The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy consumption is one of the most important aspects of mobile apps. During energy testing, it is important for developers to understand not only the energy consumption rate of an app, but also why energy is consumed. However, existing energy testing tools are more concerned about the accuracy of energy estimation, while typically not providing explanations on why and how exactly energy has been...
Efficient web caching and prefetching can help optimize mobile application web accesses through eliminating network traffic and reducing human perceived latency. However, due to limited storage and computation resources, it is not practical to implement web caching and prefetching mechanisms on mobile devices such as smartphones. This paper proposes Looxy, a mechanism to optimize mobile application...
Although a number of indoor navigation approaches have been proposed, most either require prior knowledge on floor plans, or relying on extra sensors or images, to provide accurate indoor localization and navigation. This paper presents FreeNavi, a landmark-based indoor navigation algorithm that leverages only WiFi signals to direct users in sophisticated indoor environments without prior device deployment...
As many automated test input generation tools for Android need to instrument the system or the app, they cannot be used in some scenarios such as compatibility testing and malware analysis. We introduce DroidBot, a lightweight UI-guided test input generator, which is able to interact with an Android app on almost any device without instrumentation. The key technique behind DroidBot is that it can...
We present LibRadar, a tool that is able to detect third-party libraries used in an Android app accurately and instantly. As third-party libraries are widely used in Android apps, program analysis on Android apps typically needs to detect or remove third-party libraries first in order to function correctly or provide accurate results. However, most previous studies employ a whitelist of package names...
Current generation of smartphones is running more and more complex applications that reduce the battery life to as short as several hours. Thus, it becomes very important to understand the diversities of applications installed on smartphones and how batteries are consumed across different applications. This paper presents a large-scale battery study on smartphones focusing on diversities in applications...
Pedometer apps on smartphones and wearable electronics are increasingly popular nowadays, as they are widely used for health monitoring and location-based systems. Most pedometer apps are based on inertial sensors and each step counting algorithm works precisely under restricted stepping modes because steps are detected and validated after comparing their parameters to pre-determined optimal values...
As smartphones become more and more powerful and complex, many research works have focused on the analysis and optimization of smartphone energy consumption. Most works are focused on the cases when smartphones are actively used. However, one major issue with smartphones is that the standby time has become much shorter compared with traditional feature phones. Many users have to recharge their phones...
As mobile applications (apps) become more and more complex, many apps contain various energy bugs, which may cause energy wastes that might reduce the battery life to as short as several hours. Among them, sensor-related bugs such as sensor data underutilization is one of the most common energy bugs. Instead of trying to detect these energy bugs, this paper proposes a method to fix sensor data underutilization...
Current mobile Web applications (a.k.a, Mobile Web apps) become quite computation-intensive by involving complex JavaScript, e.g., Data analytic applications and AI games, etc. In the context of mobile-cloud computing, computation offloading is a promising solution to improve performance and user experiences for mobile devices, and a lot of research efforts have been made for native apps. However,...
Personal mobile devices (PMDs) have become the most used computing devices for many people. With the introduction of mobile cloud computing, we can augment the storage and computing capabilities of PMDs via cloud support. However, there are many challenges in developing mobile cloud applications (MCAs) that incorporate cloud computing efficiently, especially for developers targeting multiple mobile...
As sensor data grow towards an explosion due to the popularity of Internet of Things and mobile computing, many sensor data sharing platforms are developed to support various sensor-based applications. Although these platforms are able to provide capabilities such as collecting data from sensors and sensor data provision for applications, their capabilities are normally confined in direct retrieval...
Many indoor positioning algorithms have been proposed in the last decade, most of which are based on WiFi RSS fingerprints. However, the environment has changed dramatically since the original algorithms using only a few Access Points (APs). A typical building with densely deployed APs might contain hundreds of APs. The explosive growth of the number of APs introduces new challenges to these WiFi-based...
Recent studies on the Android permission system have found that there exists a permission gap between the requested permissions and permissions actually used in an Android app. However, current approaches face some challenges when detecting such permission gaps in Android apps due to the limitation of static analysis techniques. This paper proposes a novel approach to detect permission gaps in Android...
The emerging geo-social networks bring us attractive location-based services as well as serious location-related privacy threats. Location information of users in geo-social networks might be revealed by friends carelessly, or deduced by users curiously or even maliciously. In order to avoid location leakages, we propose collaborative privacy management in geo-social networks. Users specify and broadcast...
The development of ubiquitous computing has witnessed the invention of various smart things (or smart objects), which normally refer to conventional devices equipped with sensing, computing, and communication capabilities. Programming with smart things faces many challenges because they are mobile, dynamic, and heterogeneous. This paper proposes Thing API as a uniform programming abstraction to support...
It becomes very important to understand power characteristics of mobile applications because more and more complex applications are running on modern smartphones. Although many techniques have been proposed to estimate the power dissipation rate for mobile applications, it typically requires hardware support (i.e., power meters) or complex power models (software profiling or hardware parameters)....
As most mobile devices are capable of accessing the Internet with a mobile web browser, the performance of mobile web browsers has become an interesting research topic recently. Due to network bandwidth and processing power limitations, mobile web browsers are slower compared to PC web browsers when dealing with large-size web contents and computation-intensive operations. In order to improve the...
On-line social networks are playing an important role in our daily lives in the modern society. It is becoming much more frequent and convenient for individuals to communicate with others by publishing data such as photos and videos over on-line social networks. As plenty of personal information is usually contained in these data, privacy leakage has become a more serious problem. However, current...
As more and more component-based systems (CBS) run in the open and dynamic Internet, it is very important to establish trust between clients and CBS. One of the key mechanisms to establish trust among different platforms in an open and dynamic environment is remote attestation, which allows a platform to vouch for its trust-related characteristics to a remote challenger. This paper proposes a novel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.