scispace - formally typeset
Proceedings ArticleDOI

Smartphones vs. laptops: comparing web browsing behavior and the implications for caching

11 Jun 2012-Vol. 40, Iss: 1, pp 423-424

...read more

Content maybe subject to copyright    Report


Citations
More filters
Journal ArticleDOI

[...]

TL;DR: In this paper, the authors present an insight into various micro-location enabling technologies and services and discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart buildings.
Abstract: Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing is the process of creating a virtual fence around a so-called Point of Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart buildings. We argue that micro-location based location-aware solutions can play a significant role in facilitating the tenants of an IoT equipped smart building. Also, such advanced technologies will enable the smart building control system through minimal actions performed by the tenants. We also highlight the existing and envisioned services to be provided by using micro-location enabling technologies. We describe the challenges and propose some potential solutions such that micro-location enabling technologies and services are thoroughly integrated with IoT equipped smart building.

137 citations

Journal ArticleDOI

[...]

TL;DR: It is argued that micro-location-based location aware solutions can play a significant role in facilitating the tenants of an IoT-equipped smart building and will enable the smart building control system through minimal actions performed by the tenants.
Abstract: Microlocation is the process of locating any entity with a very high accuracy (possibly in centimeters), whereas geofencing is the process of creating a virtual fence around a point of interest (PoI). In this paper, we present an insight into various microlocation enabling technologies, techniques, and services. We also discuss how they can accelerate the incorporation of Internet of Things (IoT) in smart buildings. We argue that micro-location-based location aware solutions can play a significant role in facilitating the tenants of an IoT-equipped smart building. Also, such advanced technologies will enable the smart building control system through minimal actions performed by the tenants. We also highlight the existing and envisioned services to be provided by using microlocation enabling technologies. We describe the challenges and propose some potential solutions, such that microlocation enabling technologies and services are thoroughly integrated with IoT-equipped smart building.

124 citations


Cites background from "Smartphones vs. laptops: comparing ..."

  • [...]

Proceedings ArticleDOI

[...]

08 Jul 2014
TL;DR: CDroid makes mobile cloud offloading more practical enabling offloading of lightweight jobs and communication intensive apps.
Abstract: Mobile-cloud offloading mechanisms delegate heavy mobile computation to the cloud. In real life use, the energy tradeoff of computing the task locally or sending the input data and the code of the task to the cloud is often negative, especially with popular communication intensive jobs like social- networking, gaming, and emailing. We design and build a working implementation of CDroid, a system that tightly couples the device OS to its cloud counterpart. The cloud-side handles data traffic through the device efficiently and, at the same time, caches code and data optimally for possible future offloading. In our system, when offloading decision takes place, input and code are likely to be already on the cloud. CDroid makes mobile cloud offloading more practical enabling offloading of lightweight jobs and communication intensive apps. Our experiments with real users in everyday life show excellent results in terms of energy savings and user experience.

49 citations

Proceedings ArticleDOI

[...]

18 May 2015
TL;DR: This paper builds a new cache analysis model and study the upper bound of how high percentage of resources could potentially be cached and how effective the caching works in practice, and identifies two major problems -- Redundant Transfer and Miscached Resource, which lead to unsatisfactory cache performance.
Abstract: The Web browser is a killer app on mobile devices such as smartphones. However, the user experience of mobile Web browsing is undesirable because of the slow resource loading. To improve the performance of Web resource loading, caching has been adopted as a key mechanism. However, the existing passive measurement studies cannot comprehensively characterize the performance of mobile Web caching. For example, most of these studies mainly focus on client-side implementations but not server-side configurations, suffer from biased user behaviors, and fail to study "miscached" resources. To address these issues, in this paper, we present a proactive approach for a comprehensive measurement study on mobile Web cache performance. The key idea of our approach is to proactively crawl resources from hundreds of websites periodically with a fine-grained time interval. Thus, we are able to uncover the resource update history and cache configurations at the server side, and analyze the cache performance in various time granularities. Based on our collected data, we build a new cache analysis model and study the upper bound of how high percentage of resources could potentially be cached and how effective the caching works in practice. We report detailed analysis results of different websites and various types of Web resources, and identify the problems caused by unsatisfactory cache performance. In particular, we identify two major problems -- Redundant Transfer and Miscached Resource, which lead to unsatisfactory cache performance. We investigate three main root causes: Same Content, Heuristic Expiration, and Conservative Expiration Time, and discuss what mobile Web developers can do to mitigate those problems.

