The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a real-life case study to show the advantages of a new code offloading solution focused on improving both performance and energy consumption for image processing mobile applications. From our experiments, we found that offloading an image processing task would allow up to 5.7x speedup and 85% of reduction in energy consumption for low-end devices, and 1.7x speedup and 64...
With billions of app downloads, the Apple App Store and Google Play Store succeeded to conquer mobile devices. However, this success also challenges app developers to publish high-quality apps to keep attracting and satisfying end-users. In particular, taming the ever-growing complexity of mobile apps to cope with maintenance and evolution tasks under such a pressure may lead to bad development choices...
Requirements of mobile apps are often hard to elicit from massive numbers of users, although it is important for the solution architecture to meet them. Mobile Twin Peaks approach is proposed as a process of developing apps concurrently and iteratively that incorporates bidirectional communications within a mobile app. The communications allow both requirements engineers and software architects to...
Our Dynamic Encryption Key Security Scheme(DEKSS) is a novel security strategy that utilizes a secure architectureto dispatch and manage data through multiple Cloud ServiceProviders (CSP). This strategy can promise data security for bothclients and service providers without impacting the other party negatively.While there are limitations in being truly secure, such as thoserecognized by WhiteHat security...
Bug prediction allows developers to focus testing eorts onspecic areas of software systems. While this topic has beenextensively studied for traditional applications, investiga-tions on mobile apps are still missing. In this paper wepreliminarily study the eectiveness of a previously denedJust-In-Time bug prediction model applied onve mobileapps. Key results indicate the poor performance of the modeland...
Storing data in the cloud is often a long and disputed process of ensuring that cloud service providers meet the clients minimum requirements. Often, this process can be costly, lack adequate results, and miss important security checks that are often overlooked. Therefore, I propose a new strategy for meeting cloud security requirements through using a dynamic parsing agent to encrypt outgoing data...
The need for performance and energy efficiency in mobile devices is apparent with the obvious shifting of more intensive computation to mobile platforms. In this paper, we first make a clear distinction between performance and energy issues. Apart from showing that performance efficiency is neither co-related with energy-efficiency nor inefficiency, we focus on programming methodologies and software...
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
In this paper, we present some features of our in-situ indoor-outdoor authoring tool for location-based learning experiences. For example, how to reuse locations in different experiences or how to design from scratch in places without any location sensing mechanisms. In addition, we describe some features in which we are working on. We expect to create a space for discussion about these kind of tools...
Bugs that surface in mobile applications can be difficult to reproduce and fix due to several confounding factors including the highly GUI-driven nature of mobile apps, varying contextual states, differing platform versions and device fragmentation. It is clear that developers need support in the form of automated tools that allow for more precise reporting of application defects in order to facilitate...
Android is built upon a permission-based structure, where apps require access to specific permissions in order to carry out specific functionality. While Android has provided a set of best practices intended to aid the developer in properly defining and manipulating these permissions on their source code, developers do not always adhere to these guidelines. Although some of the resulting issues may...
Like all software, Android applications are not immune to bugs, security vulnerabilities, and a wide range of other issues. Concolic analysis, a hybrid software verification technique which performs symbolic execution along with a concrete execution path, has been used for a variety of purposes including software testing, code clone detection, and security-related activities. We created a new publicly...
We conducted a qualitative study to investigate the main aspects related to the development and management of applications (or apps) for smart and mobile devices. Is investigation is composed of two main steps and its context is the so ware industry. In the rst step, we interviewed so ware managers with experience in the context of app development and management. Is part of our study can be intended...
Android applications rely on a permission-based model to carry out core functionality. Appropriate permission usage is imperative for ensuring device security and protecting the user's desired privacy levels. But who is making the important decisions of which permissions the app should request? Are they experienced developers with the appropriate project knowledge to make such important decisions,...
Many intelligent transportation systems (ITS) in cities with developed economies are making use of mobile technology as data sources (e.g., many crowd-sourced traffic-related applications) to improve the quality and efficiency of transportation networks. Often, these data sources are used to supplement existing traffic monitoring equipment (e.g., ground-loop detectors, traffic cameras), to provide...
Wearable apps are becoming increasingly popular in recent years. However, to date, very few studies examined the issues that wearable apps face. Prior studies showed that user reviews contain a plethora of insights that can be used to understand quality issues and help developers build better quality mobile apps. Therefore, in this paper, we mine user reviews in order to understand the user complaints...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.