Proceedings ArticleDOI
Carat: collaborative energy diagnosis for mobile devices
TLDR
During a deployment to a community of more than 500,000 devices, Carat diagnosed thousands of energy anomalies in the wild and increased a user's battery life by 11% after 10 days (compared with 1.9% for the control group).Abstract:
We aim to detect and diagnose energy anomalies, abnormally heavy battery use. This paper describes a collaborative black-box method, and an implementation called Carat, for diagnosing anomalies on mobile devices. A client app sends intermittent, coarse-grained measurements to a server, which correlates higher expected energy use with client properties like the running apps, device model, and operating system. The analysis quantifies the error and confidence associated with a diagnosis, suggests actions the user could take to improve battery life, and projects the amount of improvement. During a deployment to a community of more than 500,000 devices, Carat diagnosed thousands of energy anomalies in the wild. Carat detected all synthetically injected anomalies, produced no known instances of false positives, projected the battery impact of anomalies with 95% accuracy, and, on average, increased a user's battery life by 11% after 10 days (compared with 1.9% for the control group).read more
Citations
More filters
Proceedings ArticleDOI
Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau,Úlfar Erlingsson,Petros Maniatis,Ilya Mironov,Ananth Raghunathan,David Lie,Mitch Rudominer,Usharsee Kode,Julien Tinnes,Bernhard Seefeld +9 more
TL;DR: Encode, Shuffle, Analyze (ESA) as discussed by the authors is a principled system architecture for performing large-scale monitoring of computer users' software activities with high utility while also protecting user privacy.
Journal ArticleDOI
Mobile code offloading: from concept to practice and beyond
TL;DR: This article identifies the key limitations for code offloading in practice and then proposes solutions to mitigate these limitations, and develops a generic architecture to evaluate the proposed solutions.
Proceedings ArticleDOI
Prochlo: Strong Privacy for Analytics in the Crowd
Andrea Bittau,Úlfar Erlingsson,Petros Maniatis,Ilya Mironov,Ananth Raghunathan,David Lie,Mitch Rudominer,Usharsee Kode,Julien Tinnes,Bernhard Seefeld +9 more
TL;DR: The Encode, Shuffle, Analyze (ESA) architecture as discussed by the authors is a principled system architecture for large-scale monitoring of computer users' software activities, e.g., for application telemetry, error reporting, or demographic profiling.
Journal ArticleDOI
Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data
TL;DR: To meet the performance requirements of IoT enabled services, context-based offloading can play a crucial role, according to the study of drawn results and limitations of the existing frameworks.
Journal ArticleDOI
Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices
TL;DR: This article introduces the terminologies and describes the power modeling and measurement methodologies applied in model-based energy profiling, classify the profilers according to their implementation and deployment strategies, and compare the profiling capabilities and performance between different types.
References
More filters
Proceedings ArticleDOI
Pinpoint: problem determination in large, dynamic Internet services
TL;DR: This work presents a dynamic analysis methodology that automates problem determination in these environments by coarse-grained tagging of numerous real client requests as they travel through the system and using data mining techniques to correlate the believed failures and successes of these requests to determine which components are most likely to be at fault.
Journal ArticleDOI
Scalable statistical bug isolation
TL;DR: A statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs and identifies predictors that are associated with individual bugs that reveal both the circumstances under which bugs occur as well as the frequencies of failure modes, making it easier to prioritize debugging efforts.
Proceedings ArticleDOI
Detecting large-scale system problems by mining console logs
TL;DR: In this article, a general methodology to mine this rich source of information to automatically detect system runtime problems was proposed, combining source code analysis with information retrieval to create composite features and then analyze these features using machine learning to detect operational problems.
Proceedings ArticleDOI
Bugs as deviant behavior: a general approach to inferring errors in systems code
TL;DR: Six checkers are developed that extract beliefs by tailoring rule "templates" to a system --- for example, finding all functions that fit the rule template "a must be paired with b."
Proceedings Article
Detecting Large-Scale System Problems by Mining Console Logs
TL;DR: This work first parse console logs by combining source code analysis with information retrieval to create composite features, and then analyzes these features using machine learning to detect operational problems to automatically detect system runtime problems.