An Analysis of the Transitions between Mobile Application Usages based on Markov Chains
|
|
|
- Clara Griffin
- 10 years ago
- Views:
Transcription
1 An Analysis of the Transitions between Mobile Application Usages based on Markov Chains Charles Gouin-Vallerand LICEF Research Center, Télé- Université du Québec 5800 St-Denis Boul. Montreal, QC H2S 3L5 Canada Neila Mezghani LICEF Research Center, Télé- Université du Québec 5800 St-Denis Boul. Montreal, QC H2S 3L5 Canada Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. UbiComp '14 Adjunct, September 13-17, 2014, Seattle, WA, USA Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM /14/09 $ Abstract By knowing more the usage of mobile application on smart phone, it is possible to predict which applications will be used next. This kind of information is particularly interesting from a recommendation system point of view. In this paper, we present an analysis of the transitions between application usages on the data collected by the University of Cambridge s Device Analyzer project. Among other results, we conclude that the transition probabilities between application usages are distinct information from the probabilities of usage based on periods of time, such as application launches in a same hour and in a same day. Author Keywords Mobile applications usage; Data mining; Markov chain; Recommender system ACM Classification Keywords H.2.8 Database Applications: Data Mining; H.2.m. Information interfaces and presentation (e.g., HCI): Miscellaneous. Introduction In their activities of daily life, a large portion of humans is using intensively software application several times a day: s, games, communications, news, web browsers, etc. Mobile phones are becoming the first type of electronic devices regarding the usage. For 373
2 instance, Britons in 2013 spent more time on their mobile phone each month (an average of 41 hours, 42 minutes) than navigating on the web with PC [1]. As mobile applications are more and more intensively used, analyzing their usage became a research field, where usage models can help to improve the mobile usage experience, for instance, by classifying applications on the mobile phone [2] or recommending applications based on the user s context [3]. Recently, the Device Analyzer project [4] from the University of Cambridge proposed an Android OS application that is logging internal information about Android phones (e.g., battery level, cell tower ID, received SMS, etc.). Published on the Google Play store, more than devices, all across the globe, installed the Device Analyzer app on their smart phone. In the context of our researches, we are working toward recommendation algorithms that propose applications [5] to users based on their current context. Numerous data provided by the Device Analyzer project bring interesting information on apps usage and usage context, which can be used to recommend apps to mobile phone users. More specifically, we are interested to model the transition between application usages and use these relations to recommend apps to the users. Among other data, this modeling work can help to find causal relations between mobile application usages. Therefore, in this paper, we are presenting the results of an analysis of mobile applications usage based on sporadic usage transitions/chains provided by the Device Analyzer system. We analyzed the log of thirty devices with more than three months of data each and computed three Markovian models for each device corresponding to: (i) occurrence/probability of transition between application utilizations; (ii) occurrence/probability of application usage in a same hour; (iii) occurrence/probability of application usage in a same day. These three models are compared, using correlation methods, to verify if the first model (transition between apps) is a valid approach to predict a next application usage. In other words, we verified if the last used application information is valid to predict an application usage or if the occurrence of usage in a same period of time would provide similar information. In the next section, we present a review of the related work (Section Related Work), followed by a short description of the analyzed data from the Device Analyzer project (Section Data model). Then, we present the methodology we used to analyze these data and how we computed the Markov chains (Section Methodology) followed by a presentation of the results (Section Results). Finally, we conclude this paper by presenting our future work based on the result of this paper. Related Work A number of research projects worked on understanding the modalities of mobile application usages. For instance, Verkasalo et al. [6] concluded that there is a strong relation between locations and app usage. Shin et al. [2] propose a system that analyzes the context and history of a device for classifying the different installed apps depending on their probabilities of use. One of their conclusions is that the app transition data are one of the most important contextual information to predict which app will be used next. Similar in their approach, Ke et al. [7] propose a system that predicts app usage based 374
