Carat: collaborative energy diagnosis for mobile devices
暂无分享,去创建一个
Sasu Tarkoma | Eemil Lagerspetz | Ion Stoica | Adam J. Oliner | Anand Padmanabha Iyer | I. Stoica | Sasu Tarkoma | A. Oliner | A. Iyer | Eemil Lagerspetz | S. Tarkoma
[1] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[3] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[4] Mahadev Satyanarayanan,et al. PowerScope: a tool for profiling the energy usage of mobile applications , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] A. Sinha,et al. JouleTrack-a Web based tool for software energy profiling , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[6] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[7] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[8] M. Lam,et al. Tracking down software bugs using automatic anomaly detection , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[9] Marcos K. Aguilera,et al. Performance debugging for distributed systems of black boxes , 2003, SOSP '03.
[10] Michael I. Jordan,et al. Bug isolation via remote program sampling , 2003, PLDI '03.
[11] Sreerama K. Murthy,et al. Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey , 1998, Data Mining and Knowledge Discovery.
[12] Michael K. Reiter,et al. Seurat: A Pointillist Approach to Anomaly Detection , 2004, RAID.
[13] Helen J. Wang,et al. Automatic Misconfiguration Troubleshooting with PeerPressure , 2004, OSDI.
[14] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[15] Michael D. Smith,et al. Host-based detection of worms through peer-to-peer cooperation , 2005, WORM '05.
[16] Michael I. Jordan,et al. Scalable statistical bug isolation , 2005, PLDI '05.
[17] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[18] Lior Rokach,et al. Top-down induction of decision trees classifiers - a survey , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[19] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[20] Angelos D. Keromytis,et al. Software Self-Healing Using Collaborative Application Communities , 2006, NDSS.
[21] Marcos K. Aguilera,et al. WAP5: black-box performance debugging for wide-area systems , 2006, WWW '06.
[22] Ahmad Rahmati,et al. Understanding human-battery interaction on mobile phones , 2007, Mobile HCI.
[23] Feng Zhao,et al. Fine-grained energy profiling for power-aware application design , 2008, PERV.
[24] Liviu Iftode,et al. Context-aware Battery Management for Mobile Phones , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[25] Xuezheng Liu,et al. D3S: Debugging Deployed Distributed Systems , 2008, NSDI.
[26] Arun Venkataramani,et al. Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.
[27] Michael I. Jordan,et al. Detecting large-scale system problems by mining console logs , 2009, SOSP '09.
[28] Feng Zhao,et al. Energy-accuracy trade-off for continuous mobile device location , 2010, MobiSys '10.
[29] Shan Lu,et al. Instrumentation and sampling strategies for cooperative concurrency bug isolation , 2010, OOPSLA.
[30] Paramvir Bahl,et al. Diagnosing mobile applications in the wild , 2010, Hotnets-IX.
[31] Alexander Aiken,et al. Using correlated surprise to infer shared influence , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[32] Ratul Mahajan,et al. There’s an app for that, but it doesn’t work. Diagnosing Mobile Applications in the Wild , 2010 .
[33] Scott Shenker,et al. Spark: Cluster Computing with Working Sets , 2010, HotCloud.
[34] Armando Fox,et al. Fingerprinting the datacenter: automated classification of performance crises , 2010, EuroSys '10.
[35] Earl Oliver,et al. The challenges in large-scale smartphone user studies , 2010, HotPlanet '10.
[36] Ming Zhang,et al. Bootstrapping energy debugging on smartphones: a first look at energy bugs in mobile devices , 2011, HotNets-X.
[37] Alexander Aiken,et al. Online detection of multi-component interactions in production systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[38] Debugging in the (very) large , 2011, Commun. ACM.
[39] Denzil Ferreira,et al. Understanding Human-Smartphone Concerns: A Study of Battery Life , 2011, Pervasive.
[40] Srinivasan Keshav,et al. An empirical approach to smartphone energy level prediction , 2011, UbiComp '11.
[41] Sasu Tarkoma,et al. Collaborative Energy Debugging for Mobile Devices , 2012, HotDep.
[42] Samuel P. Midkiff,et al. What is keeping my phone awake?: characterizing and detecting no-sleep energy bugs in smartphone apps , 2012, MobiSys '12.
[43] Hojung Cha,et al. AppScope: Application Energy Metering Framework for Android Smartphone Using Kernel Activity Monitoring , 2012, USENIX Annual Technical Conference.
[44] Ranveer Chandra,et al. Empowering developers to estimate app energy consumption , 2012, Mobicom '12.
[45] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[46] Xiao Ma,et al. eDoctor : Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones , 2013 .