Workshop MOBS 2013 – Author Index |
Contents -
Abstracts -
Authors
|
Alhamed, Mohammed |
MOBS '13: "Comparing Privacy Control ..."
Comparing Privacy Control Methods for Smartphone Platforms
Mohammed Alhamed, Khalid Amiri, Mansoor Omari, and Wei Le (Rochester Institute of Technology, USA) Nowadays, many important applications are performed through mobile phones. It is essential to ensure that users private information is not leaked through those applications. In this paper, we perform a comparison on privacy control methods implemented on the Android and iOS platforms based on the Bellotti and Sellens framework. The comparison helps understand the discrepancies existent between the users expectations for privacy and the privacy control methods currently implemented in Android and iOS. To better address users privacy concerns, we propose a programming model for platform designers to improve privacy. Our initial study on 60 privacy bugs show that using the proposed programming models, 14 Android and 5 iOS privacy bugs can be eliminated. @InProceedings{MOBS13p36, author = {Mohammed Alhamed and Khalid Amiri and Mansoor Omari and Wei Le}, title = {Comparing Privacy Control Methods for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {36--41}, doi = {}, year = {2013}, } |
|
Amiri, Khalid |
MOBS '13: "Comparing Privacy Control ..."
Comparing Privacy Control Methods for Smartphone Platforms
Mohammed Alhamed, Khalid Amiri, Mansoor Omari, and Wei Le (Rochester Institute of Technology, USA) Nowadays, many important applications are performed through mobile phones. It is essential to ensure that users private information is not leaked through those applications. In this paper, we perform a comparison on privacy control methods implemented on the Android and iOS platforms based on the Bellotti and Sellens framework. The comparison helps understand the discrepancies existent between the users expectations for privacy and the privacy control methods currently implemented in Android and iOS. To better address users privacy concerns, we propose a programming model for platform designers to improve privacy. Our initial study on 60 privacy bugs show that using the proposed programming models, 14 Android and 5 iOS privacy bugs can be eliminated. @InProceedings{MOBS13p36, author = {Mohammed Alhamed and Khalid Amiri and Mansoor Omari and Wei Le}, title = {Comparing Privacy Control Methods for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {36--41}, doi = {}, year = {2013}, } |
|
Cahill, Gene |
MOBS '13: "eMontage: An Architecture ..."
eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
Soumya Simanta, Gene Cahill, and Ed Morris (SEI, USA) This paper presents an architecture for rapid integration of situational awareness data on mobile handheld devices in resource-constrained, hostile environments. This capability will give users in crisis environments access to relevant data presented on a single screen with a consistent user interface. The framework and architecture discussed here enable the rapid addition of both publicly available and domain-specific data sources. This solution enables users to construct geospatial data mashups. Our architecture for accessing and filtering data from multiple sources provides benefits such as combining data from real-time and historical sources, operating in connected or disconnected modes, supporting individual selection and filtering of data, and integrating data from multiple sources. @InProceedings{MOBS13p7, author = {Soumya Simanta and Gene Cahill and Ed Morris}, title = {eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {7--12}, doi = {}, year = {2013}, } |
|
Corral, Luis |
MOBS '13: "Software Development Processes ..."
Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?
Luis Corral, Alberto Sillitti, and Giancarlo Succi (Free University of Bolzano, Italy) Mobile applications differ from desktop software due to their particular execution environment, limited resources, high autonomy requirement, market competition, etc. This situation brings the need of having customized development processes that respond efficiently to these challenges, to facilitate the development of high quality products that are able to excel and remain competitive in this domain. While a number of research papers have consistently proposed the adoption of Agile practices, it is not clear how a software development process would help to solve the issues present in the mobile domain. Moreover, there is a lack of evidence that shows a clear link between the proposed methodologies and their utilization in a real-world setting. Finally, the rapid evolution of the mobile environment challenges several of the premises upon which the proposed methodologies were created. In this paper, we present a review on Agile software development processes for mobile applications and their implementations, with the objective of knowing the contribution of Agile methods to address the needs of the mobile software in a production environment. Our goal is to introduce discussion on the need of conducting research that unveils what is the framework of choice of the mobile software industry: if the Agile paradigm was adopted, dismissed, or a new one was created. @InProceedings{MOBS13p19, author = {Luis Corral and Alberto Sillitti and Giancarlo Succi}, title = {Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {19--24}, doi = {}, year = {2013}, } |
|
Groat, Stephen |
MOBS '13: "Securing Static Nodes in Mobile-Enabled ..."