3 SESSION: UBICOMP PROGRAMMING COMPETITION "312";" ";"app recent 0";"uk.ac.cam.devicean alyzer/.gui.splashactivity";"1" "313";" ";"app recent 1";"com.android.vendin g/.assetbrowseractivity";"1" "314";" ";"app recent 2";"com.sec.android.app.sbrowser/.SBrowserMainActivity";"1" "315";" ";"app recent 3";"com.android. /. activity.messagelistxl";"1" "316";" ";"app recent 4";"com.sec.android.app.clockpackage/.ClockPackage";"1" "317";" ";"app recent 5";"com.android.contact s/.activities.peopleactivity";"1" "318";" ";"app recent 6";"com.android.contact s/.activities.dialtactsactivity";"1" "319";" ";"app recent 7";"com.android.mms/.u i.conversationcomposer";"1" Sample 1 Example of last started apps data from the Device Analyzer project also on the mobile phone context. In their case, they focused on five contextual information: last used app, hour of the day, day of the week, location and the user profile. The two kinds of information about the time are correlated with the location of the phone. On the other hand, about using contextual information and application usage for recommending mobile apps, the AppJoy [8] uses app usage patterns, found by data mining months of data, to recommend mobile apps. In [3], Boëhmer et al. propose a system that uses contextual information, such as the location, accelerometer data and application usage to recommend apps from a custom Android OS app store. From these related works, the last app usage or usage transition information stands out from the different contextual information available from mobile phone. However, in these previous works this type of information has not been corroborated with other usage data such as the relation between last used apps and other apps used in a same period of time. Data Model The Device Analyzer project proposes an Android application which log on the University of Cambridge s server, several types of data on smart phone usage: phone location, battery energy level, connected and visible Wifi networks, etc. In the context of our research, we especially focused on using the data on the ten last started apps on the phone, which are logged each five minutes by the Device Analyzer app. Sample 1 shows an example of data about the last 10 used apps (with non-anonymized app name). The app recent data includes: the time when the data was logged since the last bootup of the device (second column in Sample 1), the chronologically order of when the app was launches (where 0 is the most recent) and finally the application name and related Android activity. Moreover, as no application can be launched during the 5 minutes gap between two snapshots (in that case, the app recent would remain the same), we had to filter the app recent data to detect new application launches; avoiding the analysis of same data several times. In conclusion, the app recent data give us the last 10 launch applications (maximum), but it is impossible from these data to know exactly when in the last 5 minutes these applications have been launches. In addition to the app recent data, we had also access within the data to snapshots (every 5 min.) of the current applications running in the task manager. We decided to not use this information at this stage of our research, as it does not give us a proper overview of the transition between the application usages, because of the 5 minutes gap between each snapshot. Methodology To analyze the data, we developed an app usage analyzer in the Java language, which reads and parses the Device Analyzer logs. This data mining application analyzes the application usage by following the general steps of the data mining: the data preparation, the construction of models and the evaluation of the extracted model. The Figure 1 presents an overview of the data mining process behind the app recent analysis. 375
4 Figure 1 Overview of the Data mining process Thus, the developed analyzer prepare the app recent data to the data mining process by reordering the order of appearance of application from the most older to the newest for each group of app recent data logged. To do so, we simply used a stack data structure and a forward-looking algorithm to put back the app recent data in order of their launches. Following the preparation of the data, the application usage analyzer computes the occurrences of transition between the application launches on the devices. At the same time, the system computes also the occurrence of application usage in same hour and same day periods. For instance, with these two last types of information, it is possible to know if there is applications that are more probable to be launch later in a same period of time than an application currently in use. These three kinds of occurrence were represented by three matrixes, which are, de facto, Markov chains [9], i.e. a set of states with a finite set of transitions between states and where the probabilities of transition are memory less (they doesn t depend on the previous states). Besides using these three Markovian models to recommend