首页 > 最新文献

2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)最新文献

英文 中文
Preserving Energy Resources Using an Android Kernel Extension: A Case Study 使用Android内核扩展保护能源:一个案例研究
Luis Corral, Ilenia Fronza, Nabil El Ioini, Andrea Janes, Peter Plant
In this paper, we present our experience designing and testing anenergy saving strategy for mobile phones, implemented atoperating system level, using Android OS. Our approach was todeploy kernel extensions that assess the status of the device, andenable economic profiles without user intervention. Ourexperiments showed that the power management kernel extensionwas able to extend the battery runtime by 70% to 75%, at theexpense of impacting the experience of the user with an estimated performance degradation of 20% to 30%.
本文介绍了基于Android操作系统的手机节能策略设计与测试的经验。我们的方法是部署内核扩展来评估设备的状态,并在没有用户干预的情况下启用经济配置文件。我们的实验表明,电源管理内核扩展能够将电池运行时间延长70%到75%,但代价是影响用户的体验,估计性能下降20%到30%。
{"title":"Preserving Energy Resources Using an Android Kernel Extension: A Case Study","authors":"Luis Corral, Ilenia Fronza, Nabil El Ioini, Andrea Janes, Peter Plant","doi":"10.1145/2897073.2897124","DOIUrl":"https://doi.org/10.1145/2897073.2897124","url":null,"abstract":"In this paper, we present our experience designing and testing anenergy saving strategy for mobile phones, implemented atoperating system level, using Android OS. Our approach was todeploy kernel extensions that assess the status of the device, andenable economic profiles without user intervention. Ourexperiments showed that the power management kernel extensionwas able to extend the battery runtime by 70% to 75%, at theexpense of impacting the experience of the user with an estimated performance degradation of 20% to 30%.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Having a Cloud of Mobile Devices Specialized for Software Testing 面向软件测试专用的移动设备云
Mehmet Çagri Çalpur, Cemal Yilmaz
This paper proposes a novel cloud testing platform specialized for software testing. Our novel approach aims to perform dynamic analysis on mobile application binaries, generate the model of the application, its test cases and test input sets on the run. Domain information generated via dynamic analysis and utilization of combinatorial interaction testing for test case and input set analysis will be used for improving the systems coverage capability. The system will be a self learning system in the sense that the lessons learned from testing one application will be used to test another application.
本文提出了一种专门用于软件测试的新型云测试平台。我们的新方法旨在对移动应用程序二进制文件进行动态分析,在运行时生成应用程序模型、测试用例和测试输入集。通过动态分析和利用组合交互测试对测试用例和输入集分析产生的领域信息将用于提高系统的覆盖能力。系统将是一个自我学习系统,从测试一个应用程序中获得的经验教训将用于测试另一个应用程序。
{"title":"Towards Having a Cloud of Mobile Devices Specialized for Software Testing","authors":"Mehmet Çagri Çalpur, Cemal Yilmaz","doi":"10.1145/2897073.2897109","DOIUrl":"https://doi.org/10.1145/2897073.2897109","url":null,"abstract":"This paper proposes a novel cloud testing platform specialized for software testing. Our novel approach aims to perform dynamic analysis on mobile application binaries, generate the model of the application, its test cases and test input sets on the run. Domain information generated via dynamic analysis and utilization of combinatorial interaction testing for test case and input set analysis will be used for improving the systems coverage capability. The system will be a self learning system in the sense that the lessons learned from testing one application will be used to test another application.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"40 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating BSS Algorithms in a Mobile Context Realized by a Client-Server Architecture 基于客户端-服务器架构的移动环境下BSS算法评估
M. Offiah, T. Gross, M. Borschbach
The human daily and the professional life demand a high amount of communication ability, but every fourth adult above 50 is hearing-impaired, a fraction that steadily in- creases in an aging society. For an autonomous, self-condent and long productive life, a good speech understanding in ev- eryday life situations is necessary to reduce the listening ef- fort. For this purpose, a mobile app-based assistance system based on Blind Source Separation is required that makes every-day acoustic scenarios more transparent by the op- portunity of an interactive focusing on the preferred sound source in as close to real-time as possible. In case of highly costly BSS algorithms, at least an oine separation is to be provided. Developing such an app in the context of a short-term research project with limited budget to realize this goal statement makes it impossible to meet the chal- lenge as a stand-alone solution with existing technologies and hardware. As an alternative, employing part of the re- quired soft- and/or hardware on a remote server at least maintains the mobile context, given sucient connectivity. For this purpose, a client-server architecture that combines Android, Java, MatlabControl and MATLAB, and that con- ducts separation of live recorded audio data remotely, is ex- plained and tested. Conclusions about what is possible for the oine case are drawn from that. Tests are evaluated using a set of objective and subjective criteria. This demon- strates the possibility of realizing the assistance system in a mobile context.
