메뉴 건너뛰기




Volumn , Issue , 2012, Pages 363-372

ADEL: An Automatic Detector of Energy Leaks for smartphone applications

Author keywords

Energy bugs; Energy leaks; Mobile applications

Indexed keywords

AUTOMATIC DETECTOR; ENERGY BUGS; ENERGY CONSTRAINT; ENERGY LEAKS; MOBILE APPLICATIONS; NETWORK COMMUNICATIONS; PREFETCHING;

EID: 84869017364     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2380445.2380503     Document Type: Conference Paper
Times cited : (54)

References (21)
  • 3
    • 84855196405 scopus 로고    scopus 로고
    • Bootstrapping energy debugging on smartphones: A first look at energy bugs in mobile devices
    • Nov.
    • A. Pathak, Y. C. Hu, and M. Zhang, "Bootstrapping energy debugging on smartphones: a first look at energy bugs in mobile devices," in Proc. Wkshp. Hot Topics in Networks, Nov. 2011.
    • (2011) Proc. Wkshp. Hot Topics in Networks
    • Pathak, A.1    Hu, Y.C.2    Zhang, M.3
  • 5
    • 84864366834 scopus 로고    scopus 로고
    • What is keeping my phone awake? characterizing and detecting no-sleep energy bugs in smartphone apps
    • June
    • A. Pathak, et al., "What is keeping my phone awake? characterizing and detecting no-sleep energy bugs in smartphone apps," in Proc. Int. Conf. Mobile Systems, Applications And Services, June 2012, pp. 267-280.
    • (2012) Proc. Int. Conf. Mobile Systems, Applications and Services , pp. 267-280
    • Pathak, A.1
  • 8
    • 25844455629 scopus 로고    scopus 로고
    • Smart power-saving mode for IEEE 802.11 wirelss LANs
    • Mar.
    • D. Qiao and K. Shin, "Smart power-saving mode for IEEE 802.11 wirelss LANs," in Proc. Int. Conf. Computer Communications, Mar. 2005, pp. 1573-1583.
    • (2005) Proc. Int. Conf. Computer Communications , pp. 1573-1583
    • Qiao, D.1    Shin, K.2
  • 10
    • 0030397263 scopus 로고    scopus 로고
    • WebExpress: A system for optimizing web browsing in a wireless environment
    • June
    • B. Housel and D. Lindquist, "WebExpress: a system for optimizing web browsing in a wireless environment," in Proc. Int. Conf. Mobile Computing and Networking, June 1996, pp. 108-116.
    • (1996) Proc. Int. Conf. Mobile Computing and Networking , pp. 108-116
    • Housel, B.1    Lindquist, D.2
  • 12
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • Oct.
    • W. Enck, et al., "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in Proc. Int. Symp. Operating Systems Design and Implementation, Oct. 2010.
    • (2010) Proc. Int. Symp. Operating Systems Design and Implementation
    • Enck, W.1
  • 14
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enformacement: A practical apporach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enformacement: a practical apporach to defeat a wide range of attacks," in Proc. USENIX Conf., 2006, pp. 121-136.
    • (2006) Proc. USENIX Conf. , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 15
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a Java Virtual Machine
    • Dec.
    • D. Chandra and M. Franz, "Fine-grained information flow analysis and enforcement in a Java Virtual Machine," in Proc. Annual Computer Security Applications Conference, Dec. 2007, pp. 463-475.
    • (2007) Proc. Annual Computer Security Applications Conference , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 16
    • 84869046863 scopus 로고    scopus 로고
    • PowerTutor, "PowerTutor," 2009, http://powertutor.org.
    • (2009) PowerTutor
  • 17
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • Oct.
    • H. Yin, et al., "Panorama: capturing system-wide information flow for malware detection and analysis," in Proc. Conf. on Computer and Communications Security, Oct. 2007, pp. 116-127.
    • (2007) Proc. Conf. on Computer and Communications Security , pp. 116-127
    • Yin, H.1
  • 18
    • 84901304922 scopus 로고    scopus 로고
    • DBTaint: Cross-application information flow tracking via databases
    • June
    • B. Davis and H. Chen, "DBTaint: cross-application information flow tracking via databases," in Proc. USENIX Conf., June 2010, pp. 12-12.
    • (2010) Proc. USENIX Conf. , pp. 12-12
    • Davis, B.1    Chen, H.2
  • 21
    • 78650656979 scopus 로고    scopus 로고
    • "Android SDK reference," http://developer.android.com/ reference/packages.html.
    • Android SDK Reference


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.