Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles

The prevalence of smart mobile devices has promoted the popularity of mobile applications (a.k.a. apps). Supporting mobility has become a promising trend in software engineering research. This article presents an empirical study of behavioral service profiles collected from millions of users whose devices are deployed with Wandoujia, a leading Android app-store service in China. The dataset of Wandoujia service profiles consists of two kinds of user behavioral data from using 0.28 million free Android apps, including (1) app management activities (i.e., downloading, updating, and uninstalling apps) from over 17 million unique users and (2) app network usage from over 6 million unique users. We explore multiple aspects of such behavioral data and present patterns of app usage. Based on the findings as well as derived knowledge, we also suggest some new open opportunities and challenges that can be explored by the research community, including app development, deployment, delivery, revenue, etc.

[1]  Ning Chen,et al.  AR-miner: mining informative reviews for developers from mobile app marketplace , 2014, ICSE.

[2]  John D. Musa,et al.  Operational profiles in software-reliability engineering , 1993, IEEE Software.

[3]  Flavio Figueiredo,et al.  On the Dynamics of Social Media Popularity: A YouTube Case Study , 2014, TOIT.

[4]  Jason Nieh,et al.  A measurement study of google play , 2014, SIGMETRICS '14.

[5]  Daniel Gatica-Perez,et al.  Where and what: Using smartphones to predict next locations and applications in daily life , 2014, Pervasive Mob. Comput..

[6]  Romain Rouvoy,et al.  Tracking the Software Quality of Android Applications Along Their Evolution (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[7]  Kensuke Fukuda,et al.  Tracking the Evolution and Diversity in Network Usage of Smartphones , 2015, Internet Measurement Conference.

[8]  Qiang Xu,et al.  Identifying diverse usage behaviors of smartphone apps , 2011, IMC '11.

[9]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .

[10]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[11]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[12]  Mariacarla Calzarossa,et al.  Workload Characterization , 2016, ACM Comput. Surv..

[13]  Evangelos P. Markatos,et al.  Rise of the planet of the apps: a systematic study of the mobile app ecosystem , 2013, Internet Measurement Conference.

[14]  Xuanzhe Liu,et al.  PRADA: Prioritizing Android Devices for Apps by Mining Large-Scale Usage Data , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[15]  Xuanzhe Liu,et al.  Deriving User Preferences of Mobile Apps from Their Management Activities , 2017, ACM Trans. Inf. Syst..

[16]  Maleknaz Nayebi,et al.  Release Practices for Mobile Apps -- What do Users and Developers Think? , 2016, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER).

[17]  Deborah Estrin,et al.  Diversity in smartphone usage , 2010, MobiSys '10.

[18]  Kai Wang,et al.  A static technique for detecting input validation vulnerabilities in Android apps , 2015, Science China Information Sciences.

[19]  Deborah Estrin,et al.  A first look at traffic on smartphones , 2010, IMC '10.

[20]  J. Friedman Stochastic gradient boosting , 2002 .

[21]  William G. J. Halfond,et al.  Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[22]  Jiannong Cao,et al.  Auxo: an architecture-centric framework supporting the online tuning of software adaptivity , 2015, Science China Information Sciences.

[23]  Nan Zhang,et al.  The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations , 2014, 2014 IEEE Symposium on Security and Privacy.

[24]  Antonio Krüger,et al.  A study on icon arrangement by smartphone users , 2013, CHI.

[25]  Clayton Shepard,et al.  Exploring iPhone usage: the influence of socioeconomic differences on smartphone adoption, usage and usability , 2012, Mobile HCI.

[26]  Clayton Shepard,et al.  Characterizing web use on smartphones , 2012, CHI.

[27]  Daniel Gatica-Perez,et al.  Discovering places of interest in everyday life from smartphone data , 2011, Multimedia Tools and Applications.

[28]  Ming Zhang,et al.  The wireless data drain of users, apps, & platforms , 2013, MOCO.

[29]  Ahmed E. Hassan,et al.  Prioritizing the devices to test your app on: a case study of Android game apps , 2014, SIGSOFT FSE.

