{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:45:29Z","timestamp":1742953529520,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811596087"},{"type":"electronic","value":"9789811596094"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9609-4_6","type":"book-chapter","created":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:03:18Z","timestamp":1604246598000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Power-Efficient Big.LITTLE Core Assignment Scheme for Task Graph Based Real-Time Smartphone Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5215-099X","authenticated-orcid":false,"given":"Se Won","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2449-8806","authenticated-orcid":false,"given":"Donghoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9783-9050","authenticated-orcid":false,"given":"Sung-Hwa","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bui, D.H., Liu, Y., Kim, H., Shin, I., Zhao, F.: Rethinking energy-performance trade-off in mobile web page loading. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 14\u201326 (2015)","DOI":"10.1145\/2789168.2790103"},{"issue":"3","key":"6_CR2","first-page":"18","volume":"8","author":"YW Chow","year":"2017","unstructured":"Chow, Y.W., Susilo, W., Phillips, J.G., Baek, J., Vlahu-Gjorgievska, E.: Video games and virtual reality as persuasive technologies for health care: an overview. JoWUA 8(3), 18\u201335 (2017)","journal-title":"JoWUA"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Dick, R.P., Rhodes, D.L., Wolf, W.: TGFF: task graphs for free. In: Proceedings of the 6th International Workshop on Hardware\/Software Codesign, CODES\/CASHE 1998, pp. 97\u2013101. IEEE (1998)","DOI":"10.1145\/278241.278309"},{"issue":"9","key":"6_CR4","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1002\/cpe.728","volume":"15","author":"JJ Dongarra","year":"2003","unstructured":"Dongarra, J.J., Luszczek, P., Petitet, A.: The LINPACK benchmark: past, present and future. Concurr. Comput. Pract. Exp. 15(9), 803\u2013820 (2003)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"2","key":"6_CR5","first-page":"22","volume":"10","author":"D Fiorino","year":"2019","unstructured":"Fiorino, D., Collotta, M., Ferrero, R.: Usability evaluation of touch gestures for mobile augmented reality applications. J. Wirel. Mob. Netw. Ubiqui. Comput. Dependable Appl. (JoWUA) 10(2), 22\u201336 (2019)","journal-title":"J. Wirel. Mob. Netw. Ubiqui. Comput. Dependable Appl. (JoWUA)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Geng, Y., Yang, Y., Cao, G.: Energy-efficient computation offloading for multicore-based mobile devices. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 46\u201354. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8485875"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Ghasemi, H.R., Karpuzcu, U.R., Kim, N.S.: Comparison of single-ISA heterogeneous versus wide dynamic range processors for mobile applications. In: 2015 33rd IEEE International Conference on Computer Design (ICCD), pp. 304\u2013310. IEEE (2015)","DOI":"10.1109\/ICCD.2015.7357118"},{"key":"6_CR8","unstructured":"Greenhalgh, P.: big.LITTLE technology: The future of mobile. ARM Limited, White Paper, p. 12 (2013)"},{"key":"6_CR9","unstructured":"Hsu, C.W., Chang, C.C., Lin, C.J., et al.: A practical guide to support vector classification (2003)"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"117324","DOI":"10.1109\/ACCESS.2020.3005235","volume":"8","author":"DH Kim","year":"2020","unstructured":"Kim, D.H., Ko, Y.B., Lim, S.H.: Energy-efficient real-time multi-core assignment scheme for asymmetric multi-core mobile devices. IEEE Access 8(1), 117324\u2013117334 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"6_CR11","first-page":"54","volume":"8","author":"IV Kotenko","year":"2018","unstructured":"Kotenko, I.V., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile internet of things security monitoring. J. Internet Serv. Inf. Secur. 8(3), 54\u201363 (2018)","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.pmcj.2015.05.005","volume":"24","author":"A Merlo","year":"2015","unstructured":"Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77\u201390 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"6_CR13","unstructured":"Monsoon Solutions Inc.: High voltage power monitor (March 2019). \nhttps:\/\/www.msoon.com"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1049\/iet-cdt.2014.0074","volume":"9","author":"EL Padoin","year":"2014","unstructured":"Padoin, E.L., Pilla, L.L., Castro, M., Boito, F.Z., Navaux, P.O.A., M\u00e9haut, J.F.: Performance\/energy trade-off in scientific computing: the case of arm big.LITTLE and Intel Sandy Bridge. IET Comput. Digit. Tech. 9(1), 27\u201335 (2014)","journal-title":"IET Comput. Digit. Tech."},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MPRV.2005.9","volume":"4","author":"JA Paradiso","year":"2005","unstructured":"Paradiso, J.A., Starner, T.: Energy scavenging for mobile and wireless electronics. IEEE Pervasive Comput. 4(1), 18\u201327 (2005)","journal-title":"IEEE Pervasive Comput."},{"key":"6_CR16","unstructured":"Park, J., et al.: Mobile phone, US Patent App. 29\/577,834, 11 April 2017"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Seo, W., Im, D., Choi, J., Huh, J.: Big or little: a study of mobile interactive applications on an asymmetric multi-core platform. In: 2015 IEEE International Symposium on Workload Characterization, pp. 1\u201311. IEEE (2015)","DOI":"10.1109\/IISWC.2015.7"},{"key":"6_CR18","unstructured":"Zhu, Y., Reddi, V.J.: High-performance and energy-efficient mobile web browsing on big\/little systems. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), pp. 13\u201324. IEEE (2013)"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9609-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:05:06Z","timestamp":1604246706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9609-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811596087","9789811596094"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9609-4_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}