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Stephen Groat, Reese Moore, Randy Marchany, and Joseph Tront (Virginia Tech, USA) As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acquire characteristics of a moving target defense, in which nodes change addresses to avoid detection and attack. Yet, as mobile nodes change addresses, the critical points in the system that applications are set to communicate with, such as servers, cloud services, and peer registration servers, remain static and become easily identifiable. Mobile-enabled systems are beginning to model heterogeneous moving target networks, in which some nodes move while others remain static. Heterogeneous moving target networks expose relationships and dependencies between nodes, helping an attacker easily identify the static, critical nodes within a mobile-enabled system. Homogeneous moving target networks, in which all nodes change addresses, mask the critical points within the system, blending the mobile nodes with the critical, static nodes, and provide additional security for the static nodes. By applying a moving target defense to all nodes withina mobile-enabled system, the critical points can be masked andadditional security can be provided @InProceedings{MOBS13p42, author = {Stephen Groat and Reese Moore and Randy Marchany and Joseph Tront}, title = {Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {42--47}, doi = {}, year = {2013}, } |
|
Hennessy, Mark |
MOBS '13: "A Framework and Ontology for ..."
A Framework and Ontology for Mobile Sensor Platforms in Home Health Management
Mark Hennessy, Chris Oentojo, and Steve Ray (Carnegie Mellon Silicon Valley, USA) In an effort to reduce healthcare costs, home healthcare devices are seeing increased use. However, many of these devices are specialized, operate independently and use proprietary interfaces, diluting the cost savings. Smartphones offer a way to retain these cost savings by serving as a sensor hub within the home. In this paper we describe an extensible framework that combines a mobile device interfacing with health sensors in the home, a set of ontologies to map sensor data to clinical information standards such as IEEE 11073, and a cloud-based reasoning and mapping system built with OWL, SPARQL and SPIN. This approach capitalizes on the ease of use and low cost of smartphones, and the computational power and flexibility of a cloud-based semantic web reasoner. A proof of concept implementation is presented. @InProceedings{MOBS13p31, author = {Mark Hennessy and Chris Oentojo and Steve Ray}, title = {A Framework and Ontology for Mobile Sensor Platforms in Home Health Management}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {31--35}, doi = {}, year = {2013}, } |
|
Kim, Soo Dong |
MOBS '13: "A Model of Quality-in-Use ..."
A Model of Quality-in-Use for Service-Based Mobile Ecosystem
Hyun Jung La and Soo Dong Kim (Soongsil University, South Korea) Mobile devices have a drawback of limited computing power and resources. As an effective way to remedy the limitation, service-based mobile computing is emerged. However, there exists a challenge in managing quality of mobile applications at runtime, i.e. quality-in-use quality, due to the dynamic natures of services and limited controllability of services by consumer applications. An autonomous service management, such as service-based mobile ecosystem (SME) introduced in our previous work, is one of the promising solutions to tackle this challenge, which inevitably requires continuously monitoring quality-in-use of services at runtime. Hence, it is required to define quality-in-use qualities which play a role of figuring out problematic situations. Hence, this paper presents a quality model for measuring the quality-in-use of services in SME. The quality model is used as the basis for diagnosing various elements and further performing self-stabilizing activities in SME. @InProceedings{MOBS13p13, author = {Hyun Jung La and Soo Dong Kim}, title = {A Model of Quality-in-Use for Service-Based Mobile Ecosystem}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {13--18}, doi = {}, year = {2013}, } |
|
La, Hyun Jung |
MOBS '13: "A Model of Quality-in-Use ..."