人类的日常生活和职业生活对沟通能力的要求很高,但50岁以上的成年人中有四分之一患有听力障碍,在一个老龄化社会中,这一比例还在稳步上升。要想拥有自主、自信和长寿的人生,在日常生活中有良好的言语理解能力是减少听力努力的必要条件。为此,需要一个基于盲源分离的移动应用辅助系统,通过尽可能接近实时地关注首选声源的交互式机会,使日常声学场景更加透明。在高成本的BSS算法的情况下,至少要提供一个线分离。在一个预算有限的短期研究项目中开发这样一个应用程序来实现这一目标声明,这使得它不可能以现有的技术和硬件来满足独立解决方案的挑战。作为一种替代方案,在远程服务器上使用部分所需的软件和/或硬件至少可以维护移动上下文,前提是具有快速的连接。为此,本文介绍并测试了一种结合Android、Java、MatlabControl和MATLAB的客户端-服务器架构,并对实时录制的音频数据进行了远程分离。关于这一案例的可能性的结论是由此得出的。测试使用一套客观和主观标准进行评估。这说明了在移动环境下实现辅助系统的可能性。
{"title":"Evaluating BSS Algorithms in a Mobile Context Realized by a Client-Server Architecture","authors":"M. Offiah, T. Gross, M. Borschbach","doi":"10.1145/2897073.2897098","DOIUrl":"https://doi.org/10.1145/2897073.2897098","url":null,"abstract":"The human daily and the professional life demand a high amount of communication ability, but every fourth adult above 50 is hearing-impaired, a fraction that steadily in- creases in an aging society. For an autonomous, self-condent and long productive life, a good speech understanding in ev- eryday life situations is necessary to reduce the listening ef- fort. For this purpose, a mobile app-based assistance system based on Blind Source Separation is required that makes every-day acoustic scenarios more transparent by the op- portunity of an interactive focusing on the preferred sound source in as close to real-time as possible. In case of highly costly BSS algorithms, at least an oine separation is to be provided. Developing such an app in the context of a short-term research project with limited budget to realize this goal statement makes it impossible to meet the chal- lenge as a stand-alone solution with existing technologies and hardware. As an alternative, employing part of the re- quired soft- and/or hardware on a remote server at least maintains the mobile context, given sucient connectivity. For this purpose, a client-server architecture that combines Android, Java, MatlabControl and MATLAB, and that con- ducts separation of live recorded audio data remotely, is ex- plained and tested. Conclusions about what is possible for the oine case are drawn from that. Tests are evaluated using a set of objective and subjective criteria. This demon- strates the possibility of realizing the assistance system in a mobile context.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BehaviorDroid: Monitoring Android Applications BehaviorDroid:监控Android应用程序
Alexis Silva, J. Simmonds
Mobile app developers declare permissions, but these do not guarantee that apps will behave as expected. Existing work focuses on checking predefined app properties, e.g., clone detection and API analysis. We propose BehaviorDroid, a framework for monitoring general app properties at runtime. Properties are currently specified using automata, describing desired and unwanted interactions between an app and phone resources. BehaviorDroid is a robust, extensible and configurable framework that can simultaneously monitor multiple apps and properties, showing reasonable CPU and memory usage during execution. Initial experiments show that we can improve memory usage by combining automata that have similar alphabets.