application to user, one of our principal goals was to validate the transition probabilities between application uses as usage information that is distinct from the information of the most used application per hour and day. In other words, our goal was to validate if transition probabilities provide information that can predict future application usage, or the probabilities about which applications are most often used in a same period of time provide similar information. Thus, in the last step of our data mining process, our analyzer correlates the information between the three Markov chains using the test of Fischer (F-Test) and measures their significance using the Z-Test. The F- Test verifies if the variance between the markov chains is similar. The results of these tests are presented in the next section. Results We ran our application usage analysis system, on the server of the University of Cambridge, on thirty devices randomly choose, where each device had more than three months of overall data. For privacy purpose, our analysis returned three Markov chains per device where app names and activity names have been replaced by hash strings. However, these hash strings were the same all across the Markov chains, allowing crossmodels comparisons. For the thirty selected devices, we recorded an average of application usages per device with a standard deviation of usages. Thus, there is a pretty high variation between the applications used between the devices/users. Regarding the probability of transition between two apps, we collected the information about the highest probability of transition for each app and we compared this information with the occurrences of transition. A first conclusion coming from this analysis shows that more there is a usage occurrence for an application, more the probabilities of transition is distributed between the utilized applications. This information seems trivial, but it signifies that more an application is used; more it is difficult to predict its use. Figure 2 presents an example of application occurrences versus 376
5 SESSION: UBICOMP PROGRAMMING COMPETITION Table 1 Correlation and significance between the three markovian models App transition vs. same hour Average F-Test Average Z-Test the maximum probability for one of the thirty analyzed devices. This distribution is roughly the same for each device; the regression matching the best the results is the power regression with an average R 2 = This distribution is totally different for the probabilities of usage based on the same day/hour information (Figure 3). This information about the distribution of maximum probabilities can help to classify applications in categories where usage transition can either or not been use to predict future usage. usages is a distinct information from probabilities of usage for same periods of time. App transition vs. same day Same day vs. same hour Figure 2 Example of maximum probability of transition between apps versus number of analyzed occurrences for one of the analyzed devices Figure 3 Maximum probability of use in a same hour versus the number of analyzed occurrences for one of the analyzed device Thus, both information as its specificity and provide data than can be compared/used, for instance, to dynamically recommend apps based on the user context. Moreover, our analysis doesn t demonstrate that one of the three Markov chains provide more valuable information. Depending of the type of application, the device s context and the profile of the users, both informations can provide interesting information such as in [7]. About the comparison between the application transition versus the probability of usage per hour and day (Table 1), we found that there is a low correlation between the Markov chains representing the transition between the application and the usage per hour and day, with a high significance of this result. This low F- Test score shows that, for the 30 devices we analyzed, the probabilities of transition between application On the other hand, there is a strong correlation between the same day and same hour occurrence Markov chains, which mean that a macroscopic analysis of the usage for a periods of time lead to similar results than a microscopic analysis. However, this statement must be corroborated in future works, with other results from different period of time: days of the week, months, periods of the day, etc. 377
