Early analysis of resource consumption patterns in mobile applications

被引:26
作者
Berrocal, Javier [1 ]
Garcia-Alonso, Jose [1 ]
Vicente-Chicote, Cristina [1 ]
Hernandez, Juan [1 ]
Mikkonen, Tommi [2 ]
Canal, Carlos [3 ]
Murillo, Juan M. [1 ]
机构
[1] Univ Extremadura, Escuela Politecn, Avda Univ S-N, Caceres 10003, Spain
[2] Tampere Univ Technol, Inst Pervas Comp, Tampere 33720, Finland
[3] Univ Malaga, ETSI Informat, Campus Teatinos, Malaga 29071, Spain
基金
芬兰科学院;
关键词
Mobile software architecture; Resource consumption; Resource estimation; Mobile-centric; SECURITY; MODEL;
D O I
10.1016/j.pmcj.2016.06.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device capabilities have increased tremendously in recent years, and the complexity of the applications executed in these devices has evolved accordingly. However, despite the efforts made by mobile manufactures, resource consumption, particularly battery and data traffic, are still limiting factors for mobile applications. The most important aspects determining the consumption of a mobile application is its software architecture and its behaviour. Hence, by comparing the resource consumption of different software architectures before an application is built, mobile developers can make decisions that are better informed. This work presents the consumption analysis of two applications, each of them built with two different architectures in order to identify under which situation each architecture is more efficient. In addition, by generalizing the analysis of the two applications, a conceptual framework is created with which to analyse the consumption pattern of applications in their early development phases. This conceptual framework will allow mobile developers to estimate the resource consumption of their applications under different conditions of software architecture and usage scenarios, providing them with information relevant for decision making. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:32 / 50
页数:19
相关论文
共 45 条
  • [1] A. Technologies, 2014, Q4 A TECHN
  • [2] [Anonymous], TRAFF SAF FACTS 2013
  • [3] [Anonymous], 2012, P USENIX ANN TECH C
  • [4] Balasubramanian N, 2009, IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P280
  • [5] Smartphones as Personal Profile Providers: Enhancing Mobile App Architectures
    Berrocal, Javier
    Canal, Carlos
    Garcia-Alonso, Jose
    Makitalo, Niko
    Mikkonen, Tommi
    Miranda, Javier
    Murillo, Juan M.
    [J]. 2ND ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS MOBILESOFT 2015, 2015, : 134 - 135
  • [6] A taxonomy-based model of security and privacy in online social networks
    Caviglione, L.
    Coccoli, M.
    Merlo, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 325 - 338
  • [7] Cisco, 2015, Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
  • [8] Curti Monica, 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS), P289, DOI 10.1109/HPCSim.2013.6641428
  • [9] Peer-to-peer file-sharing over mobile ad hoc networks
    Ding, G
    Bhargava, B
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 104 - 108
  • [10] Dinh H.T., 2013, IWIREL COMMUN MOB CO, V13, P536