ICSE 2013 - May 18-26, 2013, San Francisco, CA, USA
Powered by
Conference Publishing Consulting

2013 1st International Workshop on the Engineering of Mobile-Enabled Systems (MOBS), May 25, 2013, San Francisco, CA, USA

MOBS 2013 – Proceedings

Contents - Abstracts - Authors

1st International Workshop on the Engineering of Mobile-Enabled Systems (MOBS)

Title Page

Mobile-enabled systems make use of mobile devices, RFID tags, sensor nodes, and other computing-enabled mobile devices to gather contextual data from users and the surrounding changing environment. Such systems produce computational data that can be stored and used in the field, shared between mobile and resident devices, and potentially uploaded to local servers or the cloud — a distributed, heterogeneous, context-aware, data production and consumption paradigm. Mobile-enabled systems have characteristics that make them different from traditional systems, such as limited resources, increased vulnerability, performance and reliability variability, and a finite energy source. There is significantly higher unpredictability in the execution environment of mobile apps. MOBS 2013 wants to bring together experts from the software engineering and mobile computing communities — with notable participation from researchers and practitioners in the field of distributed systems, enterprise systems, cloud systems, ubiquitous computing, wireless sensor networks, and pervasive computing — to share results and open issues in the area of software engineering of mobile-enabled systems.
Testing for Poor Responsiveness in Android Applications
Shengqian Yang, Dacong Yan, and Atanas Rountev
(Ohio State University, USA)
An important category of defects in Android applications are related to poor responsiveness. When the user interface thread performs expensive operations, the application is sluggish and may fail with an "Application Not Responding" error. Poor responsiveness has serious negative consequences for user perception and marketplace success. We propose a systematic technique to uncover and quantify common causes of poor responsiveness in Android software. When test cases are executed against the application GUI, artificial long delays are inserted at typical problematic operations (e.g., at calls that access the network). This test amplification approach may exhibit increased response times for GUI events, which demonstrates the effects of expensive operations on poor responsiveness observed by the user. The proposed approach successfully uncovered 61 responsiveness problems in eight open-source Android applications, due to inappropriate usage of resources such as network, flash storage, on-device database, and bitmaps.
Article Search
eMontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
Soumya Simanta, Gene Cahill, and Ed Morris
This paper presents an architecture for rapid integration of situational awareness data on mobile handheld devices in resource-constrained, hostile environments. This capability will give users in crisis environments access to relevant data presented on a single screen with a consistent user interface. The framework and architecture discussed here enable the rapid addition of both publicly available and domain-specific data sources. This solution enables users to construct geospatial data mashups. Our architecture for accessing and filtering data from multiple sources provides benefits such as combining data from real-time and historical sources, operating in connected or disconnected modes, supporting individual selection and filtering of data, and integrating data from multiple sources.
Article Search
A Model of Quality-in-Use for Service-Based Mobile Ecosystem
Hyun Jung La and Soo Dong Kim
(Soongsil University, South Korea)
Mobile devices have a drawback of limited computing power and resources. As an effective way to remedy the limitation, service-based mobile computing is emerged. However, there exists a challenge in managing quality of mobile applications at runtime, i.e. quality-in-use quality, due to the dynamic natures of services and limited controllability of services by consumer applications. An autonomous service management, such as service-based mobile ecosystem (SME) introduced in our previous work, is one of the promising solutions to tackle this challenge, which inevitably requires continuously monitoring quality-in-use of services at runtime. Hence, it is required to define quality-in-use qualities which play a role of figuring out problematic situations. Hence, this paper presents a quality model for measuring the quality-in-use of services in SME. The quality model is used as the basis for diagnosing various elements and further performing self-stabilizing activities in SME.
Article Search
Software Development Processes for Mobile Systems: Is Agile Really Taking Over the Business?
Luis Corral, Alberto Sillitti, and Giancarlo Succi
(Free University of Bolzano, Italy)