[30]  Suman Banerjee,et al.  Capturing mobile experience in the wild: a tale of two apps , 2013, CoNEXT.

[31]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[32]  R. Tibshirani Regression Shrinkage and Selection via the Lasso , 1996 .

[33]  Peter J. Bentley,et al.  Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering , 2015, IEEE Transactions on Software Engineering.

[34]  Bashar Nuseibeh,et al.  Distilling privacy requirements for mobile applications , 2014, ICSE.

[35]  Eleni Stroulia,et al.  Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs , 2012, 2012 19th Working Conference on Reverse Engineering.

[36]  Xuanzhe Liu,et al.  AppHolmes: Detecting and Characterizing App Collusion among Third-Party Android Markets , 2017, WWW.

[37]  Philip S. Yu,et al.  On the Feature Discovery for App Usage Prediction in Smartphones , 2013, 2013 IEEE 13th International Conference on Data Mining.

[38]  Lada A. Adamic,et al.  Power-Law Distribution of the World Wide Web , 2000, Science.

[39]  Tao Xie,et al.  WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.

[40]  Ning Ding,et al.  Smartphone Background Activities in the Wild: Origin, Energy Drain, and Optimization , 2015, MobiCom.

[41]  Robert H. Ducoffe ADVERTISING VALUE AND ADVERTISING ON THE WEB , 1996 .

[42]  Kaigui Bian,et al.  Characterizing Smartphone Usage Patterns from Millions of Android Users , 2015, Internet Measurement Conference.

[43]  Anind K. Dey,et al.  Automatically detecting problematic use of smartphones , 2013, UbiComp.

[44]  Alessandra Gorla,et al.  Checking app behavior against app descriptions , 2014, ICSE.

[45]  Johannes Schöning,et al.  Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage , 2011, Mobile HCI.

[46]  Peng Wang,et al.  AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.

[47]  Caroline Jay,et al.  Understanding users in the wild , 2013, W4A.

[48]  Je-Ho Park,et al.  Fragmentation Problem in Android , 2013, 2013 International Conference on Information Science and Applications (ICISA).

[49]  Yuanyuan Zhang,et al.  The App Sampling Problem for App Store Mining , 2015, 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.

[50]  Gabriele Bavota,et al.  Release Planning of Mobile Apps Based on User Reviews , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[51]  M. Jacomy,et al.  ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software , 2014, PloS one.

[52]  Amy L. Murphy,et al.  Software engineering for mobility: reflecting on the past, peering into the future , 2014, FOSE.

[53]  Jin-Hyuk Hong,et al.  Understanding and prediction of mobile application usage for smart phones , 2012, UbiComp.

[54]  Yuanyuan Zhang,et al.  App store mining and analysis: MSR for app stores , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).

[55]  Yubin Xia,et al.  AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone , 2015, MobiSys.

[56]  Ryan Stevens,et al.  MAdFraud: investigating ad fraud in android applications , 2014, MobiSys.

[57]  R. Tibshirani,et al.  Regression shrinkage and selection via the lasso: a retrospective , 2011 .

[58]  Wen-Chih Peng,et al.  On mining mobile apps usage behavior for predicting apps usage in smartphones , 2013, CIKM.

[59]  Ricardo Baeza-Yates,et al.  Predicting The Next App That You Are Going To Use , 2015, WSDM.

[60]  Pablo Rodriguez,et al.  I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.

[61]  Guanling Chen,et al.  AppJoy: personalized mobile application discovery , 2011, MobiSys '11.

[62]  Ahmad Rahmati,et al.  Studying Smartphone Usage: Lessons from a Four-Month Field Study , 2013, IEEE Transactions on Mobile Computing.

[63]  Xuanzhe Liu,et al.  Voting with Their Feet: Inferring User Preferences from App Management Activities , 2016, WWW.

[64]  Christos Faloutsos,et al.  Why people hate your app: making sense of user feedback in a mobile app store , 2013, KDD.