Mobile Edge Computing”, IEEE [5] C

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Edge Computing”, IEEE [5] C Mobile Edge Computing: A Survey on Architecture and Computation Offloading Pavel Mach, IEEE Member, Zdenek Becvar, IEEE Member Abstract—Technological evolution of mobile user equipments a mobile operator and the Internet. The MCC brings several (UEs), such as smartphones or laptops, goes hand-in-hand with advantages [2]; 1) extending battery lifetime by offloading evolution of new mobile applications. However, running compu- energy consuming computations of the applications to the tationally demanding applications at the UEs is constrained by limited battery capacity and energy consumption of the UEs. cloud, 2) enabling sophisticated applications to the mobile Suitable solution extending the battery life-time of the UEs users, and 3) providing higher data storage capabilities to the is to offload the applications demanding huge processing to a users. Nevertheless, the MCC also imposes huge additional conventional centralized cloud (CC). Nevertheless, this option load both on radio and backhaul of mobile networks and introduces significant execution delay consisting in delivery of introduces high latency since data is sent to powerful farm the offloaded applications to the cloud and back plus time of the computation at the cloud. Such delay is inconvenient and of servers that are, in terms of network topology, far away make the offloading unsuitable for real-time applications. To from the users. cope with the delay problem, a new emerging concept, known as To address the problem of a long latency, the cloud services mobile edge computing (MEC), has been introduced. The MEC should be moved to a proximity of the UEs, i.e., to the brings computation and storage resources to the edge of mobile edge of mobile network as considered in newly emerged network enabling to run the highly demanding applications at the UE while meeting strict delay requirements. The MEC edge computing paradigm. The edge computing can be un- computing resources can be exploited also by operators and third derstood as a specific case of the MCC. Nevertheless, in parties for specific purposes. In this paper, we first describe the conventional MCC, the cloud services are accessed via major use cases and reference scenarios where the MEC is the Internet connection [3] while in the case of the edge applicable. After that we survey existing concepts integrating computing, the computing/storage resources are supposed to MEC functionalities to the mobile networks and discuss current advancement in standardization of the MEC. The core of this be in proximity of the UEs (in sense of network topology). survey is, then, focused on user-oriented use case in the MEC, Hence, the MEC can offer significantly lower latencies and i.e., computation offloading. In this regard, we divide the research jitter when compared to the MCC. Moreover, while the MCC on computation offloading to three key areas: i) decision on is fully centralized approach with farms of computers usually computation offloading, ii) allocation of computing resource placed at one or few locations, the edge computing is supposed within the MEC, and iii) mobility management. Finally, we highlight lessons learned in area of the MEC and we discuss to be deployed in fully distributed manner. On the other hand, open research challenges yet to be addressed in order to fully the edge computing provides only limited computational and enjoy potentials offered by the MEC. storage resources with respect to the MCC. A high level comparison of key technical aspects of the MCC and the edge computing is outlined in Table I. I. INTRODUCTION The first edge computing concept bringing the computa- The users’ requirements on data rates and quality of service tion/storage closer to the UEs, proposed in 2009, is cloudlet (QoS) are exponentially increasing. Moreover, technologi- [4]. The idea behind the cloudlet is to place computers with cal evolution of smartphones, laptops and tablets enables high computation power at strategic locations in order to to emerge new high demanding services and applications. provide both computation resources and storage for the UEs Although new mobile devices are more and more powerful in vicinity. The cloudlet concept of the computing ”hotspots” in terms of central processing unit (CPU), even these may not is similar to WiFi hotspots scenario, but instead of Internet be able to handle the applications requiring huge processing arXiv:1702.05309v2 [cs.IT] 13 Mar 2017 connectivity the cloudlet enables cloud services to the mobile in a short time. Moreover, high battery consumption still users. The fact that cloudlets are supposed to be mostly poses a significant obstacle restricting the users to fully enjoy accessed by the mobile UEs through WiFi connection is seen highly demanding applications on their own devices. This motivates development of mobile cloud computing (MCC) concept allowing cloud computing for mobile users [1]. In TABLE I: High level comparison of MCC and Edge