移动应用程序开发者声明权限,但这并不能保证应用程序会按照预期运行。现有的工作重点是检查预定义的应用程序属性,例如克隆检测和API分析。我们提出了BehaviorDroid,一个在运行时监控一般应用程序属性的框架。属性目前使用自动机指定,描述应用程序和电话资源之间所需和不需要的交互。BehaviorDroid是一个健壮的、可扩展的和可配置的框架,可以同时监控多个应用程序和属性,在执行过程中显示合理的CPU和内存使用情况。最初的实验表明,我们可以通过组合具有相似字母的自动机来提高内存使用。
{"title":"BehaviorDroid: Monitoring Android Applications","authors":"Alexis Silva, J. Simmonds","doi":"10.1145/2897073.2897121","DOIUrl":"https://doi.org/10.1145/2897073.2897121","url":null,"abstract":"Mobile app developers declare permissions, but these do not guarantee that apps will behave as expected. Existing work focuses on checking predefined app properties, e.g., clone detection and API analysis. We propose BehaviorDroid, a framework for monitoring general app properties at runtime. Properties are currently specified using automata, describing desired and unwanted interactions between an app and phone resources. BehaviorDroid is a robust, extensible and configurable framework that can simultaneously monitor multiple apps and properties, showing reasonable CPU and memory usage during execution. Initial experiments show that we can improve memory usage by combining automata that have similar alphabets.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Discovery and Selection Mechanism of Cloudlets in a Decentralized MCC Environment 分散MCC环境中Cloudlets的发现与选择机制
Dilay Parmar, A. S. Kumar, Ashwin Nivangune, Padmaja Joshi, U. P. Rao
In this paper a mechanism to identify a cloudlet for computation offloading in a decentralized manner is proposed. The cloudlet identification is carried out in two phases. In the first phase, cloudlets within WiFi range of the mobile device are identified without connecting to any of the cloudlets. In the second phase, selection of the ideal offloading cloudlet is done based on infrastructure specific parameters making the mechanism more generic.
本文提出了一种以去中心化的方式来识别云的计算卸载机制。云的识别分两个阶段进行。在第一阶段,识别移动设备WiFi范围内的cloudlets,而无需连接任何cloudlets。在第二阶段,根据基础设施特定参数选择理想的卸载cloudlet,使该机制更加通用。
{"title":"Discovery and Selection Mechanism of Cloudlets in a Decentralized MCC Environment","authors":"Dilay Parmar, A. S. Kumar, Ashwin Nivangune, Padmaja Joshi, U. P. Rao","doi":"10.1145/2897073.2897114","DOIUrl":"https://doi.org/10.1145/2897073.2897114","url":null,"abstract":"In this paper a mechanism to identify a cloudlet for computation offloading in a decentralized manner is proposed. The cloudlet identification is carried out in two phases. In the first phase, cloudlets within WiFi range of the mobile device are identified without connecting to any of the cloudlets. In the second phase, selection of the ideal offloading cloudlet is done based on infrastructure specific parameters making the mechanism more generic.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cognitive Mobile Security: Invited Conference Keynote 认知移动安全:特邀会议主题演讲
D. Lubensky, Marco Pistoia, Ching-Yung Lin, Omer Tripp
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is emph{context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.
移动设备具有许多漏洞,一旦被利用,可能导致专有数据泄露、数据更改、欺诈交易,在极端情况下,还可能对用户和周围环境造成物理损害。这种攻击可以由外部人员和内部人员发起,并且可以利用设备硬件和软件组件中嵌入的漏洞,以及设备合法用户采取的危险行为。现有的移动安全管理解决方案通过设备和容器管理、基于策略的配置、单点登录、应用程序白名单和/或黑名单,以及声誉和反恶意软件服务,提供了广泛的配置、跟踪和管理功能。现有解决方案都没有的一个主要特性是emph{上下文感知异常检测}。我们提出了一种基于上下文感知的移动安全认知解决方案。我们的解决方案侧重于移动管理工具,这些工具可以理解多个设备上的长期上下文感知行为异常。
{"title":"Cognitive Mobile Security: Invited Conference Keynote","authors":"D. Lubensky, Marco Pistoia, Ching-Yung Lin, Omer Tripp","doi":"10.1145/2897073.2897077","DOIUrl":"https://doi.org/10.1145/2897073.2897077","url":null,"abstract":"Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is emph{context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pro-active and Dynamic Prediction Assistance Using BaranC Framework 基于BaranC框架的主动动态预测辅助
Mohammad Hashemi, J. Herbert
Monitoring user interaction activities provides the basis for creating a user model that can be used to predict user behaviour and enable user assistant services. The BaranC framework provides components that perform UI monitoring (and collect all associated context data), builds a user model, and supports services that make use of the user model. In this case study, a Next-App prediction service is built to demonstrate the use of the framework and to evaluate the usefulness of such a prediction service. Next-App analyses a user's data, learns patterns, makes a model for a user, and finally predicts based on the user model and current context, what application(s) the user is likely to want to use. The prediction is pro-active and dynamic; it is dynamic both in responding to the current context, and also in that it responds to changes in the user model, as might occur over time as a user's habits change. Initial evaluation of Next-App indicates a high-level of satisfaction with the service.