6 Conclusion In conclusion, through our analysis on the application usage of the Device Analyzer project s data, we demonstrate that the probabilities of transition between application usages are distinct usage information compared to the probability of use for same periods of time. Our analysis shows also that the probabilities of transition become less obvious when the number of occurrences is high. Today, recommendation systems are based mainly on social web data and user's service rating. By integrating contextual information and a more in depth description of the users, recommendation systems for mobile devices will be improved. In our next work, we are planning to utilize the presented methodology to recommend mobile apps to the users based on their interaction history. We are also planning to extend our data mining by discrediting the application usage based on location, current activities and other contextual information. Acknowledgements We want to especially thank Andrew Rice from the University of Cambridge for his help in running our analysis on the Device Analyzer project s data. [3] Böhmer M. et al. Contextualizing Mobile Applications for Context-aware Recommendation. Adjunct Proceedings of Pervasive 2010, (2012) [4] Wagner, D., Rice, A., and Beresford, A. Device Analyzer: Understanding smartphone usage, 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (2013) [5] Gouin-Vallerand, C. And Montero De la Cruz, J. A. Analysis of a context-aware recommender system model for smart urban environment, Conference on Advances in Mobile Computing and Multimedia, MoMM2013, (2013) [6] Verkasalo, H., et al.: Contextual patterns in mobile service usage, Personal and Ubiquitous Computing 13(5), (2009) [7] Ke Huang et al. Predicting mobile application usage using contextual information. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12), (2012). [8] Yan, B. and Chen, G. Appjoy: personalized mobile application discovery. In Proceedings of the 9 th international conference on Mobile systems, applications, and services, MobiSys 11, (2011). [9] Norris, J.R. Markov Chains. Cambridge Series in Statistical and Probabilistic Mathematics. Cambridge University Press, (1998). References [1] Nielsen Agency. How smartphones are changing consumers daily routines around the globe. 2 Feb. 2014, (2014). [2] Shin, C., Hong. J-H and Dey, A.K. Understanding and prediction of mobile application usage for smart phones. Proceeding of UbiComp 2012, ACM Press (2012),
STORE VIEW: Pervasive RFID & Indoor Navigation based Retail Inventory Management
STORE VIEW: Pervasive RFID & Indoor Navigation based Retail Inventory Management Anna Carreras Tànger, 122-140. [email protected] Marc Morenza-Cinos Barcelona, SPAIN [email protected] Rafael Pous
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
DETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data ([email protected]) ITS 17th Biennial Conference Montreal, Canada, June 24-27, 2008 Outline Introduction
JRefleX: Towards Supporting Small Student Software Teams
JRefleX: Towards Supporting Small Student Software Teams Kenny Wong, Warren Blanchet, Ying Liu, Curtis Schofield, Eleni Stroulia, Zhenchang Xing Department of Computing Science University of Alberta {kenw,blanchet,yingl,schofiel,stroulia,xing}@cs.ualberta.ca
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
TouchDevelop App Development on Mobile Devices
TouchDevelop App Development on Mobile Devices Nikolai Tillmann, Michal Moskal, Jonathan de Halleux, Manuel Fahndrich, Sebastian Burckhardt Microsoft Research One Microsoft Way Redmond WA, USA {nikolait,micmo,jhalleux,maf,sburckha}@microsoft.com
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security
Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze
Release Your App on Sunday Eve: Finding the Best Time to Deploy Apps
Release Your App on Sunday Eve: Finding the Best Time to Deploy Apps Niels Henze University of Oldenburg Escherweg 2 Oldenburg, Germany [email protected] Susanne Boll University of Oldenburg
Mobile Application GPS-Based
3 Mobile Application GPS-Based Berta Buttarazzi University of Tor Vergata, Rome, Italy 1. Introduction Most of navigators for mobile devices have a big failure; they do not notify the user of road condition
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
Mobile Testing That s Just a Smaller Screen, Right?
Mobile Testing That s Just a Smaller Screen, Right? Stephen Janaway Senior Software Test Manager Nokia Mobile Phones Who am I? Stephen Janaway 12 years experience in mobile software testing. Software testing
Big Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
Testing Mobile Applications
Testing Mobile Applications Published by 360logica software testing Services (www.360logica.com ) [ Testing Mobile applications ] Copyright 2011@ 360logica software testing services Testing Mobile Applications
Toward a community enhanced programming education
Toward a community enhanced programming education Ryo Suzuki University of Tokyo Tokyo, Japan [email protected] Permission to make digital or hard copies of all or part of this work for
Development of Mobile Learning Using Android Platform
Development of Mobile Learning Using Android Platform Christianne Lynnette G. Cabanban, MIT College of Computer Science Don Mariano Marcos Memorial State University-South La Union Campus Agoo, La Union,
WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat
Information Builders enables agile information solutions with business intelligence (BI) and integration technologies. WebFOCUS the most widely utilized business intelligence platform connects to any enterprise
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities The first article of this series presented the capability model for business analytics that is illustrated in Figure One.