comput- the MCC, a user equipment (UE) may exploit computing ing concepts and storage resources of powerful distant centralized clouds Technical aspect MCC Edge computing (CC), which are accessible through a core network (CN) of Deployment Centralized Distributed This work has been supported by the grant of Czech Technical University Distance to the UE High Low in Prague No. SGS17/184/OHK3/3T/13. Latency High Low The authors are with the Department of Telecommunication Engi- Jitter High Low neering, Faculty of Electrical Engineering, Czech Technical University Computational power Ample Limited in Prague, Prague, 166 27 Czech Republic (email:[email protected]; [email protected]). Storage capacity Ample Limited as a disadvantage since the UEs have to switch between Telecommunications Standards Institute (ETSI) [24]. The so- the mobile network and WiFi whenever the cloudlet services lution outlined by ETSI is known as Mobile Edge Com- are exploited [2]. Moreover, QoS (Quality of Service) of the puting (MEC). The standardization efforts relating the MEC mobile UEs is hard to fulfill similarly as in case of the MCC, are driven by prominent mobile operators (e.g., DOCOMO, since the cloudlets are not an inherent part of the mobile Vodafone, TELECOM Italia) and manufactures (e.g., IBM, network and coverage of WiFi is only local with limited Nokia, Huawei, Intel). The main purpose of ISG MEC group support of mobility. is to enable an efficient and seamless integration of the cloud The other option enabling cloud computing at the edge computing functionalities into the mobile network, and to help is to perform computing directly at the UEs through ad- developing favorable conditions for all stakeholders (mobile hoc cloud allowing several UEs in proximity to combine operators, service providers, vendors, and users). their computation power and, thus, process high demanding Several surveys on cloud computing have been published applications locally [5]-[14]. To facilitate the ad-hoc cloud, so far. In [3], the authors survey MCC application models several critical challenges need to be addressed; 1) finding and highlight their advantages and shortcomings. In [25], proper computing UEs in proximity while guaranteeing that a problem of a heterogeneity in the MCC is tackled. The processed data will be delivered back to the source UE, 2) heterogeneity is understood as a variability of mobile de- coordination among the computing UEs has to be enabled vices, different cloud vendors providing different services, despite the fact that there are no control channels to facil- infrastructures, platforms, and various communication medium itate reliable computing, 3) the computing UEs has to be and technologies. The paper identifies how this heterogeneity motivated to provide their computing power to other devices impacts the MCC and discusses related challenges. The au- given the battery consumption and additional data transmission thors in [26] survey existing efforts on Cloud Mobile Media, constraints, 4) security and privacy issues. which provides rich multimedia services over the Internet and A more general concept of the edge computing, when mobile wireless networks. All above-mentioned papers focus, compared to cloudlets and ad-hoc clouds, is known as a fog in general, on the MCC where the cloud is not allocated computing. The fog computing paradigm (shortly often ab- specifically at the edge of mobile network, but it is accessed breviated as Fog in literature) has been introduced in 2012 by through the Internet. Due to a wide potential of the MEC, Cisco to enable a processing of the applications on billions of there is a lot of effort both in industry and academia focusing connected devices at the edge of network [15]. Consequently, on the MEC in particular. Despite this fact, there is just one the fog computing may be considered as one of key enablers survey focusing primarily on the MEC [27] that, however, of Internet of Things (IoT) and big data applications [16] as it only briefly surveys several research works dealing with the offers: 1) low latency and location awareness due to proximity MEC and presents taxonomy of the MEC by describing of the computing devices to the edge of the network, 2) wide- key attributes. Furthermore, the authors in [28] extensively spread geographical distribution when compared to the CC; 3) surveys security issues for various edge computing concepts. interconnection of very large number of nodes (e.g., wireless On top of that, the authors in [29] dedicate one chapter to the sensors), and 4) support of streaming and real time applica- edge computing, where applications of economic and pricing tions [15]. Moreover, the characteristics of the fog computing models are considered for resource management in the edge can be exploited in many other applications and scenarios such computing. as smart grids, connected vehicles for Intelligent Transport In contrast to the above-mentioned surveys, we describe Systems (ITS) or wireless sensor networks [17]-[20]. key use cases and scenarios for the MEC (Section II).
