{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T00:27:22Z","timestamp":1705969642767},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T00:00:00Z","timestamp":1440547200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10916-015-0320-5","type":"journal-article","created":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T08:10:09Z","timestamp":1440490209000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Machine Learning Method for Power Prediction on the Mobile Devices"],"prefix":"10.1007","volume":"39","author":[{"given":"Da-Ren","family":"Chen","sequence":"first","affiliation":[]},{"given":"You-Shyang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lin-Chih","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ming-Yang","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Kai-Feng","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,26]]},"reference":[{"issue":"1","key":"320_CR1","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.adhoc.2012.07.007","volume":"11","author":"W Dong","year":"2013","unstructured":"Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473\u2013489, 2013.","journal-title":"Ad Hoc Networks"},{"key":"320_CR2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.adhoc.2012.04.013","volume":"11.1","author":"RS Alonso","year":"2013","unstructured":"Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151\u2013166, 2013.","journal-title":"Ad Hoc Networks"},{"key":"320_CR3","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.adhoc.2014.06.009","volume":"24","author":"M Severini","year":"2015","unstructured":"Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73\u201391, 2015.","journal-title":"Ad Hoc Networks"},{"key":"320_CR4","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.adhoc.2011.12.002","volume":"12","author":"KL Huang","year":"2014","unstructured":"Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130\u2013149, 2014.","journal-title":"Ad Hoc Networks"},{"key":"320_CR5","doi-asserted-by":"crossref","first-page":"3460","DOI":"10.1016\/j.comcom.2008.05.036","volume":"31.14","author":"S Spanos","year":"2008","unstructured":"Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460\u20133468, 2008.","journal-title":"Computer Communications"},{"key":"320_CR6","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.adhoc.2014.07.011","volume":"25","author":"S Trifunovic","year":"2015","unstructured":"Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346\u2013358, 2015.","journal-title":"Ad Hoc Networks"},{"key":"320_CR7","doi-asserted-by":"crossref","unstructured":"Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2\u201310. IEEE, 1999. doi: 10.1109\/MCSA.1999.749272 .","DOI":"10.1109\/MCSA.1999.749272"},{"issue":"9","key":"320_CR8","doi-asserted-by":"crossref","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., and Huang, L., A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications 37(9):6225\u20136232, 2010. doi: 10.1016\/j.eswa.2010.02.102 .","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"320_CR9","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSMCB.2005.860136","volume":"36","author":"S-J Han","year":"2005","unstructured":"Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559\u2013570, 2005. doi: 10.1109\/TSMCB.2005.860136 .","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"key":"320_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483\u2013490. Springer Berlin Heidelberg, 2005. doi: 10.1007\/11527503_58 .","DOI":"10.1007\/11527503_58"},{"key":"320_CR11","unstructured":"Full\u00e9r, R., Neural fuzzy systems. 1995: 13, 1995."},{"key":"320_CR12","unstructured":"Mashable GlobalWebIndex, The 10 most frequently used smartphone apps http:\/\/mashable.com\/2013\/08\/05\/most-used-smartphone-apps\/ , Q2, 2003."},{"key":"320_CR13","first-page":"771","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771\u2013780, 1999.","journal-title":"Journal-Japanese Society for Artificial Intelligence"},{"key":"320_CR14","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120\u2013128. IEEE, 1996. doi: 10.1109\/SECPRI.1996.502675 .","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"320_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN\u201902 2: 1708\u20131703. IEEE, 2002. doi: 10.1109\/IJCNN.2002.1007775 .","DOI":"10.1109\/IJCNN.2002.1007775"},{"key":"320_CR16","unstructured":"Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master\u2019s thesis, National Taichung University of Science and Technology."