scispace - formally typeset
Search or ask a question
Author

Kevin Chin

Bio: Kevin Chin is an academic researcher from Microsoft. The author has contributed to research in topics: Cellular network & Interface (computing). The author has an hindex of 6, co-authored 7 publications receiving 459 citations.

Papers
More filters
Proceedings ArticleDOI
13 Jun 2007
TL;DR: Cell2Notify is a practical and deployable energy management architecture that leverages the cellular radio on a smart phone to implement wakeup for the high-energy consumption Wi-Fi radio and can extend the battery lifetime of VoIP overWi-Fi enabled smart phones by a factor of 1.4.
Abstract: IP based telephony is rapidly gaining acceptance over traditional means of voice communication. Wireless LANs are also becoming ubiquitous due to their inherent ease of deployment and decreasing costs. In enterpriseWi-Fi environments, VoIP is a compelling application for devices such as smart phones with multiple wireless interfaces. However, the high energy consumption of Wi-Fi interfaces, especially when a device is idle,presents a significant barrier to the widespread adoption of VoIP over Wi-Fi.To address this issue, we present Cell2Notify, a practical and deployable energy management architecture that leverages the cellular radio on a smart phone to implement wakeup for the high-energy consumption Wi-Fi radio. We present detailed measurements of energy consumption on smart phone devices, and we show that Cell2Notify, can extend the battery lifetime of VoIPover Wi-Fi enabled smart phones by a factor of 1.7 to 6.4.

251 citations

Patent
Paramvir Bahl1, Ranveer Chandra1, Kevin Chin1, Alastair Wolman1, Yuvraj Agarwal1 
26 Dec 2007
TL;DR: In this paper, the authors proposed a technique for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface.
Abstract: Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged. When the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is enabled if the device answers the wake up call and the Wi-Fi interface is available. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point.

128 citations

Patent
09 Nov 2010
TL;DR: In this paper, the authors define and apply policies to manage data traffic including data transmitted and/or received by each of a plurality of applications executing on a computing device, and apply these policies to prevent each application from exceeding a corresponding data usage limit defined by the policies.
Abstract: Defining and applying policies to manage data traffic including data transmitted and/or received by each of a plurality of applications executing on a computing device. The data traffic is monitored per application and attributes are defined for the monitored data traffic to enable the user to evaluate the data traffic for each application. Usage patterns are determined based on the monitored data traffic and the attributes to create one or more policies. The policies are applied to prevent each application from exceeding a corresponding data usage limit defined by the policies.

49 citations

Patent
06 Apr 2012
TL;DR: In this article, a video processing system 300 may apply a rolling shutter effect correction filter to an initial version of a video data set to correct skew and wobble using a central processing unit 220 and a graphical processing unit 230.
Abstract: In one embodiment, a video processing system 300 may filter a video data set to correct skew and wobble using a central processing unit 220 and a graphical processing unit 230 . The video processing system 300 may apply a rolling shutter effect correction filter to an initial version of a video data set. The video processing system 300 may simultaneously apply a video stabilization filter to the initial version to produce a final version video data set.

15 citations

Patent
14 Jun 2013
TL;DR: In this paper, the authors present a system for securely obtaining memory content after a device malfunction by using a private key matching a public key used to encrypt the memory content, which can be used to decrypt the encrypted memory content.
Abstract: One or more techniques and/or systems are provided for securely obtaining memory content after a device malfunction. For example, applications, components, and/or an operating system of a device may maintain information within volatile memory in a secure manner (e.g., using encryption). When the device malfunctions, such information may be useful for diagnosing what caused the malfunction. Accordingly, memory content within volatile memory may be securely retrieved, encrypted, and/or stored before such memory content is flushed/removed from volatile memory. For example, a warm reset is performed to initially reboot the device without removing memory content from volatile memory. The memory content may be retrieved and encrypted to create encrypted memory content that may be stored within nonvolatile memory for later access. After a second reboot, device malfunction information may be obtained by decrypting the encrypted memory content using a private key matching a public key used to encrypt the memory content.

10 citations


Cited by
More filters
Proceedings ArticleDOI
04 Nov 2009
TL;DR: TailEnder is developed, a protocol that reduces energy consumption of common mobile applications and aggressively prefetches several times more data and improves user-specified response times while consuming less energy.
Abstract: In this paper, we present a measurement study of the energy consumption characteristics of three widespread mobile networking technologies: 3G, GSM, and WiFi. We find that 3G and GSM incur a high tail energy overhead because of lingering in high power states after completing a transfer. Based on these measurements, we develop a model for the energy consumed by network activity for each technology.Using this model, we develop TailEnder, a protocol that reduces energy consumption of common mobile applications. For applications that can tolerate a small delay such as e-mail, TailEnder schedules transfers so as to minimize the cumulative energy consumed meeting user-specified deadlines. We show that the TailEnder scheduling algorithm is within a factor 2x of the optimal and show that any online algorithm can at best be within a factor 1.62x of the optimal. For applications like web search that can benefit from prefetching, TailEnder aggressively prefetches several times more data and improves user-specified response times while consuming less energy. We evaluate the benefits of TailEnder for three different case study applications - email, news feeds, and web search - based on real user logs and show significant reduction in energy consumption in each case. Experiments conducted on the mobile phone show that TailEnder can download 60% more news feed updates and download search results for more than 50% of web queries, compared to using the default policy.