Recommended publications
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Privacy by Design and the Emerging Personal Data Ecosystem
    Privacy by Design and the Emerging Personal Data Ecosystem Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Foreword by Shane Green CEO of Personal October 2012 Acknowledgements The Information and Privacy Commissioner of Ontario, Canada, would like to gratefully acknowledge the contributions of the following individuals whose efforts were invaluable in the drafting of this paper: Michelle Chibba, Director of Policy and Special Projects, IPC, and Policy Department staff; Josh Galper, Chief Policy Officer and General Counsel, Personal; Drummond Reed, Respect Network; Alan Mitchell, Strategy Director, Ctrl-Shift; Claire Hopkins, Marketing and Communications Director, Ctrl-Shift; and Liz Brandt, CEO, Ctrl-Shift. We also appreciate the opportunity to co-launch this paper with the Society for Worldwide Interbank Financial Telecommunication (SWIFT) and acknowledge their contribution to the case study section. We would especially like to thank Peter Vander Auwera, Innovation Leader, SWIFT, and Pierre Blum, Senior Product Manager, SWIFT. 416-326-3333 2 Bloor Street East 1-800-387-0073 Suite 1400 Fax: 416-325-9195 Toronto, Ontario TTY (Teletypewriter): 416-325-7539 Information and Privacy Commissioner M4W 1A8 Website: www.ipc.on.ca Ontario, Canada Canada Privacy by Design: www.privacybydesign.ca TABLE OF CONTENTS Foreword ............................................................................. 1 Introduction ......................................................................... 3 The Personal Data Ecosystem ...............................................
    [Show full text]
  • Mobile Edge Computing a Key Technology Towards 5G
    ETSI White Paper No. 11 Mobile Edge Computing A key technology towards 5G First edition – September 2015 ISBN No. 979-10-92620-08-5 Authors: Yun Chao Hu, Milan Patel, Dario Sabella, Nurit Sprecher and Valerie Young ETSI (European Telecommunications Standards Institute) 06921 Sophia Antipolis CEDEX, France Tel +33 4 92 94 42 00 [email protected] www.etsi.org About the authors Yun Chao Hu Contributor, Huawei, Vice Chair ETSI MEC ISG, Chair MEC IEG Working Group Milan Patel Contributor, Huawei Dario Sabella Contributor, Telecom Italia; Vice-Chair MEC IEG Working Group Nurit Sprecher Contributor, Nokia; Chair ETSI MEC ISG Valerie Young Contributor, Intel Mobile Edge Computing - a key technology towards 5G 2 Contents About the authors 2 Contents 3 Introduction 4 Market Drivers 5 Business Value 6 Mobile Edge Computing Service Scenarios 7 General 7 Augmented Reality 8 Intelligent Video Acceleration 9 Connected Cars 9 Internet of Things Gateway 11 Deployment Scenarios 11 ETSI Industry Specification Group on Mobile Edge Computing 12 Proofs of Concept 13 Conclusions 14 References 15 Mobile Edge Computing - a key technology towards 5G 3 Introduction Mobile Edge Computing (MEC) is a new technology which is currently being standardized in an ETSI Industry Specification Group (ISG) of the same name. Mobile Edge Computing provides an IT service environment and cloud-computing capabilities at the edge of the mobile network, within the Radio Access Network (RAN) and in close proximity to mobile subscribers. The aim is to reduce latency, ensure highly efficient network operation and service delivery, and offer an improved user experience. Mobile Edge Computing is a natural development in the evolution of mobile base stations and the convergence of IT and telecommunications networking.
    [Show full text]
  • Security Issues and Countermeasures in Cloud Computing Environment
    ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 5, September 2015 Security Issues and Countermeasures in Cloud Computing Environment Varun Krishna Veeramachaneni Department of Computer Science, NewYork Institute of Technology, Old Westbury, NY Abstract- “Cloud computing” represents a relatively new computing model in the evolution of on-demand information technology services and products, that is built on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, and reduced total cost of ownership. Contrarily to traditional onsite application architecture where applications are residing in client machines or in a server accessible via client cloud computing offers shared computer application resources and accessible via the Internet. Since cloud computing share distributed resources via the network in the open environment, it presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Various categories of such security concerns are trust, architecture, identity management, software isolation, data protection, confidentiality and availability. All these security vulnerabilities lead to various threats on the cloud such as authentication, misuse of cloud infrastructure, eavesdropping, network intrusion, denial of service attack, session hijacking. Further Cloud Forensic is an emerging challenge related to cloud security]. It examines the key security issues of Cloud computing being faced today and the challenges and opportunities that it brings for business community.
