{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T06:31:26Z","timestamp":1725085886162},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iwqos.2015.7404721","type":"proceedings-article","created":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T04:06:12Z","timestamp":1455249972000},"source":"Crossref","is-referenced-by-count":15,"title":["AndroidPerf: A cross-layer profiling system for Android applications"],"prefix":"10.1109","author":[{"given":"Lei","family":"Xue","sequence":"first","affiliation":[]},{"given":"Chenxiong","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465430"},{"key":"ref38","article-title":"Cf-bench","year":"0"},{"key":"ref33","article-title":"Speedtest.net","year":"0"},{"key":"ref32","article-title":"Design and implementation of TCP data probes for reliable and metric-rich network path monitoring","author":"luo","year":"2009","journal-title":"Proc USENIX Annual Tech Conf"},{"key":"ref31","article-title":"Network tools","year":"0"},{"key":"ref30","article-title":"iperf for android","year":"0"},{"key":"ref37","article-title":"Androstep: Android storage performance analysis tool","author":"jeong","year":"2013","journal-title":"Proceedings of the 1st European Workshop on Mobile Engineering"},{"key":"ref36","article-title":"pktgen","author":"turull","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2014.6914311"},{"key":"ref34","article-title":"Internet speed test","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594377"},{"key":"ref40","article-title":"Targeted and depth-first exploration for systematic testing of android apps","author":"azim","year":"2013","journal-title":"Proc OOPSLA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348563"},{"key":"ref12","article-title":"Pro-filing resource usage for mobile applications: a cross-layer approach","author":"qian","year":"2011","journal-title":"Proc ACM MOBISYS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663726"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636091"},{"key":"ref15","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc OSDI"},{"key":"ref16","article-title":"Droidscope: Seamlessly reconstructing OS and Dalvik semantic views for dynamic Android malware analysis","author":"yan","year":"2012","journal-title":"Proc Usenix Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"ref19","author":"ratabouil","year":"2012","journal-title":"Android Ndk Beginner's Guide"},{"key":"ref28","article-title":"Processor core register summary","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.25"},{"key":"ref27","article-title":"Kernel probes (kprobes)","author":"keniston","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623705"},{"key":"ref6","article-title":"Time-card: Controlling user-perceived delays in server-based mobile applications","author":"ravindranath","year":"2013","journal-title":"Proc SOSP"},{"key":"ref29","article-title":"Exception vectors","year":"0"},{"key":"ref5","article-title":"Appinsight: Mobile app performance monitoring in the wild","author":"ravindranath","year":"2012","journal-title":"Proc OSDI"},{"key":"ref8","article-title":"Appscope: application energy metering framework for android smartphones using kernel activity monitoring","author":"yoon","year":"2012","journal-title":"Proc USENIX ATC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168841"},{"key":"ref2","article-title":"Number of android applications","author":"appbrain","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CODES-ISSS.2013.6659020"},{"key":"ref1","article-title":"Android and ios squeeze the competition, swelling to 96% of the smartphone operating system market for both 4q 14 and cy 14","author":"corporate","year":"2015"},{"key":"ref46","article-title":"Droidbox","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2544375.2544379"},{"key":"ref22","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"USENIX ATC FREENIX Track"},{"key":"ref21","article-title":"Arm exceptions","year":"2009"},{"key":"ref42","article-title":"Trustzone","year":"0"},{"key":"ref24","article-title":"A machine-learning approach for classifying and categorizing android sources and sinks","author":"siegfried rasthofer","year":"2014","journal-title":"Proc NDSS"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"ref23","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"2003","journal-title":"Proc NDSS"},{"key":"ref44","article-title":"Profiling with traceview and dmtracedump","year":"0"},{"key":"ref26","article-title":"strace","year":"0"},{"key":"ref43","article-title":"A closer look at android runtime (art) in android 1","author":"frumusanu","year":"0"},{"key":"ref25","article-title":"make it work, make it right, make it fast building a platform-neutral whole-system binary analysis platform","author":"henderson","year":"2012","journal-title":"Proc ACM ISSTA"}],"event":{"name":"2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)","location":"Portland, OR, USA","start":{"date-parts":[[2015,6,15]]},"end":{"date-parts":[[2015,6,16]]}},"container-title":["2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7395993\/7404688\/07404721.pdf?arnumber=7404721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:20:36Z","timestamp":1602685236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7404721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2015.7404721","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}