36 citations

Proceedings ArticleDOI

[...]

08 Sep 2013
TL;DR: Evaluation on 10 top ranked Android apps shows that the CacheKeeper prototype can save 42% networks traffic with real user browsing behaviors and increase web accessing speed by 2x under real 3G settings, and experiments show that the prototype incurs negligible overhead on cache misses.
Abstract: Efficient web caching in mobile apps eliminates unnecessary network traffic, reduces web accessing latency, and improves smartphone battery life. However, recent research has indicated that current mobile apps suffer from poor implementations of web caching. In this work, we first conducted a comprehensive survey of over 1000 Android apps to identify how different types of mobile apps perform in web caching. Based on our analysis, we designed CacheKeeper, an OS web caching service transparent to mobile apps for smartphones. CacheKeeper can not only effectively reduce overhead caused by poor web caching of mobile apps, but also utilizes cross-app caching opportunities in smartphones. Furthermore, CacheKeeper is backward compatible, meaning that existing apps can take advantage of CacheKeeper without any modifications. We have implemented a prototype of CacheKeeper in Linux kernel. Evaluation on 10 top ranked Android apps shows that our CacheKeeper prototype can save 42% networks traffic with real user browsing behaviors and increase web accessing speed by 2x under real 3G settings. Experiments also show that our prototype incurs negligible overhead in most aspects on cache misses.

36 citations


Cites background from "Smartphones vs. laptops: comparing ..."

  • [...]

  • [...]


References
More filters
Proceedings Article

[...]

01 Jul 1998
TL;DR: Two new algorithms for solving thii problem that are fundamentally different from the known algorithms are presented and empirical evaluation shows that these algorithms outperform theknown algorithms by factors ranging from three for small problems to more than an order of magnitude for large problems.
Abstract: We consider the problem of discovering association rules between items in a large database of sales transactions. We present two new algorithms for solving thii problem that are fundamentally different from the known algorithms. Empirical evaluation shows that these algorithms outperform the known algorithms by factors ranging from three for small problems to more than an order of magnitude for large problems. We also show how the best features of the two proposed algorithms can be combined into a hybrid algorithm, called AprioriHybrid. Scale-up experiments show that AprioriHybrid scales linearly with the number of transactions. AprioriHybrid also has excellent scale-up properties with respect to the transaction size and the number of items in the database.

10,858 citations

Proceedings ArticleDOI

[...]

21 Mar 1999
TL;DR: This paper investigates the page request distribution seen by Web proxy caches using traces from a variety of sources and considers a simple model where the Web accesses are independent and the reference probability of the documents follows a Zipf-like distribution, suggesting that the various observed properties of hit-ratios and temporal locality are indeed inherent to Web accesse observed by proxies.
Abstract: This paper addresses two unresolved issues about Web caching. The first issue is whether Web requests from a fixed user community are distributed according to Zipf's (1929) law. The second issue relates to a number of studies on the characteristics of Web proxy traces, which have shown that the hit-ratios and temporal locality of the traces exhibit certain asymptotic properties that are uniform across the different sets of the traces. In particular, the question is whether these properties are inherent to Web accesses or whether they are simply an artifact of the traces. An answer to these unresolved issues will facilitate both Web cache resource planning and cache hierarchy design. We show that the answers to the two questions are related. We first investigate the page request distribution seen by Web proxy caches using traces from a variety of sources. We find that the distribution does not follow Zipf's law precisely, but instead follows a Zipf-like distribution with the exponent varying from trace to trace. Furthermore, we find that there is only (i) a weak correlation between the access frequency of a Web page and its size and (ii) a weak correlation between access frequency and its rate of change. We then consider a simple model where the Web accesses are independent and the reference probability of the documents follows a Zipf-like distribution. We find that the model yields asymptotic behaviour that are consistent with the experimental observations, suggesting that the various observed properties of hit-ratios and temporal locality are indeed inherent to Web accesses observed by proxies. Finally, we revisit Web cache replacement algorithms and show that the algorithm that is suggested by this simple model performs best on real trace data. The results indicate that while page requests do indeed reveal short-term correlations and other structures, a simple model for an independent request stream following a Zipf-like distribution is sufficient to capture certain asymptotic properties observed at Web proxies.