How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning
How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement
Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement Ray Chen, Marius Lazer Abstract In this paper, we investigate the relationship between Twitter feed content and stock market
A Guide for Patients of Abington Park Surgery
A Guide for Patients of Abington Park Surgery This guide covers the following topics: About SystmOnline Logging in to SystmOnline Changing/Resetting Your Password Logging Out of SystmOnline Managing Appointments
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
Mobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
ASHVINS Group. Mobile Application Testing Summary
ASHVINS Group Mobile Application Testing Summary Mobile Application Testing Challenges Unique challenges with mobile applications; device compatibility, OS compatibility, UI compatibility, browser compatibility
2011 Cell Phone Consumer Attitudes Study
2011 Cell Phone Consumer Attitudes Study Prepared for: CWTA April 29, 2011 Copyright 2009-2012 Quorus Consulting Group Ltd. Table of Contents Executive Summary 3 Research Objectives and Methodology 9 Detailed
Literature Review: Starting Mobile Application Development for E-Sports Portal Hayoung Noh
Literature Review: Starting Mobile Application Development for E-Sports Portal Hayoung Noh Computer Science Honours Programme University of Cape Town 13 May 2014 Abstract Constant demand for mobile applications
Table 1: Comparison between performance regression detection and APM tools
Studying the Effectiveness of Application Performance Management (APM) Tools for Detecting Performance Regressions for Web Applications: An Experience Report Tarek M. Ahmed 1, Cor-Paul Bezemer 1, Tse-Hsun
Connecting Software Connect Bridge - Mobile CRM Android User Manual
Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual
Mastering Mobile Web with 8 Key Rules. Mastering Mobile Web with 8 Key Rules www.mobilelabsinc.com
Mastering Mobile Web with 8 Key Rules 1 2 Introduction When it comes to mobile web design and testing, mobility plays by a far different set of rules than the desktops of years past. Today we are challenged
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
NOTE: New directions for accessing the Parent Portal using Single Sign On
NOTE: New directions for accessing the Parent Portal using Single Sign On PROCESS STEPS SCREEN SHOTS Launch a web browser (Internet Explorer, Safari, or FireFox) and go to PowerSchool Parent Portal URL:
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati
Characteristic-Based Security Analysis of Personal Networks
Characteristic-Based Security Analysis of Personal Networks Andrew J. Paverd Department of Computer Science University of Oxford [email protected] Fadi El-Moussa BT Research BT Technology, Service
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal
A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal Chalermpong Somdulyawat [email protected] Piyawat Pongjitpak [email protected] Santi Phithakkitnukoon
Open Source Software Maintenance Process Framework
Open Source Software Maintenance Process Framework Timo Koponen Department of Computer Science University of Kuopio Box 163, 70211 Kuopio, Finland +358-17-162388 [email protected] Virpi Hotti Department
Online Reviews as First Class Artifacts in Mobile App Development
Online Reviews as First Class Artifacts in Mobile App Development Claudia Iacob (1), Rachel Harrison (1), Shamal Faily (2) (1) Oxford Brookes University Oxford, United Kingdom {iacob, rachel.harrison}@brookes.ac.uk
Workshop on Android and Applications Development
Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,
Mobile and Cloud computing and SE
Mobile and Cloud computing and SE This week normal. Next week is the final week of the course Wed 12-14 Essay presentation and final feedback Kylmämaa Kerkelä Barthas Gratzl Reijonen??? Thu 08-10 Group
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction
Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, [email protected] Keywords: Regression
Store & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
The Hidden Power of Apps: Unlocking the Future of Marketing
The Hidden Power of Apps: Unlocking the Future of Marketing Micah Adler CEO & Founder, Fiksu January 16, 2014 Who is Fiksu? 200 PEOPLE 3 CONTINENTS Cohesive Mobile App Marketing 800 CLIENTS 1800 APPS 2B+
Testing Mobile Application using Device Cloud
Testing Mobile Application using Device Cloud Device Cloud and Benefits CSC has partnerships with mobile device cloud services such as DeviceAnywhere Device cloud platform provides an end-to-end solution
Predicting sports events from past results
Predicting sports events from past results Towards effective betting on football Douwe Buursma University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT
Remote Usability Evaluation of Mobile Web Applications
Remote Usability Evaluation of Mobile Web Applications Paolo Burzacca and Fabio Paternò CNR-ISTI, HIIS Laboratory, via G. Moruzzi 1, 56124 Pisa, Italy {paolo.burzacca,fabio.paterno}@isti.cnr.it Abstract.