1,239 citations

Proceedings Article
16 Apr 2008
TL;DR: It is shown that even simple schemes for sleeping or rate-adaptation can offer substantial savings and that both sleeping and rate adaptation are valuable depending (primarily) on the power profile of network equipment and the utilization of the network itself.
Abstract: We present the design and evaluation of two forms of power management schemes that reduce the energy consumption of networks. The first is based on putting network components to sleep during idle times, reducing energy consumed in the absence of packets. The second is based on adapting the rate of network operation to the offered workload, reducing the energy consumed when actively processing packets. For real-world traffic workloads and topologies and using power constants drawn from existing network equipment, we show that even simple schemes for sleeping or rate-adaptation can offer substantial savings. For instance, our practical algorithms stand to halve energy consumption for lightly utilized networks (10-20%). We show that these savings approach the maximum achievable by any algorithms using the same power management primitives. Moreover this energy can be saved without noticeably increasing loss and with a small and controlled increase in latency (<10ms). Finally, we show that both sleeping and rate adaptation are valuable depending (primarily) on the power profile of network equipment and the utilization of the network itself.

726 citations

Proceedings ArticleDOI
10 Apr 2012
TL;DR: Bundles are proposed, a new accounting presentation of app I/O energy, which helps the developer to quickly understand and optimize the energy drain of her app.
Abstract: Where is the energy spent inside my app? Despite the immense popularity of smartphones and the fact that energy is the most crucial aspect in smartphone programming, the answer to the above question remains elusive. This paper first presents eprof, the first fine-grained energy profiler for smartphone apps. Compared to profiling the runtime of applications running on conventional computers, profiling energy consumption of applications running on smartphones faces a unique challenge, asynchronous power behavior, where the effect on a component's power state due to a program entity lasts beyond the end of that program entity. We present the design, implementation and evaluation of eprof on two mobile OSes, Android and Windows Mobile.We then present an in-depth case study, the first of its kind, of six popular smartphones apps (including Angry-Birds, Facebook and Browser). Eprof sheds lights on internal energy dissipation of these apps and exposes surprising findings like 65%-75% of energy in free apps is spent in third-party advertisement modules. Eprof also reveals several "wakelock bugs", a family of "energy bugs" in smartphone apps, and effectively pinpoints their location in the source code. The case study highlights the fact that most of the energy in smartphone apps is spent in I/O, and I/O events are clustered, often due to a few routines. Thismotivates us to propose bundles, a new accounting presentation of app I/O energy, which helps the developer to quickly understand and optimize the energy drain of her app. Using the bundle presentation, we reduced the energy consumption of four apps by 20% to 65%.

701 citations

Patent
15 Nov 2012
TL;DR: In this paper, the authors propose a method comprising providing a plurality of links to end-user devices communicatively coupled to a network system, a particular link of the plurality supporting control-plane communications between the network system and a particular user over one or more wireless access networks, the message comprising payload for delivery to the particular user and an identifier identifying a particular device agent on the particular enduser device.
Abstract: A method comprising providing a plurality of links to a plurality of end-user devices communicatively coupled to a network system, a particular link of the plurality of links supporting control-plane communications between the network system and a particular end-user device of the plurality of end-user devices over one or more wireless access networks; receiving a message from a server communicatively coupled to the network system, the message comprising payload for delivery to the particular end-user device; generating an encrypted message comprising the payload and an identifier identifying a particular device agent of a plurality of device agents on the particular end-user device, the identifier configured to assist in delivering at least a portion of the payload to the particular device agent on the particular end-user device; and sending the encrypted message to the particular end-user device over the particular link.

483 citations

Patent
23 Jan 2013
TL;DR: In this paper, the authors present methods, systems, and apparatuses to enable subscribers of mobile wireless communication devices to view, research, select and customize service plans; to create and manage device groups, share and set permission controls for service plans among devices in device groups; to manage communication services through graphical user interfaces; to sponsor and promote service plans.
Abstract: Disclosed herein are methods, systems, and apparatuses to enable subscribers of mobile wireless communication devices to view, research, select and customize service plans; to create and manage device groups, share and set permission controls for service plans among devices in device groups; to manage communication services through graphical user interfaces; to sponsor and promote service plans; and to design, manage, and control communication services through application programming interfaces.

428 citations