2013 Proceedings of the International Conference on Embedded Software (EMSOFT) 2013
DOI: 10.1109/emsoft.2013.6658605
|View full text |Cite
|
Sign up to set email alerts
|

WakeScope: Runtime WakeLock anomaly management scheme for Android platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Pathak presents a dataflow analysis algorithm to detect software bugs but this is not runtime solution and [11] [17]. Author of [4] proposed an application which just detects wakelock bugs and notify to the user also kernel recompilation is required which may cause performance penalty. The same concept is followed by one more researcher [3].…”
Section: Related Workmentioning
confidence: 99%
“…Pathak presents a dataflow analysis algorithm to detect software bugs but this is not runtime solution and [11] [17]. Author of [4] proposed an application which just detects wakelock bugs and notify to the user also kernel recompilation is required which may cause performance penalty. The same concept is followed by one more researcher [3].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed system traces interactions, including keyboard activity, touch, scroll, click/long click, as well as Activity transition. Meanwhile, a common Android system behavior that influences resource efficiency is wakelock [6][7][8]. Our system traces the wakelock operation to analyze and improve its usage.…”
Section: Framework Levelmentioning
confidence: 99%
“…Recently, several profiling tools [6][7][8][9][10][11][23][24][25][26][27][28][29] for monitoring device behavior or application behavior have been proposed. They monitor some of the intrinsic issues that are difficult to analyze for other problems than those identifiable on the source code.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, based on large packet traces collected from a commercial cellular carrier, it has been observed that periodic transfers, where a mobile device periodically exchanges some data with a remote server, account for only a small portion of the overall network traffic but contribute significantly to the total radio energy consumption [9]. While some attention has focused on finding solutions, e.g., [4,8,14], the major sources of unperceived activities remain to be identified and their individual impact on energy dissipationhasyettobestudied.…”
Section: Introductionmentioning
confidence: 99%
“…This new programming paradigm gives rise to nosleep bugs [8], which will keep smartphones awake. Motivated by the observation, diagnostic tools were developed to automatically detect no-sleep bugs in immature apps at compile time [8] and runtime [4], respectively. Apart from no-sleep bugs, email sync, which will cause normal background activities, can also shorten the standby time of a smartphone by 40% due to the long 3G tail time [14].…”
Section: Introductionmentioning
confidence: 99%