    [Show full text]
  • Mobile Edge Computing: Architecture, Use-Cases, Applications Craig Pritchard, Yousef Beheshti, Mohammad Sepahi
    Mobile Edge Computing: Architecture, Use-cases, Applications Craig Pritchard, Yousef Beheshti, Mohammad Sepahi To cite this version: Craig Pritchard, Yousef Beheshti, Mohammad Sepahi. Mobile Edge Computing: Architecture, Use- cases, Applications. 2020. hal-02612631 HAL Id: hal-02612631 https://hal.archives-ouvertes.fr/hal-02612631 Preprint submitted on 19 May 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Mobile Edge Computing: Architecture, Use-cases, Applications Craig Pritchard, Yousef Beheshti, Mohammad Sepahi Abstract| By enormous growth in IoT and smart devices and the ad- vent of many new applications, Internet traffic volume has been grow- ing exponentially. Analyzing such flooding traffic requires enormous compute and bandwidth and raises privacy concerns. Edge platforms can become the tool to ease the burden by bringing resources to the proximity of data. Therefore, new architectures, which bring network functions and contents to the network edge, are proposed, i.e., mobile edge computing and caching. In this survey, we make an exhaustive review on the literature research efforts on mobile edge networks. We give an overview of mobile edge networks, including definition, archi- tecture, and application and use-cases . We then survey the issues related to computing, caching, and communication techniques at the network edge with the focus on applications and use cases of mobile edge networks.
    [Show full text]
  • 5G and Edge Computing
    Market Driven Strategic Advisory EMERGING AND DISRUPTIVE TECHNOLOGY ANALYSIS 5G and Edge Computing Impact on Business Models, Service Providers, Datacenters, Applications, Business Users and Consumers https://mindcommerce.com/ Copyright 2019 ©Mind Commerce +1 206-395-9205 Market Driven Strategic Advisory EMERGING AND DISRUPTIVE TECHNOLOGY ANALYSIS Highlights and Findings • 5G Influence on Bandwidth and Data Economics: 5G will “reinvent” connectivity as there will be a very credible alternative to cable and fiber for business customers. 5G will bring about fundamental structural economic changes, such as significantly lower broadband pricing as a whole, and also much greater flexibility for enterprise, industrial, and government market segments in terms of how they connect public to private networks. • 5G Needs Edge Computing: LTE is improved with edge computing, but 5G absolutely requires it. In fact, without mobile edge computing, 5G would need to rely upon back-haul to centralized cloud resource for storage and computing, diminishing much of the otherwise positive impact of latency reduction enabled by 5G. • Mobile Edge Computing a Must for Private Wireless Networks: Enterprise and industrial segments will continue to deploy private networks utilizing LTE and WiFi. Many of these networks will evolve to 5G and include edge computing to maximize overall throughput and minimize latency, which will be crucial for certain critical communications solutions such as industrial process automation. • Combined 5G and Edge Solutions: A variety of enhanced services and new apps will be enabled, many of which will be directly or indirectly involved with smart cities, intelligent buildings, and smart homes and workplaces. Key 5G and MEC supported applications for business will be IoT connectivity, SMB/corporate mobility, and fixed wireless.
    [Show full text]
  • Iomega® Personal Cloud for Storcentertm Desktop Network Storage
    Iomega® Personal Cloud for StorCenterTM Desktop Network Storage Reducing the cost, complexity and effort required to protect and share SMB data Iomega Personal Cloud is the ultimate data protection and remote access solution for small- and medium-sized businesses. Introducing the revolutionary technology that allows you to protect and share your data from any location. Iomega Personal Cloud is a patent-pending, web-based computing architecture that connects your Iomega StorCenter network storage devices to other individuals and/or devices via the Internet. Unlike public and private cloud applications, Iomega’s Personal Cloud technology is completely self-owned—so the content and Simplifying collaboration and accessibility is always under your control. Best of all, there are never any usage fees or protecting valuable business data subscription charges, therefore delivering the best value for cloud access and protection. —at a fraction of the effort and cost of prevailing solutions. Remote Replication for Business Continuity • Automatically copy files on your storage With two or more StorCenter devices connected together in your Personal Cloud, you can at work to your storage at home or branch automatically replicate data from your primary business to another location. Keeping this offices. off-site copy ensures data availability in the event of an unforeseen disaster. Remote • Connect your PC or Mac to your storage, backups can run in the background after business hours to eliminate network wherever you are. bottlenecks. • Invite co-workers to join and share, upload and download files in your Using Copy Jobs, remote replication is flexible and powerful. You can choose which folders Personal Cloud.
