T. Clausen and P. Jacquet . Optimized link state routing protocol (OLSR). RFC 3626 , RFC Editor , October 2003 . http:\/\/www.rfc-editor.org\/rfc\/rfc3626.txt. T. Clausen and P. Jacquet. Optimized link state routing protocol (OLSR). RFC 3626, RFC Editor, October 2003. http:\/\/www.rfc-editor.org\/rfc\/rfc3626.txt."},{"key":"e_1_2_1_15_1","volume-title":"http:\/\/www.connode.com\/solutions","author":"Metering Connode Smart","year":"2016","unstructured":"Connode Smart Metering . http:\/\/www.connode.com\/solutions , 2016 . Connode Smart Metering. http:\/\/www.connode.com\/solutions, 2016."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1766-z"},{"key":"e_1_2_1_17_1","volume-title":"Industrial Automation. https:\/\/www.linear.com\/designtools\/wireless_sensor_apps.php#industrial","author":"Applications Dust Networks","year":"2017","unstructured":"Dust Networks Applications : Industrial Automation. https:\/\/www.linear.com\/designtools\/wireless_sensor_apps.php#industrial , 2017 . Dust Networks Applications: Industrial Automation. https:\/\/www.linear.com\/designtools\/wireless_sensor_apps.php#industrial, 2017."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732279.2732281"},{"key":"e_1_2_1_19_1","volume-title":"L119:1--88","author":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union , L119:1--88 , May 2016 . Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union, L119:1--88, May 2016."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465282"},{"key":"e_1_2_1_21_1","unstructured":"Apache flink. https:\/\/flink.apache.org.  Apache flink. https:\/\/flink.apache.org."},{"key":"e_1_2_1_22_1","volume-title":"https:\/\/nest.com\/cameras","author":"Cam Google Nest","year":"2017","unstructured":"Google Nest Cam . https:\/\/nest.com\/cameras , 2017 . Google Nest Cam. https:\/\/nest.com\/cameras, 2017."},{"key":"e_1_2_1_23_1","volume-title":"https:\/\/aws.amazon.com\/greengrass","author":"Greengrass Amazon AWS","year":"2017","unstructured":"Amazon AWS Greengrass . https:\/\/aws.amazon.com\/greengrass , 2017 . Amazon AWS Greengrass. https:\/\/aws.amazon.com\/greengrass, 2017."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367860"},{"key":"e_1_2_1_25_1","unstructured":"T. Guardian. Revolv devices bricked as Google's Nest shuts down smart home company. https:\/\/www.theguardian.com\/technology\/2016\/apr\/05\/revolv-devices-bricked-google-nest-smart-home.  T. Guardian. Revolv devices bricked as Google's Nest shuts down smart home company. https:\/\/www.theguardian.com\/technology\/2016\/apr\/05\/revolv-devices-bricked-google-nest-smart-home."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.72"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4401047"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367863"},{"key":"e_1_2_1_29_1","volume-title":"The evolution of data to life-critical. https:\/\/www.seagate.com\/files\/www-content\/ourstory\/trends\/files\/Seagate-WP-DataAge2025-March-2017.pdf","author":"Data IDC.","year":"2017","unstructured":"IDC. Data Age 2025 : The evolution of data to life-critical. https:\/\/www.seagate.com\/files\/www-content\/ourstory\/trends\/files\/Seagate-WP-DataAge2025-March-2017.pdf , 2017 . IDC. Data Age 2025: The evolution of data to life-critical. https:\/\/www.seagate.com\/files\/www-content\/ourstory\/trends\/files\/Seagate-WP-DataAge2025-March-2017.pdf, 2017."},{"key":"e_1_2_1_30_1","first-page":"1","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","author":"Telecommunications IEEE","year":"2016","unstructured":"IEEE Standard for Information technology- Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications . IEEE Std 802.11- 2016 (Revision of IEEE Std 802.11-2012), pages 1 -- 3534 , Dec 2016. IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012), pages 1--3534, Dec 2016."