The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Android code smells are bad implementation practices within Android applications (or apps) that may lead to poor software quality. These code smells are known to degrade the performance of apps and to have an impact on energy consumption. However, few studies have assessed the positive impact on energy consumption when correcting code smells. In this paper, we therefore propose a tooled and reproducible...
Effective detection of malware is of paramount importance for securing the next generation of smart devices. Static detection, the preferred technique used so far, is not sufficiently powerful to defeat state-of-the-art malware, and will be even less effective in the near future. Dynamic malware detection guarantees better protection since it operates at run-time and can identify also unknown malware,...
This paper presents a novel smartphone application that is expected to offer a solution from a different perspective to the problem of mobile phone power. The developed mobile application utilizes crowd sourced battery energy and offers software services in order to enable smartphone users sharing their devices' energy surplus between other users that need it. A hybrid criteria based algorithm that...
In this paper, we address the problem of mobile phishing via the implementation of a Trojan that commits phishing through the mobile's pre-installed applications, which are naturally trusted. It utilizes task interception along with lack of identity indicators, and it overrides the default behavior of some functions to succeed with the attack. We also study the impact of this Trojan on the device's...
Initially, MetaXA (Metadata-processing XMPP-based Architecture) was targeted towards notification distribution and device theft detection. However, since MetaXA is extensible, it can be adapted to many other usage scenarios in the mobile computing domain. For example, in this paper, we demonstrate how to use MetaXA for mobile application management (MAM), without exhausting the battery power of mobile...
Notification distribution is a great feature to have as: (1) it lets employees receive notifications directly on their mobile devices in near real-time; and (2) it reduces the effort required by IT administrators to manage a diverse fleet of mobile devices and platforms. However, it should take into account the fact that the battery lives of mobile devices have been decreasing a lot over the last...
Smartphones are becoming increasingly popular with a wide range of capabilities for the purpose of handling heavy applications like gaming, video editing, and face recognition etc. These kinds of applications continuously require intensive computational power, memory, and battery. Many of the early techniques solve this problem by offloading these applications to run on the Cloud due to its famous...
Despite much advancement in mobile computing technologies, the smart devices still suffer from battery limitations. The power consumption largely depends on how the end-users interact with their smart devices. Continuous usage of exotic hardware, inbuilt sensors, network and bright colorful display shorten battery life significantly. Thus the key to develop power saving solutions is to understand...
The increasing proliferation of mobile handsets, and the migration of the information access paradigm to mobile platforms, leads researchers to study the energy consumption of this class of devices. The literature still lacks metrics and tools that allow software developers to easily measure and optimize the energy efficiency of their code. Energy efficiency can definitely improve user experience...
Network parameters such as packet loss and delay have been extensively investigated as the major factors in determining when and how to carry out VoIP quality adaptation to enhance quality of experience. However, a little effort has been put into investigating the impact of non-network parameters such as limited battery resources in mobile devices on the VoIP QoE. Battery life which is not long enough...
Modern mobile software and hardware is dominated by a paradox: while devices become smaller and services more resource- and energy-demanding, batteries almost maintain size and power. Among them, the multimedia applications consume the most of battery power. By measuring the battery charging level and efficiently estimating the remaining operational time of a portable device, reasonable usage of the...
The number of smartphone users and mobile application offerings are growing rapidly. A smartphone is often expected to offer PC-like functionality. In this paper, we present Virtual Smartphone over IP system that allows users to create virtual smartphone images in the mobile cloud and to customize each image to meet different needs. Users can easily and freely tap into the power of the data center...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.