A Model of Quality-in-Use for Service-Based Mobile Ecosystem
Hyun Jung La and Soo Dong Kim (Soongsil University, South Korea) Mobile devices have a drawback of limited computing power and resources. As an effective way to remedy the limitation, service-based mobile computing is emerged. However, there exists a challenge in managing quality of mobile applications at runtime, i.e. quality-in-use quality, due to the dynamic natures of services and limited controllability of services by consumer applications. An autonomous service management, such as service-based mobile ecosystem (SME) introduced in our previous work, is one of the promising solutions to tackle this challenge, which inevitably requires continuously monitoring quality-in-use of services at runtime. Hence, it is required to define quality-in-use qualities which play a role of figuring out problematic situations. Hence, this paper presents a quality model for measuring the quality-in-use of services in SME. The quality model is used as the basis for diagnosing various elements and further performing self-stabilizing activities in SME. @InProceedings{MOBS13p13, author = {Hyun Jung La and Soo Dong Kim}, title = {A Model of Quality-in-Use for Service-Based Mobile Ecosystem}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {13--18}, doi = {}, year = {2013}, } |
|
Le, Wei |
MOBS '13: "A Comparison of Energy Bugs ..."
A Comparison of Energy Bugs for Smartphone Platforms
Jack Zhang, Ayemi Musa, and Wei Le (Rochester Institute of Technology, USA) Bugs that cause reduced battery life in smartphones have been classified as energy bugs. The majority of previous research on energy bugs focused on the Android platform. The goal of this work is to identify the similarities and differences of energy bugs for the Android, iOS and Windows platforms, based on which, we can then determine whether the techniques of managing energy bugs developed for one platform can be potentially applicable in other platforms. Our results show that applications in Android and Windows share similar root causes for leading to battery drain, but energy bugs in iOS applications are produced differently. Our conclusions are drawn based on a comparison of power models for the three platforms and an analysis of the bugs from 6 applications common to Android, iOS and Windows. @InProceedings{MOBS13p25, author = {Jack Zhang and Ayemi Musa and Wei Le}, title = {A Comparison of Energy Bugs for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {25--30}, doi = {}, year = {2013}, } MOBS '13: "Comparing Privacy Control ..." Comparing Privacy Control Methods for Smartphone Platforms Mohammed Alhamed, Khalid Amiri, Mansoor Omari, and Wei Le (Rochester Institute of Technology, USA) Nowadays, many important applications are performed through mobile phones. It is essential to ensure that users private information is not leaked through those applications. In this paper, we perform a comparison on privacy control methods implemented on the Android and iOS platforms based on the Bellotti and Sellens framework. The comparison helps understand the discrepancies existent between the users expectations for privacy and the privacy control methods currently implemented in Android and iOS. To better address users privacy concerns, we propose a programming model for platform designers to improve privacy. Our initial study on 60 privacy bugs show that using the proposed programming models, 14 Android and 5 iOS privacy bugs can be eliminated. @InProceedings{MOBS13p36, author = {Mohammed Alhamed and Khalid Amiri and Mansoor Omari and Wei Le}, title = {Comparing Privacy Control Methods for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {36--41}, doi = {}, year = {2013}, } |
|
Marchany, Randy |
MOBS '13: "Securing Static Nodes in Mobile-Enabled ..."
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Stephen Groat, Reese Moore, Randy Marchany, and Joseph Tront (Virginia Tech, USA) As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acquire characteristics of a moving target defense, in which nodes change addresses to avoid detection and attack. Yet, as mobile nodes change addresses, the critical points in the system that applications are set to communicate with, such as servers, cloud services, and peer registration servers, remain static and become easily identifiable. Mobile-enabled systems are beginning to model heterogeneous moving target networks, in which some nodes move while others remain static. Heterogeneous moving target networks expose relationships and dependencies between nodes, helping an attacker easily identify the static, critical nodes within a mobile-enabled system. Homogeneous moving target networks, in which all nodes change addresses, mask the critical points within the system, blending the mobile nodes with the critical, static nodes, and provide additional security for the static nodes. By applying a moving target defense to all nodes withina mobile-enabled system, the critical points can be masked andadditional security can be provided @InProceedings{MOBS13p42, author = {Stephen Groat and Reese Moore and Randy Marchany and Joseph Tront}, title = {Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {42--47}, doi = {}, year = {2013}, } |
|
Moore, Reese |
MOBS '13: "Securing Static Nodes in Mobile-Enabled ..."