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767851"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925777"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/788013.788426"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742788"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2249592"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1058150.1058158"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488283"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113279"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.1261820"},{"key":"e_1_2_1_41_1","first-page":"319","volume-title":"15th International Conference on Modeling and Simulation","author":"Navidi W.","year":"2004","unstructured":"W. Navidi , T. Camp , and N. Bauer . Improving the accuracy of random waypoint simulations through steady-state initialization . 15th International Conference on Modeling and Simulation , pages 319 -- 326 , 2004 . W. Navidi, T. Camp, and N. Bauer. Improving the accuracy of random waypoint simulations through steady-state initialization. 15th International Conference on Modeling and Simulation, pages 319--326, 2004."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.09.010"},{"key":"e_1_2_1_43_1","volume-title":"https:\/\/www.netatmo.com","year":"2017","unstructured":"Netatmo. https:\/\/www.netatmo.com , 2017 . Netatmo. https:\/\/www.netatmo.com, 2017."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335296"},{"key":"e_1_2_1_45_1","volume-title":"Open source computer vision library. https:\/\/github.com\/opencv\/opencv","author":"CV.","year":"2015","unstructured":"Open CV. Open source computer vision library. https:\/\/github.com\/opencv\/opencv , 2015 . OpenCV. Open source computer vision library. https:\/\/github.com\/opencv\/opencv, 2015."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.105"},{"key":"e_1_2_1_47_1","volume-title":"All-in-one wireless security system. https:\/\/getpiper.com\/howitworks","author":"Piper","year":"2016","unstructured":"Piper : All-in-one wireless security system. https:\/\/getpiper.com\/howitworks , 2016 . Piper: All-in-one wireless security system. https:\/\/getpiper.com\/howitworks, 2016."},{"key":"e_1_2_1_48_1","volume-title":"https:\/\/www.polar.com\/uk-en\/b2b_products\/team_sports\/team_pro","author":"Polar Team","year":"2017","unstructured":"Polar Team Pro GPS player tracking. https:\/\/www.polar.com\/uk-en\/b2b_products\/team_sports\/team_pro , 2017 . Polar Team Pro GPS player tracking. https:\/\/www.polar.com\/uk-en\/b2b_products\/team_sports\/team_pro, 2017."},{"key":"e_1_2_1_49_1","unstructured":"PortaPow Dual USB Power Monitor V3. https:\/\/www.portablepowersupplies.co.uk\/portapowdual-usb-power-monitor-v3\/.  PortaPow Dual USB Power Monitor V3. https:\/\/www.portablepowersupplies.co.uk\/portapowdual-usb-power-monitor-v3\/."},{"key":"e_1_2_1_50_1","volume-title":"https:\/\/pro-vigil.com\/features\/video-analytics\/object-tracking","author":"Target Tracking ProVigial","year":"2017","unstructured":"ProVigial Target Tracking and Analysis. https:\/\/pro-vigil.com\/features\/video-analytics\/object-tracking , 2017 . ProVigial Target Tracking and Analysis. https:\/\/pro-vigil.com\/features\/video-analytics\/object-tracking, 2017."},{"key":"e_1_2_1_51_1","first-page":"275","volume-title":"NSDI","author":"Rabkin A.","year":"2014","unstructured":"A. Rabkin , M. Arye , S. Sen , V. S. Pai , and M. J. Freedman . Aggregation and degradation in Jetstream: Streaming analytics in the wide area . In NSDI , pages 275 -- 288 , 2014 . A. Rabkin, M. Arye, S. Sen, V. S. Pai, and M. J. Freedman. Aggregation and degradation in Jetstream: Streaming analytics in the wide area. In NSDI, pages 275--288, 2014."},{"key":"e_1_2_1_52_1","unstructured":"Revolv Inc. http:\/\/revolv.com\/.  Revolv Inc. http:\/\/revolv.com\/."