    [Show full text]
  • Editorial Style Guide February 2018
    Editorial Style Guide February 2018 Creative Services Revision 1.2 [email protected] Table of Contents Editorial Style Guide Notes for Sub-Brands (such as LaCie) External References Definitive Guides Legal Guidelines for Writing Legal Review Process Disclaimers Disclaimer Elements Typical Disclaimer Trademarks Trademark Use With Company Name Trademark Use With Product or Feature Names Third-Party Trademarks Corporate Current Products Legacy Products Current Features/Technologies Legacy Features/Technologies Permissions, Disclosures, and Citations Designer Credits Warranty Use of Language Compound Words 1 Numbers Units of Measure Rounding Areal Density Capacity Dimensions Electricity Performance/Speed Power Dissipation Shock Sound Temperature Time Vibration Lists Capitalization Punctuation Apostrophes Commas Semicolons Colons Dashes Parentheses Ellipses Multiplication Sign Quotation Marks Italics 2 URLs Acronyms and Abbreviations Acronyms to Avoid Acronyms You Do Not Have to Spell Out Word List Sub-Brand-Specific Exceptions LaCie 3 Editorial Style Guide This style guide establishes writing style conventions for Seagate and sub-brand writers and editors in order to help them achieve stylistic consistency across all platforms. This document is the sole point of reference for all ​ public-facing copy published by Seagate and Seagate sub-brands. Send questions, comments, and suggestions to: [email protected] ​ Notes for Sub-Brands (such as LaCie) Per company strategy, some sub-brands may be expected to maintain their unique voice, despite being a holding of Seagate. However, in the interest of centralizing copy standards across all of Seagate and its sub-brands, we expect all sub-brands to use this document as the single point of reference for copy standards.
    [Show full text]
  • Edge Computing for 5G Networks
    5G PPP Technology Board Edge Computing for 5G Networks 5GPPP Technology Board Working Group 5G-IA’s Trials Working Group Edge Computing for 5G Networks Version 1.0 Date: 29-01-2021 Version: 1.0 DOI 10.5281/zenodo.3698117 URL https://doi.org/10.5281/zenodo.3698117 Dissemination level: Public Page 1 / 96 5G PPP Technology Board Edge Computing for 5G Networks Table of Contents Executive Summary ........................................................................................................ 4 1. Introduction - Why Edge Computing is key for 5G and beyond............................ 6 1.1 What is Edge Computing ............................................................................... 6 1.2 Why is Edge Computing critical for 5G ....................................................... 7 1.3 Where is the Edge of the Network ................................................................ 9 1.4 How does the Edge look like? ...................................................................... 12 1.5 Introduction to the 5G Edge Cloud Ecosystem.......................................... 13 2. Key Technologies for 5G on Edge Computing ..................................................... 15 2.1 Resources Virtualization framework .......................................................... 15 2.1.1 Virtual Machines and Containerization ................................................................................... 15 2.1.2 Lightweight virtualization ......................................................................................................
    [Show full text]
  • The Role of Virtualization in the Small Cell Enabled Mobile Edge Computing Ecosystem
    The Role of Virtualization in the Small Cell Enabled Mobile Edge Computing Ecosystem Leonardo Goratti1, C.E. Costa1(&), Jordi Perez-Romero2, P.S. Khodashenas3, Alan Whitehead4, and Ioannis Chochliouros5 1 CREATE-NET, Via alla Cascata 56/D, Trento, Italy [email protected] 2 Universitat Politecnica de Catalunya (UPC), Barcelona, Spain 3 i2CAT, Barcelona, Spain 4 IP.Access, Cambourne, UK 5 Hellenic Telecommunications Organization (OTE), Marousi, Greece Abstract. Virtualisation is playing a fundamental role in the evolution of telecommunication services and infrastructures, bringing to rethink some of the traditional design paradigms of the mobile network and enabling those func- tionalities necessary for supporting new complex ecosystems where multiple actors can participate in a dynamic and secure environment. In Small Cell enabled Mobile Edge Computing deployments, the impact of virtualization technologies is significant in two main aspects: the design and deployment of the telecommuni- cation infrastructure, and the delivery of edge services. Besides, the adoption of virtualization technologies has implications also in the implementation of Self Organizing Network (SON) services and in the enforcement of Service Level Agreement (SLA) policies, both critical in the automation of the delivery of multi-tenant oriented services in such complex infrastructure. From the work performed by the H2020 SESAME project, the beneficial use of virtualization techniques emerges in adding network intelligence and services in the network edge. SESAME relays on virtualization for providing Small Cell as a Service (SCaaS) and per operator Edge Computing services, consolidating the emerging multi-tenancy driven design paradigms in communication infrastructures. Keywords: NFV Small Cell Virtualization 5G Á Á Á 1 Introduction Virtualization technologies decouple software from physical infrastructure, and create virtual resources dedicated to distinct services.