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Stephen Groat, Reese Moore, Randy Marchany, and Joseph Tront (Virginia Tech, USA) As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acquire characteristics of a moving target defense, in which nodes change addresses to avoid detection and attack. Yet, as mobile nodes change addresses, the critical points in the system that applications are set to communicate with, such as servers, cloud services, and peer registration servers, remain static and become easily identifiable. Mobile-enabled systems are beginning to model heterogeneous moving target networks, in which some nodes move while others remain static. Heterogeneous moving target networks expose relationships and dependencies between nodes, helping an attacker easily identify the static, critical nodes within a mobile-enabled system. Homogeneous moving target networks, in which all nodes change addresses, mask the critical points within the system, blending the mobile nodes with the critical, static nodes, and provide additional security for the static nodes. By applying a moving target defense to all nodes withina mobile-enabled system, the critical points can be masked andadditional security can be provided @InProceedings{MOBS13p42, author = {Stephen Groat and Reese Moore and Randy Marchany and Joseph Tront}, title = {Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {42--47}, doi = {}, year = {2013}, } |
|
Morris, Ed |
MOBS '13: "eMontage: An Architecture ..."
eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
Soumya Simanta, Gene Cahill, and Ed Morris (SEI, USA) This paper presents an architecture for rapid integration of situational awareness data on mobile handheld devices in resource-constrained, hostile environments. This capability will give users in crisis environments access to relevant data presented on a single screen with a consistent user interface. The framework and architecture discussed here enable the rapid addition of both publicly available and domain-specific data sources. This solution enables users to construct geospatial data mashups. Our architecture for accessing and filtering data from multiple sources provides benefits such as combining data from real-time and historical sources, operating in connected or disconnected modes, supporting individual selection and filtering of data, and integrating data from multiple sources. @InProceedings{MOBS13p7, author = {Soumya Simanta and Gene Cahill and Ed Morris}, title = {eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {7--12}, doi = {}, year = {2013}, } |
|
Musa, Ayemi |
MOBS '13: "A Comparison of Energy Bugs ..."
A Comparison of Energy Bugs for Smartphone Platforms
Jack Zhang, Ayemi Musa, and Wei Le (Rochester Institute of Technology, USA) Bugs that cause reduced battery life in smartphones have been classified as energy bugs. The majority of previous research on energy bugs focused on the Android platform. The goal of this work is to identify the similarities and differences of energy bugs for the Android, iOS and Windows platforms, based on which, we can then determine whether the techniques of managing energy bugs developed for one platform can be potentially applicable in other platforms. Our results show that applications in Android and Windows share similar root causes for leading to battery drain, but energy bugs in iOS applications are produced differently. Our conclusions are drawn based on a comparison of power models for the three platforms and an analysis of the bugs from 6 applications common to Android, iOS and Windows. @InProceedings{MOBS13p25, author = {Jack Zhang and Ayemi Musa and Wei Le}, title = {A Comparison of Energy Bugs for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {25--30}, doi = {}, year = {2013}, } |
|
Oentojo, Chris |
MOBS '13: "A Framework and Ontology for ..."