},{"key":"e_1_2_1_53_1","first-page":"343","volume-title":"7th International Workshop on Design of Reliable Communication Networks","author":"Rohrer J. P.","year":"2009","unstructured":"J. P. Rohrer , A. Jabbar , and J. P. G. Sterbenz . Path diversification : A multipath resilience mechanism . In 7th International Workshop on Design of Reliable Communication Networks , pages 343 -- 351 , Oct 2009 . J. P. Rohrer, A. Jabbar, and J. P. G. Sterbenz. Path diversification: A multipath resilience mechanism. In 7th International Workshop on Design of Reliable Communication Networks, pages 343--351, Oct 2009."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137636"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007662"},{"issue":"4","key":"e_1_2_1_56_1","first-page":"39","article-title":"CSA: Streaming engine for internet of things","volume":"38","author":"Shen Z.","year":"2015","unstructured":"Z. Shen , V. Kumaran , M. J. Franklin , S. Krishnamurthy , A. Bhat , M. Kumar , R. Lerche , and K. Macpherson . CSA: Streaming engine for internet of things . IEEE Data Eng. Bull. , 38 ( 4 ): 39 -- 50 , 2015 . Z. Shen, V. Kumaran, M. J. Franklin, S. Krishnamurthy, A. Bhat, M. Kumar, R. Lerche, and K. Macpherson. CSA: Streaming engine for internet of things. IEEE Data Eng. Bull., 38(4):39--50, 2015.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_2_1_57_1","unstructured":"Storm. http:\/\/github.com\/apache\/storm\/.  Storm. http:\/\/github.com\/apache\/storm\/."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.17"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.108"},{"key":"e_1_2_1_61_1","volume-title":"http:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-direct","author":"Direct Wi-Fi","year":"2016","unstructured":"Wi-Fi Direct . http:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-direct , 2016 . Wi-Fi Direct. http:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-direct, 2016."},{"key":"e_1_2_1_62_1","first-page":"306","volume-title":"Middleware","author":"Wolf J.","year":"2008","unstructured":"J. Wolf , N. Bansal , K. Hildrum , S. Parekh , : An optimizing scheduler for large-scale stream-based distributed computer systems . In Middleware , pages 306 -- 325 , 2008 . J. Wolf, N. Bansal, K. Hildrum, S. Parekh, et al. SODA: An optimizing scheduler for large-scale stream-based distributed computer systems. In Middleware, pages 306--325, 2008."},{"key":"e_1_2_1_63_1","unstructured":"M. Wolf. With Mesh Bluetooth strengthens case as key Internet of Things technology. http:\/\/www.forbes.com\/sites\/michaelwolf\/2015\/02\/26\/with-mesh-bluetooth-strengthens-case-as-keyinternet-of-things-technology 2015.  M. Wolf. With Mesh Bluetooth strengthens case as key Internet of Things technology. http:\/\/www.forbes.com\/sites\/michaelwolf\/2015\/02\/26\/with-mesh-bluetooth-strengthens-case-as-keyinternet-of-things-technology 2015."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/601858.601861"},{"key":"e_1_2_1_65_1","volume-title":"NSDI, page 2","author":"Zaharia M.","year":"2012","unstructured":"M. Zaharia , M. Chowdhury , T. Das , A. Dave , J. Ma , M. McCauley , M. J. Franklin , S. Shenker , and I. Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In NSDI, page 2 , 2012 . M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In NSDI, page 2, 2012."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_2_1_67_1","volume-title":"www.zigbee.com","author":"Alliance The Zigbee","year":"2016","unstructured":"The Zigbee Alliance . www.zigbee.com , 2016 . The Zigbee Alliance. www.zigbee.com, 2016."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3231751.3231767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:43:00Z","timestamp":1672224180000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3231751.3231767"}},"subtitle":["resilient edge processing for the internet of things"],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":67,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["10.14778\/3231751.3231767"],"URL":"https:\/\/doi.org\/10.14778\/3231751.3231767","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}