Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles
暂无分享,去创建一个
Xuanzhe Liu | Tao Xie | Qiaozhu Mei | Feng Feng | Hong Mei | Xuan Lu | Huoran Li | Xuanzhe Liu | Tao Xie | Xuan Lu | Q. Mei | Hong Mei | Huoran Li | Feng Feng | Qiaozhu Mei
[1] Ning Chen,et al. AR-miner: mining informative reviews for developers from mobile app marketplace , 2014, ICSE.
[2] John D. Musa,et al. Operational profiles in software-reliability engineering , 1993, IEEE Software.
[3] Flavio Figueiredo,et al. On the Dynamics of Social Media Popularity: A YouTube Case Study , 2014, TOIT.
[4] Jason Nieh,et al. A measurement study of google play , 2014, SIGMETRICS '14.
[5] Daniel Gatica-Perez,et al. Where and what: Using smartphones to predict next locations and applications in daily life , 2014, Pervasive Mob. Comput..
[6] Romain Rouvoy,et al. Tracking the Software Quality of Android Applications Along Their Evolution (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[7] Kensuke Fukuda,et al. Tracking the Evolution and Diversity in Network Usage of Smartphones , 2015, Internet Measurement Conference.
[8] Qiang Xu,et al. Identifying diverse usage behaviors of smartphone apps , 2011, IMC '11.
[9] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .
[10] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Mariacarla Calzarossa,et al. Workload Characterization , 2016, ACM Comput. Surv..
[13] Evangelos P. Markatos,et al. Rise of the planet of the apps: a systematic study of the mobile app ecosystem , 2013, Internet Measurement Conference.
[14] Xuanzhe Liu,et al. PRADA: Prioritizing Android Devices for Apps by Mining Large-Scale Usage Data , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[15] Xuanzhe Liu,et al. Deriving User Preferences of Mobile Apps from Their Management Activities , 2017, ACM Trans. Inf. Syst..
[16] Maleknaz Nayebi,et al. Release Practices for Mobile Apps -- What do Users and Developers Think? , 2016, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[17] Deborah Estrin,et al. Diversity in smartphone usage , 2010, MobiSys '10.
[18] Kai Wang,et al. A static technique for detecting input validation vulnerabilities in Android apps , 2015, Science China Information Sciences.
[19] Deborah Estrin,et al. A first look at traffic on smartphones , 2010, IMC '10.
[20] J. Friedman. Stochastic gradient boosting , 2002 .
[21] William G. J. Halfond,et al. Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[22] Jiannong Cao,et al. Auxo: an architecture-centric framework supporting the online tuning of software adaptivity , 2015, Science China Information Sciences.
[23] Nan Zhang,et al. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations , 2014, 2014 IEEE Symposium on Security and Privacy.
[24] Antonio Krüger,et al. A study on icon arrangement by smartphone users , 2013, CHI.
[25] Clayton Shepard,et al. Exploring iPhone usage: the influence of socioeconomic differences on smartphone adoption, usage and usability , 2012, Mobile HCI.
[26] Clayton Shepard,et al. Characterizing web use on smartphones , 2012, CHI.
[27] Daniel Gatica-Perez,et al. Discovering places of interest in everyday life from smartphone data , 2011, Multimedia Tools and Applications.
[28] Ming Zhang,et al. The wireless data drain of users, apps, & platforms , 2013, MOCO.
[29] Ahmed E. Hassan,et al. Prioritizing the devices to test your app on: a case study of Android game apps , 2014, SIGSOFT FSE.
[30] Suman Banerjee,et al. Capturing mobile experience in the wild: a tale of two apps , 2013, CoNEXT.
[31] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[32] R. Tibshirani. Regression Shrinkage and Selection via the Lasso , 1996 .
[33] Peter J. Bentley,et al. Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering , 2015, IEEE Transactions on Software Engineering.
[34] Bashar Nuseibeh,et al. Distilling privacy requirements for mobile applications , 2014, ICSE.
[35] Eleni Stroulia,et al. Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs , 2012, 2012 19th Working Conference on Reverse Engineering.
[36] Xuanzhe Liu,et al. AppHolmes: Detecting and Characterizing App Collusion among Third-Party Android Markets , 2017, WWW.
[37] Philip S. Yu,et al. On the Feature Discovery for App Usage Prediction in Smartphones , 2013, 2013 IEEE 13th International Conference on Data Mining.
[38] Lada A. Adamic,et al. Power-Law Distribution of the World Wide Web , 2000, Science.
[39] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[40] Ning Ding,et al. Smartphone Background Activities in the Wild: Origin, Energy Drain, and Optimization , 2015, MobiCom.
[41] Robert H. Ducoffe. ADVERTISING VALUE AND ADVERTISING ON THE WEB , 1996 .
[42] Kaigui Bian,et al. Characterizing Smartphone Usage Patterns from Millions of Android Users , 2015, Internet Measurement Conference.
[43] Anind K. Dey,et al. Automatically detecting problematic use of smartphones , 2013, UbiComp.
[44] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[45] Johannes Schöning,et al. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage , 2011, Mobile HCI.
[46] Peng Wang,et al. AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.
[47] Caroline Jay,et al. Understanding users in the wild , 2013, W4A.
[48] Je-Ho Park,et al. Fragmentation Problem in Android , 2013, 2013 International Conference on Information Science and Applications (ICISA).
[49] Yuanyuan Zhang,et al. The App Sampling Problem for App Store Mining , 2015, 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.
[50] Gabriele Bavota,et al. Release Planning of Mobile Apps Based on User Reviews , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[51] M. Jacomy,et al. ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software , 2014, PloS one.
[52] Amy L. Murphy,et al. Software engineering for mobility: reflecting on the past, peering into the future , 2014, FOSE.
[53] Jin-Hyuk Hong,et al. Understanding and prediction of mobile application usage for smart phones , 2012, UbiComp.
[54] Yuanyuan Zhang,et al. App store mining and analysis: MSR for app stores , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).
[55] Yubin Xia,et al. AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone , 2015, MobiSys.
[56] Ryan Stevens,et al. MAdFraud: investigating ad fraud in android applications , 2014, MobiSys.
[57] R. Tibshirani,et al. Regression shrinkage and selection via the lasso: a retrospective , 2011 .
[58] Wen-Chih Peng,et al. On mining mobile apps usage behavior for predicting apps usage in smartphones , 2013, CIKM.
[59] Ricardo Baeza-Yates,et al. Predicting The Next App That You Are Going To Use , 2015, WSDM.
[60] Pablo Rodriguez,et al. I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.
[61] Guanling Chen,et al. AppJoy: personalized mobile application discovery , 2011, MobiSys '11.
[62] Ahmad Rahmati,et al. Studying Smartphone Usage: Lessons from a Four-Month Field Study , 2013, IEEE Transactions on Mobile Computing.
[63] Xuanzhe Liu,et al. Voting with Their Feet: Inferring User Preferences from App Management Activities , 2016, WWW.
[64] Christos Faloutsos,et al. Why people hate your app: making sense of user feedback in a mobile app store , 2013, KDD.