A Framework and Ontology for Mobile Sensor Platforms in Home Health Management
Mark Hennessy, Chris Oentojo, and Steve Ray (Carnegie Mellon Silicon Valley, USA) In an effort to reduce healthcare costs, home healthcare devices are seeing increased use. However, many of these devices are specialized, operate independently and use proprietary interfaces, diluting the cost savings. Smartphones offer a way to retain these cost savings by serving as a sensor hub within the home. In this paper we describe an extensible framework that combines a mobile device interfacing with health sensors in the home, a set of ontologies to map sensor data to clinical information standards such as IEEE 11073, and a cloud-based reasoning and mapping system built with OWL, SPARQL and SPIN. This approach capitalizes on the ease of use and low cost of smartphones, and the computational power and flexibility of a cloud-based semantic web reasoner. A proof of concept implementation is presented. @InProceedings{MOBS13p31, author = {Mark Hennessy and Chris Oentojo and Steve Ray}, title = {A Framework and Ontology for Mobile Sensor Platforms in Home Health Management}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {31--35}, doi = {}, year = {2013}, } |
|
Omari, Mansoor |
MOBS '13: "Comparing Privacy Control ..."
Comparing Privacy Control Methods for Smartphone Platforms
Mohammed Alhamed, Khalid Amiri, Mansoor Omari, and Wei Le (Rochester Institute of Technology, USA) Nowadays, many important applications are performed through mobile phones. It is essential to ensure that users private information is not leaked through those applications. In this paper, we perform a comparison on privacy control methods implemented on the Android and iOS platforms based on the Bellotti and Sellens framework. The comparison helps understand the discrepancies existent between the users expectations for privacy and the privacy control methods currently implemented in Android and iOS. To better address users privacy concerns, we propose a programming model for platform designers to improve privacy. Our initial study on 60 privacy bugs show that using the proposed programming models, 14 Android and 5 iOS privacy bugs can be eliminated. @InProceedings{MOBS13p36, author = {Mohammed Alhamed and Khalid Amiri and Mansoor Omari and Wei Le}, title = {Comparing Privacy Control Methods for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {36--41}, doi = {}, year = {2013}, } |
|
Ray, Steve |
MOBS '13: "A Framework and Ontology for ..."
A Framework and Ontology for Mobile Sensor Platforms in Home Health Management
Mark Hennessy, Chris Oentojo, and Steve Ray (Carnegie Mellon Silicon Valley, USA) In an effort to reduce healthcare costs, home healthcare devices are seeing increased use. However, many of these devices are specialized, operate independently and use proprietary interfaces, diluting the cost savings. Smartphones offer a way to retain these cost savings by serving as a sensor hub within the home. In this paper we describe an extensible framework that combines a mobile device interfacing with health sensors in the home, a set of ontologies to map sensor data to clinical information standards such as IEEE 11073, and a cloud-based reasoning and mapping system built with OWL, SPARQL and SPIN. This approach capitalizes on the ease of use and low cost of smartphones, and the computational power and flexibility of a cloud-based semantic web reasoner. A proof of concept implementation is presented. @InProceedings{MOBS13p31, author = {Mark Hennessy and Chris Oentojo and Steve Ray}, title = {A Framework and Ontology for Mobile Sensor Platforms in Home Health Management}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {31--35}, doi = {}, year = {2013}, } |
|
Rountev, Atanas |
MOBS '13: "Testing for Poor Responsiveness ..."
Testing for Poor Responsiveness in Android Applications
Shengqian Yang, Dacong Yan, and Atanas Rountev (Ohio State University, USA) An important category of defects in Android applications are related to poor responsiveness. When the user interface thread performs expensive operations, the application is sluggish and may fail with an "Application Not Responding" error. Poor responsiveness has serious negative consequences for user perception and marketplace success. We propose a systematic technique to uncover and quantify common causes of poor responsiveness in Android software. When test cases are executed against the application GUI, artificial long delays are inserted at typical problematic operations (e.g., at calls that access the network). This test amplification approach may exhibit increased response times for GUI events, which demonstrates the effects of expensive operations on poor responsiveness observed by the user. The proposed approach successfully uncovered 61 responsiveness problems in eight open-source Android applications, due to inappropriate usage of resources such as network, flash storage, on-device database, and bitmaps. @InProceedings{MOBS13p1, author = {Shengqian Yang and Dacong Yan and Atanas Rountev}, title = {Testing for Poor Responsiveness in Android Applications}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {1--6}, doi = {}, year = {2013}, } |
|
Sillitti, Alberto |
MOBS '13: "Software Development Processes ..."
Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?