Mobile applications differ from desktop software due to their particular execution environment, limited resources, high autonomy requirement, market competition, etc. This situation brings the need of having customized development processes that respond efficiently to these challenges, to facilitate the development of high quality products that are able to excel and remain competitive in this domain. While a number of research papers have consistently proposed the adoption of Agile practices, it is not clear how a software development process would help to solve the issues present in the mobile domain. Moreover, there is a lack of evidence that shows a clear link between the proposed methodologies and their utilization in a real-world setting. Finally, the rapid evolution of the mobile environment challenges several of the premises upon which the proposed methodologies were created. In this paper, we present a review on Agile software development processes for mobile applications and their implementations, with the objective of knowing the contribution of Agile methods to address the needs of the mobile software in a production environment. Our goal is to introduce discussion on the need of conducting research that unveils what is the framework of choice of the mobile software industry: if the Agile paradigm was adopted, dismissed, or a new one was created.
Article Search
A Comparison of Energy Bugs for Smartphone Platforms
Jack Zhang, Ayemi Musa, and Wei Le
(Rochester Institute of Technology, USA)
Bugs that cause reduced battery life in smartphones have been classified as energy bugs. The majority of previous research on energy bugs focused on the Android platform. The goal of this work is to identify the similarities and differences of energy bugs for the Android, iOS and Windows platforms, based on which, we can then determine whether the techniques of managing energy bugs developed for one platform can be potentially applicable in other platforms. Our results show that applications in Android and Windows share similar root causes for leading to battery drain, but energy bugs in iOS applications are produced differently. Our conclusions are drawn based on a comparison of power models for the three platforms and an analysis of the bugs from 6 applications common to Android, iOS and Windows.
Article Search
A Framework and Ontology for Mobile Sensor Platforms in Home Health Management
Mark Hennessy, Chris Oentojo, and Steve Ray
(Carnegie Mellon Silicon Valley, USA)
In an effort to reduce healthcare costs, home healthcare devices are seeing increased use. However, many of these devices are specialized, operate independently and use proprietary interfaces, diluting the cost savings. Smartphones offer a way to retain these cost savings by serving as a sensor hub within the home. In this paper we describe an extensible framework that combines a mobile device interfacing with health sensors in the home, a set of ontologies to map sensor data to clinical information standards such as IEEE 11073, and a cloud-based reasoning and mapping system built with OWL, SPARQL and SPIN. This approach capitalizes on the ease of use and low cost of smartphones, and the computational power and flexibility of a cloud-based semantic web reasoner. A proof of concept implementation is presented.
Article Search
Comparing Privacy Control Methods for Smartphone Platforms
Mohammed Alhamed, Khalid Amiri, Mansoor Omari, and Wei Le
(Rochester Institute of Technology, USA)
Nowadays, many important applications are performed through mobile phones. It is essential to ensure that users private information is not leaked through those applications. In this paper, we perform a comparison on privacy control methods implemented on the Android and iOS platforms based on the Bellotti and Sellens framework. The comparison helps understand the discrepancies existent between the users expectations for privacy and the privacy control methods currently implemented in Android and iOS. To better address users privacy concerns, we propose a programming model for platform designers to improve privacy. Our initial study on 60 privacy bugs show that using the proposed programming models, 14 Android and 5 iOS privacy bugs can be eliminated.
Article Search
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Stephen Groat, Reese Moore, Randy Marchany, and Joseph Tront
(Virginia Tech, USA)
As computing becomes mobile and systems enable connectivity through mobile applications, the characteristics of the network communication of these systems change due to the instability of mobile nodes on networks. Mobile devices logically move by changing addresses throughout the course of their communication in the system. These mobiles nodes acquire characteristics of a moving target defense, in which nodes change addresses to avoid detection and attack. Yet, as mobile nodes change addresses, the critical points in the system that applications are set to communicate with, such as servers, cloud services, and peer registration servers, remain static and become easily identifiable. Mobile-enabled systems are beginning to model heterogeneous moving target networks, in which some nodes move while others remain static. Heterogeneous moving target networks expose relationships and dependencies between nodes, helping an attacker easily identify the static, critical nodes within a mobile-enabled system. Homogeneous moving target networks, in which all nodes change addresses, mask the critical points within the system, blending the mobile nodes with the critical, static nodes, and provide additional security for the static nodes. By applying a moving target defense to all nodes withina mobile-enabled system, the critical points can be masked andadditional security can be provided
Article Search

proc time: 0.07