监视用户交互活动为创建可用于预测用户行为和启用用户助理服务的用户模型提供了基础。BaranC框架提供了执行UI监视(并收集所有相关的上下文数据)、构建用户模型和支持使用该用户模型的服务的组件。在本案例研究中,构建Next-App预测服务来演示该框架的使用并评估这种预测服务的有用性。Next-App分析用户的数据,学习模式,为用户建立模型,最后根据用户模型和当前上下文预测用户可能想要使用的应用程序。预测具有前瞻性和动态性;它在响应当前上下文和响应用户模型的变化方面都是动态的,因为随着时间的推移,用户的习惯可能会发生变化。对Next-App的初步评估表明对服务的满意度很高。
{"title":"A Pro-active and Dynamic Prediction Assistance Using BaranC Framework","authors":"Mohammad Hashemi, J. Herbert","doi":"10.1145/2897073.2897759","DOIUrl":"https://doi.org/10.1145/2897073.2897759","url":null,"abstract":"Monitoring user interaction activities provides the basis for creating a user model that can be used to predict user behaviour and enable user assistant services. The BaranC framework provides components that perform UI monitoring (and collect all associated context data), builds a user model, and supports services that make use of the user model. In this case study, a Next-App prediction service is built to demonstrate the use of the framework and to evaluate the usefulness of such a prediction service. Next-App analyses a user's data, learns patterns, makes a model for a user, and finally predicts based on the user model and current context, what application(s) the user is likely to want to use. The prediction is pro-active and dynamic; it is dynamic both in responding to the current context, and also in that it responds to changes in the user model, as might occur over time as a user's habits change. Initial evaluation of Next-App indicates a high-level of satisfaction with the service.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices 虚拟磁盘加密:移动设备上安全存储的现实
Drew Suarez, D. Mayer
This paper reviews the challenges faced when securing data on mobile devices. After a discussion of the state-of-the-art of secure storage for iOS and Android, the paper introduces an attack which demonstrates how Full Disk Encryption (FDE) on Android can be ineffective in practice.
本文回顾了在移动设备上保护数据时所面临的挑战。在讨论了iOS和Android的最新安全存储技术之后,本文介绍了一种攻击,该攻击演示了Android上的全磁盘加密(FDE)在实践中是如何无效的。
{"title":"Faux Disk Encryption: Realities of Secure Storage on Mobile Devices","authors":"Drew Suarez, D. Mayer","doi":"10.1145/2897073.2897711","DOIUrl":"https://doi.org/10.1145/2897073.2897711","url":null,"abstract":"This paper reviews the challenges faced when securing data on mobile devices. After a discussion of the state-of-the-art of secure storage for iOS and Android, the paper introduces an attack which demonstrates how Full Disk Encryption (FDE) on Android can be ineffective in practice.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Accelerating a Computer Vision Algorithm on a Mobile SoC Using CPU-GPU Co-processing - A Case Study on Face Detection 利用CPU-GPU协同处理在移动SoC上加速计算机视觉算法——以人脸检测为例
Youngwan Lee, Cheolyong Jang, Hakil Kim
Recently, mobile devices have become equipped with sophisticated hardware components such as a heterogeneous multi-core SoC that consists of a CPU, GPU, and DSP. This provides opportunities to realize computationally-intensive computer vision applications using General Purpose GPU (GPGPU) programming tools such as Open Graphics Library for Embedded System (OpenGL ES) and Open Computing Language (OpenCL). As a case study, the aim of this research was to accelerate the Viola-Jones face detection algorithm which is computationally expensive and limited in use on mobile devices due to irregular memory access and imbalanced workloads resulting in low performance regarding the processing time. To solve the above challenges, the proposed method of this study adapted CPU–GPU task parallelism, sliding window parallelism, scale image parallelism, dynamic allocation of threads, and local memory optimization to improve the computational time. The experimental results show that the proposed method achieved a 3.3~6.29 times increased computational time compared to the well-optimized OpenCV implementation on a CPU. The proposed method can be adapted to other applications using mobile GPUs and CPUs.
