89 research outputs found

    Cloud-based or On-device: An Empirical Study of Mobile Deep Inference

    Full text link
    Modern mobile applications are benefiting significantly from the advancement in deep learning, e.g., implementing real-time image recognition and conversational system. Given a trained deep learning model, applications usually need to perform a series of matrix operations based on the input data, in order to infer possible output values. Because of computational complexity and size constraints, these trained models are often hosted in the cloud. To utilize these cloud-based models, mobile apps will have to send input data over the network. While cloud-based deep learning can provide reasonable response time for mobile apps, it restricts the use case scenarios, e.g. mobile apps need to have network access. With mobile specific deep learning optimizations, it is now possible to employ on-device inference. However, because mobile hardware, such as GPU and memory size, can be very limited when compared to its desktop counterpart, it is important to understand the feasibility of this new on-device deep learning inference architecture. In this paper, we empirically evaluate the inference performance of three Convolutional Neural Networks (CNNs) using a benchmark Android application we developed. Our measurement and analysis suggest that on-device inference can cost up to two orders of magnitude greater response time and energy when compared to cloud-based inference, and that loading model and computing probability are two performance bottlenecks for on-device deep inferences.Comment: Accepted at The IEEE International Conference on Cloud Engineering (IC2E) conference 201

    Automatic best wireless network selection based on key performance indicators

    Get PDF
    Introducing cognitive mechanisms at the application layer may lead to the possibility of an automatic selection of the wireless network that can guarantee best perceived experience by the final user. This chapter investigates this approach based on the concept of Quality of Experience (QoE), by introducing the use of application layer parameters, namely Key Performance Indicators (KPIs). KPIs are defined for different traffic types based on experimental data. A model for an ap- plication layer cognitive engine is presented, whose goal is to identify and select, based on KPIs, the best wireless network among available ones. An experimenta- tion for the VoIP case, that foresees the use of the One-way end-to-end delay (OED) and the Mean Opinion Score (MOS) as KPIs is presented. This first implementation of the cognitive engine selects the network that, in that specific instant, offers the best QoE based on real captured data. To our knowledge, this is the first example of a cognitive engine that achieves best QoE in a context of heterogeneous wireless networks

    Using SWE Standards for Ubiquitous Environmental Sensing: A Performance Analysis

    Get PDF
    Although smartphone applications represent the most typical data consumer tool from the citizen perspective in environmental applications, they can also be used for in-situ data collection and production in varied scenarios, such as geological sciences and biodiversity. The use of standard protocols, such as SWE, to exchange information between smartphones and sensor infrastructures brings benefits such as interoperability and scalability, but their reliance on XML is a potential problem when large volumes of data are transferred, due to limited bandwidth and processing capabilities on mobile phones. In this article we present a performance analysis about the use of SWE standards in smartphone applications to consume and produce environmental sensor data, analysing to what extent the performance problems related to XML can be alleviated by using alternative uncompressed and compressed formats

    Analysis of Smartphone Traffic

    Get PDF
    Smartphone reconnaissance, the first step to launch security attacks on a target smartphone, enables an adversary to tailor attacks by exploiting the known vulnerabilities of the target system. We investigate smartphone OS identification with encrypted traffic in this paper. Four identification algorithms based on the spectralanalysis of the encrypted traffic are proposed. The identification algorithms are designed for high identification accuracy by removing noise frequency components and for high efficiency in terms of computation complexity. We evaluate the identification algorithms with smartphone traffic collected over three months. The experimental results show that the algorithms can identify the smartphone OS accurately. The identification accuracy can reach 100 with only 30 seconds of smartphone traffi

    Analysis of Smartphone Traffic

    Get PDF
    Smartphone reconnaissance, the first step to launch security attacks on a target smartphone, enables an adversary to tailor attacks by exploiting the known vulnerabilities of the target system. We investigate smartphone OS identification with encrypted traffic in this paper. Four identification algorithms based on the spectralanalysis of the encrypted traffic are proposed. The identification algorithms are designed for high identification accuracy by removing noise frequency components and for high efficiency in terms of computation complexity. We evaluate the identification algorithms with smartphone traffic collected over three months. The experimental results show that the algorithms can identify the smartphone OS accurately. The identification accuracy can reach 100 with only 30 seconds of smartphone traffi

    A Survey of Performance Optimization for Mobile Applications

    Get PDF
    Nowadays there is a mobile application for almost everything a user may think of, ranging from paying bills and gathering information to playing games and watching movies. In order to ensure user satisfaction and success of applications, it is important to provide high performant applications. This is particularly important for resource constraint systems such as mobile devices. Thereby, non-functional performance characteristics, such as energy and memory consumption, play an important role for user satisfaction. This paper provides a comprehensive survey of non-functional performance optimization for Android applications. We collected 155 unique publications, published between 2008 and 2020, that focus on the optimization of non-functional performance of mobile applications. We target our search at four performance characteristics, in particular: responsiveness, launch time, memory and energy consumption. For each performance characteristic, we categorize optimization approaches based on the method used in the corresponding publications. Furthermore, we identify research gaps in the literature for future work
    • ā€¦
    corecore