Mobile Phones and Information Capture in the Workplace
Mobile Phones and Information Capture in the Workplace Amrita Thakur Ricoh Innovations, Inc. 2882 Sand Hill Rd. Ste 115 Menlo Park, CA 94063 [email protected] Michael Gormish Ricoh Innovations,
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
Mobile Application Development
Web Engineering Mobile Application Development Copyright 2015 Slides from Federico M. Facca (2010), Nelia Lasierra (updates) 1 2 Where we are? # Date Title 1 5 th March Web Engineering Introduction and
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
E21 Mobile Users Guide
E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions
Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?*
Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?* Jennjou Chen and Tsui-Fang Lin Abstract With the increasing popularity of information technology in higher education, it has
Available on VitalSource
User Guide Available on VitalSource Welcome to Pageburst on VitalSource all of your Elsevier ebooks at your fingertips! This user guide contains the information you will need to redeem your access code
Modeling the Mobile Application Development Lifecycle
, March 12-14, 2014, Hong Kong Modeling the Mobile Application Development Lifecycle Tejas Vithani, Member, IAENG and Anand Kumar Abstract Software Development Lifecycle is crucial in Desktop or web application
Understanding and Prediction of Mobile Application Usage for Smart Phones
Understanding and Prediction of Mobile Application Usage for Smart Phones Choonsung Shin, Jin-Hyuk Hong, Anind K. Dey Carnegie Mellon University, Human-Computer Interaction Institute 5000 Forbes, Pittsburgh,
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
A Case for Battery Charging-Aware Power Management and Deferrable Task Scheduling in Smartphones
A Case for Charging-Aware Power Management and Deferrable Task Scheduling in Smartphones Salma Elmalaki, Mark Gottscho, Puneet Gupta and Mani Srivastava University of California, Los Angeles [email protected],
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
Send and receive encrypted e-mails
Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Welcome to the Opus Bank Mobile Banking App User Guide
Welcome to the Opus Bank Mobile Banking App User Guide 1.855.678.7226 [email protected] www.opusbank.com Table of Contents Enroll in Mobile Banking & Install App... 3 Login to Personal Online
Chapter 4. The sleep and activities of daily living (ADL) monitoring application
Authors: Yuchen-Huang (2014-07-30); recommended: Yeh-Liang Hsu(2014-08-01). Chapter 4. The sleep and activities of daily living (ADL) monitoring application Long-term ADL profiles of the older adults acquired
CSC WORLD AN ARTICLE FROM FOCUS ON MOBILITY. Defining Your Mobile Strategy: A Guide to Developing Apps
AN ARTICLE FROM CSC WORLD FOCUS ON MOBILITY Defining Your Mobile Strategy: A Guide to Developing Apps SUMMER 2010 FOCUS ON MOBILITY DEFINING YOUR MOBILE STRATEGY A Guide to Developing Apps by Christopher
Usable Multi-Factor Authentication and Risk- Based Authorization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Usable Multi-Factor Authentication and Risk- Based Authorization IBM T.J. Watson Research Center Larry Koved December 18, 2014 Team Profile
Document OwnCloud Collaboration Server (DOCS) User Manual. How to Access Document Storage
Document OwnCloud Collaboration Server (DOCS) User Manual How to Access Document Storage You can connect to your Document OwnCloud Collaboration Server (DOCS) using any web browser. Server can be accessed
Performance Monitoring API for Java Enterprise Applications
Performance Monitoring API for Java Enterprise Applications Purpose Perfmon4j has been successfully deployed in hundreds of production java systems over the last 5 years. It has proven to be a highly successful
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