Luis Corral, Alberto Sillitti, and Giancarlo Succi (Free University of Bolzano, Italy) Mobile applications differ from desktop software due to their particular execution environment, limited resources, high autonomy requirement, market competition, etc. This situation brings the need of having customized development processes that respond efficiently to these challenges, to facilitate the development of high quality products that are able to excel and remain competitive in this domain. While a number of research papers have consistently proposed the adoption of Agile practices, it is not clear how a software development process would help to solve the issues present in the mobile domain. Moreover, there is a lack of evidence that shows a clear link between the proposed methodologies and their utilization in a real-world setting. Finally, the rapid evolution of the mobile environment challenges several of the premises upon which the proposed methodologies were created. In this paper, we present a review on Agile software development processes for mobile applications and their implementations, with the objective of knowing the contribution of Agile methods to address the needs of the mobile software in a production environment. Our goal is to introduce discussion on the need of conducting research that unveils what is the framework of choice of the mobile software industry: if the Agile paradigm was adopted, dismissed, or a new one was created. @InProceedings{MOBS13p19, author = {Luis Corral and Alberto Sillitti and Giancarlo Succi}, title = {Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {19--24}, doi = {}, year = {2013}, } |
|
Simanta, Soumya |
MOBS '13: "eMontage: An Architecture ..."
eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
Soumya Simanta, Gene Cahill, and Ed Morris (SEI, USA) This paper presents an architecture for rapid integration of situational awareness data on mobile handheld devices in resource-constrained, hostile environments. This capability will give users in crisis environments access to relevant data presented on a single screen with a consistent user interface. The framework and architecture discussed here enable the rapid addition of both publicly available and domain-specific data sources. This solution enables users to construct geospatial data mashups. Our architecture for accessing and filtering data from multiple sources provides benefits such as combining data from real-time and historical sources, operating in connected or disconnected modes, supporting individual selection and filtering of data, and integrating data from multiple sources. @InProceedings{MOBS13p7, author = {Soumya Simanta and Gene Cahill and Ed Morris}, title = {eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {7--12}, doi = {}, year = {2013}, } |
|
Succi, Giancarlo |
MOBS '13: "Software Development Processes ..."
Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?
Luis Corral, Alberto Sillitti, and Giancarlo Succi (Free University of Bolzano, Italy) Mobile applications differ from desktop software due to their particular execution environment, limited resources, high autonomy requirement, market competition, etc. This situation brings the need of having customized development processes that respond efficiently to these challenges, to facilitate the development of high quality products that are able to excel and remain competitive in this domain. While a number of research papers have consistently proposed the adoption of Agile practices, it is not clear how a software development process would help to solve the issues present in the mobile domain. Moreover, there is a lack of evidence that shows a clear link between the proposed methodologies and their utilization in a real-world setting. Finally, the rapid evolution of the mobile environment challenges several of the premises upon which the proposed methodologies were created. In this paper, we present a review on Agile software development processes for mobile applications and their implementations, with the objective of knowing the contribution of Agile methods to address the needs of the mobile software in a production environment. Our goal is to introduce discussion on the need of conducting research that unveils what is the framework of choice of the mobile software industry: if the Agile paradigm was adopted, dismissed, or a new one was created. @InProceedings{MOBS13p19, author = {Luis Corral and Alberto Sillitti and Giancarlo Succi}, title = {Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {19--24}, doi = {}, year = {2013}, } |
|
Tront, Joseph |
MOBS '13: "Securing Static Nodes in Mobile-Enabled ..."