3,418 citations


"Smartphones vs. laptops: comparing ..." refers background in this paper

  • [...]

Proceedings ArticleDOI

[...]

15 Jun 2010
TL;DR: A comprehensive study of smartphone use finds that qualitative similarities exist among users that facilitate the task of learning user behavior and demonstrates the value of adapting to user behavior in the context of a mechanism to predict future energy drain.
Abstract: Using detailed traces from 255 users, we conduct a comprehensive study of smartphone use. We characterize intentional user activities -- interactions with the device and the applications used -- and the impact of those activities on network and energy usage. We find immense diversity among users. Along all aspects that we study, users differ by one or more orders of magnitude. For instance, the average number of interactions per day varies from 10 to 200, and the average amount of data received per day varies from 1 to 1000 MB. This level of diversity suggests that mechanisms to improve user experience or energy consumption will be more effective if they learn and adapt to user behavior. We find that qualitative similarities exist among users that facilitate the task of learning user behavior. For instance, the relative application popularity for can be modeled using an exponential distribution, with different distribution parameters for different users. We demonstrate the value of adapting to user behavior in the context of a mechanism to predict future energy drain. The 90th percentile error with adaptation is less than half compared to predictions based on average behavior across users.

875 citations


"Smartphones vs. laptops: comparing ..." refers background in this paper

  • [...]

  • [...]

  • [...]

Proceedings ArticleDOI

[...]

28 Aug 1996
TL;DR: Surprisingly, the criteria used by several proxy-server removal policies are among the worst performing criteria in the authors' simulation; instead, replacing documents based on size maximizes hit rate in each of the studied workloads.
Abstract: World-Wide Web proxy servers that cache documents can potentially reduce three quantities: the number of requests that reach popular servers, the volume of network traffic resulting from document requests, and the latency that an end-user experiences in retrieving a document. This paper examines the first two using the measures of cache hit rate and weighted hit rate (or fraction of client-requested bytes returned by the proxy). A client request for an uncached document may cause the removal of one or more cached documents. Variable document sizes and types allow a rich variety of policies to select a document for removal, in contrast to policies for CPU caches or demand paging, that manage homogeneous objects. We present a taxonomy of removal policies. Through trace-driven simulation, we determine the maximum possible hit rate and weighted hit rate that a cache could ever achieve, and the removal policy that maximizes hit rate and weighted hit rate. The experiments use five traces of 37 to 185 days of client URL requests. Surprisingly, the criteria used by several proxy-server removal policies (LRU, Hyper-G, and a proposal by Pitkow and Recker) are among the worst performing criteria in our simulation; instead, replacing documents based on size maximizes hit rate in each of the studied workloads.

474 citations


"Smartphones vs. laptops: comparing ..." refers background in this paper

  • [...]

Proceedings ArticleDOI

[...]

01 Nov 2010
TL;DR: By studying the interaction between smartphone traffic and the radio power management policy, it is found that the power consumption of the radio can be reduced by 35% with minimal impact on the performance of packet exchanges.
Abstract: Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, media, and maps contribute roughly 10%. We also find that the overhead of lower layer protocols is high because of small transfer sizes. For half of the transfers that use transport-level security, header bytes correspond to 40% of the total. We show that while packet loss is the main factor that limits the throughput of smartphone traffic, larger send buffers at Internet servers can improve the throughput of a quarter of the transfers. Finally, by studying the interaction between smartphone traffic and the radio power management policy, we find that the power consumption of the radio can be reduced by 35% with minimal impact on the performance of packet exchanges.

429 citations


"Smartphones vs. laptops: comparing ..." refers background in this paper

  • [...]

  • [...]



Trending Questions (2)
How to clear browser cache in Robot Framework?

We also show that laptop devices have more intelligent browser caching capabilities.

How do I clear the cache on my Internet browser?

We investigate the impact of an additional browser cache, and demonstrate that a 10MB browser cache that is able to handle partial downloads in smartphones would be enough to handle the majority of the savings.