    [Show full text]
  • Contact Info. KOTRA BUSINESS CENTER, Newdelhi
    129 129 Contact Info. KOTRA BUSINESS CENTER, Newdelhi Address : 12thFloor, DLF Cyber Terraces, Building 5-A, DLF Cyber City Phase-Ⅲ, Gurgaon-122002, Haryana, India Tel. (91-12) 4462-8500 FAX. (91-124)4628-501 Email. [email protected] SHOW LOCATION MAP Booth laYOUT CONTEnts GENERAL companY 12CM, INC. 7G61-08 08 AKSys Co., Ltd. 7G61-19 10 Chemtronics 7G61- 12 CLOUDIKE 7G61-20 14 DAZZL CO.,LTD 7F61- 16 DEMAND 7G61- 18 DNX Co.,Ltd. 7G61- 20 ELUON 7G61- 22 HANKOOK ANTENNA CO., LTD. 7G61- 24 INFOWORKS Co., ltd 7G61- 26 KDLAB INC 7FG1-3 28 KRF Co., Ltd. 7F61-25 30 LetinAR 7G61- 32 LiBEST Inc. 7G61- 34 Lycanthrope Co.,Ltd 7G61- 36 PHILKO INTERNTIONAL, INC. 7G61-17 38 Point Mobile 7G61- 40 Prinker Korea Inc. 7F61- 42 RTX Technology Co., Ltd. 7G61- 44 SELCOS 7G61- 46 Stealth Solution 7G61- 48 VIRNECT 7F61-12 50 vtw 7F61- 52 WooKyoung Information Technology Co., Ltd. 7G61-10 54 StaRT companY 42Maru 7F61- 56 Alfoto 7F61- 58 CIRCULUS Inc. 7F61- 60 DeepFine 7F61- 62 ERT Corp 7F61- 64 MINTPOT Co., Ltd. 7F61- 66 Mobile Doctor 7F61- 68 palmcat Corp. 7F61- 70 Robo Risen 7F61- 72 TrustVerse (WealthTreeSG) 7F61- 74 TWONUMVER 7F61- 76 VisualCamp 7F61- 78 Booth No. 8 9 7G61-08 KOREA PAVILION OFFICIAL DIRECTORY 12CM, INC. Products Echoss Smart Stamp/Echoss Platform Based on multi-touch function, 12CM captured the globally used recognition feature of 로고 없음 smart devices to develop and systemize certification system with physical touch on smart devices, which can be applied to a wide range of marketing, e-commerce, and payment service.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,081,411 B2 Kalns Et Al
    US009081411 B2 (12) United States Patent (10) Patent No.: US 9,081,411 B2 Kalns et al. (45) Date of Patent: Jul. 14, 2015 (54) RAPID DEVELOPMENT OF VIRTUAL 8,316,343 B2 * 1 1/2012 Birze et al. .................... 717/1OO PERSONAL ASSISTANT APPLICATIONS 2003/0005412 A1 1/2003 Eanes ........................... 717/120 2003/0046201 A1 3/2003 Cheyer 2005/0097.525 A1* 5, 2005 Stone et al. ................... 717/136 (71) Applicant: SR International, Menlo Park, CA 2007/0022408 A1 1/2007 Brandt et al. ................. 717/136 (US) (Continued) (72) Inventors: Edgar T. Kalns, San Jose, CA (US); Dayne B. Freitag, La Mesa, CA (US); FOREIGN PATENT DOCUMENTS William S. Mark, San Mateo, CA (US); WO WO2O11028844 A2 3, 2011 Necip Fazil Ayan, Palo Alto, CA (US); Michael J. Wolverton, Mountain View, OTHER PUBLICATIONS CA (US); Thomas J. Lee, San Francisco, CA (US) Jari Porras, Reusable Bluetooth Networking Component for Symbian Operating System, 2002, pp. 22-38.* (73) Assignee: SR international Menlo Park, CA (Continued) (*) Notice: Subject to any disclaimer, the term of this Primary Examiner — Thuy Dao patent is extended or adjusted under 35 U.S.C. 154(b) by 132 days Assistant Examiner — Mongbao Nguyen M YW- y yS. (74) Attorney, Agent, or Firm — Barnes & Thornburg LLP (21) Appl. No.: 13/891,858 57 ABSTRACT (22) Filed: May 10, 2013 (57) A platform for developing a virtual personal assistant (65) Prior Publication Data (“VPA) application includes an ontology that defines a com US 2014/0337814 A1 Nov. 13, 2014 puterized structure for representing knowledge relating to • - s one or more domains.
    [Show full text]