最近,移动设备已经配备了复杂的硬件组件,例如由CPU、GPU和DSP组成的异构多核SoC。这为使用通用GPU (GPGPU)编程工具(如嵌入式系统开放图形库(OpenGL ES)和开放计算语言(OpenCL))实现计算密集型计算机视觉应用提供了机会。作为一个案例研究,本研究的目的是加速Viola-Jones人脸检测算法,该算法计算成本高,并且由于不规律的内存访问和不平衡的工作负载导致处理时间方面的性能低下,在移动设备上的使用受到限制。为了解决上述问题,本文提出的方法采用CPU-GPU任务并行、滑动窗口并行、缩放图像并行、线程动态分配和局部内存优化来提高计算时间。实验结果表明,与经过优化的OpenCV在CPU上的实现相比,该方法的计算时间提高了3.3~6.29倍。该方法可适用于使用移动gpu和cpu的其他应用。
{"title":"Accelerating a Computer Vision Algorithm on a Mobile SoC Using CPU-GPU Co-processing - A Case Study on Face Detection","authors":"Youngwan Lee, Cheolyong Jang, Hakil Kim","doi":"10.1145/2897073.2897081","DOIUrl":"https://doi.org/10.1145/2897073.2897081","url":null,"abstract":"Recently, mobile devices have become equipped with sophisticated hardware components such as a heterogeneous multi-core SoC that consists of a CPU, GPU, and DSP. This provides opportunities to realize computationally-intensive computer vision applications using General Purpose GPU (GPGPU) programming tools such as Open Graphics Library for Embedded System (OpenGL ES) and Open Computing Language (OpenCL). As a case study, the aim of this research was to accelerate the Viola-Jones face detection algorithm which is computationally expensive and limited in use on mobile devices due to irregular memory access and imbalanced workloads resulting in low performance regarding the processing time. To solve the above challenges, the proposed method of this study adapted CPU–GPU task parallelism, sliding window parallelism, scale image parallelism, dynamic allocation of threads, and local memory optimization to improve the computational time. The experimental results show that the proposed method achieved a 3.3~6.29 times increased computational time compared to the well-optimized OpenCV implementation on a CPU. The proposed method can be adapted to other applications using mobile GPUs and CPUs.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Model Under Design and Over Design on Mobile Applications 移动应用的设计下模型和过度设计模型
Yucong Duan, Xiaobing Sun, N. Narendra, Q. Duan, Guohua Fu, Ruomeng Xu
In this paper, we demonstrate a system for automated trans- formation rule application in mobile system development. Our application enables correctness and consistency of the automated transformation rules, by leveraging Egyed's work [2] on automated model transformation. Our approach is im- plemented viafinite state automation generation, extending from our previous work.
在本文中,我们演示了一个自动转换规则在移动系统开发中的应用系统。通过利用Egyed在自动模型转换上的工作[2],我们的应用程序支持自动转换规则的正确性和一致性。我们的方法是实现无限状态自动化生成,扩展了我们以前的工作。
{"title":"Model Under Design and Over Design on Mobile Applications","authors":"Yucong Duan, Xiaobing Sun, N. Narendra, Q. Duan, Guohua Fu, Ruomeng Xu","doi":"10.1145/2897073.2897709","DOIUrl":"https://doi.org/10.1145/2897073.2897709","url":null,"abstract":"In this paper, we demonstrate a system for automated trans- formation rule application in mobile system development. Our application enables correctness and consistency of the automated transformation rules, by leveraging Egyed's work [2] on automated model transformation. Our approach is im- plemented viafinite state automation generation, extending from our previous work.","PeriodicalId":296509,"journal":{"name":"2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1