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Stephen Groat, Reese Moore, Randy Marchany, and Joseph Tront (Virginia Tech, USA) As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acquire characteristics of a moving target defense, in which nodes change addresses to avoid detection and attack. Yet, as mobile nodes change addresses, the critical points in the system that applications are set to communicate with, such as servers, cloud services, and peer registration servers, remain static and become easily identifiable. Mobile-enabled systems are beginning to model heterogeneous moving target networks, in which some nodes move while others remain static. Heterogeneous moving target networks expose relationships and dependencies between nodes, helping an attacker easily identify the static, critical nodes within a mobile-enabled system. Homogeneous moving target networks, in which all nodes change addresses, mask the critical points within the system, blending the mobile nodes with the critical, static nodes, and provide additional security for the static nodes. By applying a moving target defense to all nodes withina mobile-enabled system, the critical points can be masked andadditional security can be provided @InProceedings{MOBS13p42, author = {Stephen Groat and Reese Moore and Randy Marchany and Joseph Tront}, title = {Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {42--47}, doi = {}, year = {2013}, } |
|
Yan, Dacong |
MOBS '13: "Testing for Poor Responsiveness ..."
Testing for Poor Responsiveness in Android Applications
Shengqian Yang, Dacong Yan, and Atanas Rountev (Ohio State University, USA) An important category of defects in Android applications are related to poor responsiveness. When the user interface thread performs expensive operations, the application is sluggish and may fail with an "Application Not Responding" error. Poor responsiveness has serious negative consequences for user perception and marketplace success. We propose a systematic technique to uncover and quantify common causes of poor responsiveness in Android software. When test cases are executed against the application GUI, artificial long delays are inserted at typical problematic operations (e.g., at calls that access the network). This test amplification approach may exhibit increased response times for GUI events, which demonstrates the effects of expensive operations on poor responsiveness observed by the user. The proposed approach successfully uncovered 61 responsiveness problems in eight open-source Android applications, due to inappropriate usage of resources such as network, flash storage, on-device database, and bitmaps. @InProceedings{MOBS13p1, author = {Shengqian Yang and Dacong Yan and Atanas Rountev}, title = {Testing for Poor Responsiveness in Android Applications}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {1--6}, doi = {}, year = {2013}, } |
|
Yang, Shengqian |
MOBS '13: "Testing for Poor Responsiveness ..."
Testing for Poor Responsiveness in Android Applications
Shengqian Yang, Dacong Yan, and Atanas Rountev (Ohio State University, USA) An important category of defects in Android applications are related to poor responsiveness. When the user interface thread performs expensive operations, the application is sluggish and may fail with an "Application Not Responding" error. Poor responsiveness has serious negative consequences for user perception and marketplace success. We propose a systematic technique to uncover and quantify common causes of poor responsiveness in Android software. When test cases are executed against the application GUI, artificial long delays are inserted at typical problematic operations (e.g., at calls that access the network). This test amplification approach may exhibit increased response times for GUI events, which demonstrates the effects of expensive operations on poor responsiveness observed by the user. The proposed approach successfully uncovered 61 responsiveness problems in eight open-source Android applications, due to inappropriate usage of resources such as network, flash storage, on-device database, and bitmaps. @InProceedings{MOBS13p1, author = {Shengqian Yang and Dacong Yan and Atanas Rountev}, title = {Testing for Poor Responsiveness in Android Applications}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {1--6}, doi = {}, year = {2013}, } |
|
Zhang, Jack |
MOBS '13: "A Comparison of Energy Bugs ..."
A Comparison of Energy Bugs for Smartphone Platforms
Jack Zhang, Ayemi Musa, and Wei Le (Rochester Institute of Technology, USA) Bugs that cause reduced battery life in smartphones have been classified as energy bugs. The majority of previous research on energy bugs focused on the Android platform. The goal of this work is to identify the similarities and differences of energy bugs for the Android, iOS and Windows platforms, based on which, we can then determine whether the techniques of managing energy bugs developed for one platform can be potentially applicable in other platforms. Our results show that applications in Android and Windows share similar root causes for leading to battery drain, but energy bugs in iOS applications are produced differently. Our conclusions are drawn based on a comparison of power models for the three platforms and an analysis of the bugs from 6 applications common to Android, iOS and Windows. @InProceedings{MOBS13p25, author = {Jack Zhang and Ayemi Musa and Wei Le}, title = {A Comparison of Energy Bugs for Smartphone Platforms}, booktitle = {Proc.\ MOBS}, publisher = {IEEE}, pages = {25--30}, doi = {}, year = {2013}, } |
24 authors
proc time: 0.06