},{"key":"320_CR17","doi-asserted-by":"crossref","unstructured":"Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407\u2013408. ACM. doi: 10.1145\/1644038.1644125","DOI":"10.1145\/1644038.1644125"},{"key":"320_CR18","doi-asserted-by":"crossref","unstructured":"Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83\u201394. ACM, 2000. doi: 10.1145\/342001.339657 .","DOI":"10.1145\/342001.339657"},{"key":"320_CR19","doi-asserted-by":"crossref","unstructured":"Burger, D., Austin, T.M., The SimpleScalar tool set, version 2.0. ACM SIGARCH Computer Architecture News 25:(3) 13\u201325. ACM, 1997. doi: 10.1145\/268806.268810 .","DOI":"10.1145\/268806.268810"},{"key":"320_CR20","doi-asserted-by":"crossref","unstructured":"Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE\/ACM\/IFIP international conference on Hardware\/software codesign and system synthesis 353\u2013362. ACM, 2012. doi: 10.1145\/2380445.2380502 .","DOI":"10.1145\/2380445.2380502"},{"key":"320_CR21","doi-asserted-by":"crossref","unstructured":"Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810\u2013813. ACM, 2000. doi: 10.1145\/337292.337786 .","DOI":"10.1145\/337292.337786"},{"key":"320_CR22","doi-asserted-by":"crossref","unstructured":"Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS\u201908. Euromicro Conference on 181\u2013190. IEEE, 2008. doi: 10.1109\/ECRTS.2008.28 .","DOI":"10.1109\/ECRTS.2008.28"},{"issue":"4","key":"320_CR23","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/92.335012","volume":"2","author":"V Tiwari","year":"1994","unstructured":"Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437\u2013445, 1994. doi: 10.1109\/92.335012 .","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"issue":"8","key":"320_CR24","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1016\/j.jss.2012.03.027","volume":"85","author":"S-L Tsao","year":"2012","unstructured":"Tsao, S.-L., and Chen, J. J., SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. Journal of Systems and Software 85(8):1757\u20131769, 2012. doi: 10.1016\/j.jss.2012.03.027 .","journal-title":"Journal of Systems and Software"},{"key":"320_CR25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.comcom.2014.03.026","volume":"56","author":"A Tongaonkar","year":"2015","unstructured":"Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35\u201346, 2015.","journal-title":"Computer Communications"},{"issue":"6","key":"320_CR26","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1016\/j.compeleceng.2011.07.001","volume":"37","author":"K Salah","year":"2011","unstructured":"Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I\/O. Computers & Electrical Engineering 37(6):1090\u20131105, 2011.","journal-title":"Computers & Electrical Engineering"},{"issue":"4","key":"320_CR27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.compeleceng.2011.04.012","volume":"37","author":"FG Montoya","year":"2011","unstructured":"Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU\/Linux. Computers & Electrical Engineering 37(4):541\u2013549, 2011.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"320_CR28","first-page":"211","volume":"7","author":"T Krenick","year":"2009","unstructured":"Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211\u2013214, 2009.","journal-title":"Annals of Faculty of Engineering Hunedoara Journal of Engineering"},{"key":"320_CR29","unstructured":"Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123."},{"key":"320_CR30","unstructured":"Love, R., Linux kernel development. Pearson Education, 2010."},{"key":"320_CR31","author":"D-R Chen","year":"2015","unstructured":"Chen, D.-R., and Chiang, K.-F., Cloud-based power estimation and power-aware scheduling for embedded systems. Accepted, Computers & Electrical Engineering, 2015. doi: 10.1016\/j.compeleceng.2015.06.004 .","journal-title":"Accepted, Computers & Electrical Engineering"},{"key":"320_CR32","doi-asserted-by":"crossref","unstructured":"Yuan, F., Huanrui, W., Ge Y., Web users\u2019 classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 1030\u20131036. Springer Berlin Heidelberg,2004. doi: 10.1007\/978-3-540-30132-5_139 .","DOI":"10.1007\/978-3-540-30132-5_139"},{"key":"320_CR33","unstructured":"Lee, W., Salvatore, S.J., Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, 1998. https:\/\/www.usenix.org\/legacy\/publications \/library\/proceedings\/sec98\/full_papers\/full_papers\/lee\/lee_html\/lee.html ."},{"key":"320_CR34","doi-asserted-by":"crossref","unstructured":"Carroll, A., Heiser, G., The systems hacker\u2019s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013.","DOI":"10.1145\/2500727.2500734"},{"issue":"1","key":"320_CR35","first-page":"211","volume":"7","author":"T Krenick","year":"2009","unstructured":"Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211\u2013214, 2009.","journal-title":"Annals of Faculty of Engineering Hunedoara"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0320-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0320-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0320-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:50:58Z","timestamp":1559465458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0320-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,26]]},"references-count":35,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["320"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0320-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,26]]},"article-number":"126"}}