{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:13:06Z","timestamp":1774627986772,"version":"3.50.1"},"reference-count":296,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ERC Advanced fellowship","award":["741278"],"award-info":[{"award-number":["741278"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/tse.2021.3071193","type":"journal-article","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T19:56:55Z","timestamp":1617739015000},"page":"2879-2904","source":"Crossref","is-referenced-by-count":64,"title":["A Survey of Performance Optimization for Mobile Applications"],"prefix":"10.1109","volume":"48","author":[{"given":"Max","family":"Hort","sequence":"first","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-3244","authenticated-orcid":false,"given":"Maria","family":"Kechagia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9146-442X","authenticated-orcid":false,"given":"Federica","family":"Sarro","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2014.5502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2360674"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.50"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2891715"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09795-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971707"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9343-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26844-6_20"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3231884.3231897"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243218.3243221"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106471"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.1"},{"key":"ref21","doi-asserted-by":"crossref","article-title":"A survey of performance optimization for mobile applications","author":"Hort","DOI":"10.1109\/TSE.2021.3071193"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-0100-8_1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"key":"ref24","first-page":"105","article-title":"Accurate online power estimation and automatic battery behavior based power model generation for smartphones","author":"Zhang","year":"2010","journal-title":"Proc 8th IEEE\/ACM\/IFIP Int. Conf. Hardware\/Softw. Codes. Syst. Synth."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EMSOFT.2015.7318276"},{"key":"ref26","first-page":"19","article-title":"Increasing memory density by using KSM","volume-title":"Proc. Linux Symp.","author":"Arcangeli"},{"key":"ref27","article-title":"Compcache: In-memory compressed swapping","author":"Gupta","year":"2009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2797022.2797023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3340496.3342761"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950299"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224306"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2693219"},{"key":"ref33","volume-title":"Characteristics of Software Quality","volume":"1","author":"Boehm","year":"1978"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1985.1662861"},{"key":"ref35","volume-title":"Software Metrics: Establishing a Company-Wide Program","author":"Grady","year":"1987"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_19"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2544375.2544380"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24403-2_27"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2011.6008591"},{"issue":"2004","key":"ref40","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"Kitchenham","journal-title":"Dept. Comput. Sci., Keele Univ., Keele, U.K., Tech. Rep. TR\/SE-0401, 2004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9607-8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.145"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213865"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435233"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2676918"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742661"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897100"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918504"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MOBS.2013.6614215"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.101"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897092"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814452"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3362125.3362150"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00077"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.13.0112.0203"},{"key":"ref59","first-page":"107","article-title":"Appinsight: Mobile app performance monitoring in the wild","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Des. Implementation","author":"Ravindranath"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2009.28"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950316"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950316"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897097"},{"key":"ref65","first-page":"297","article-title":"Mantis: Automatic performance prediction for smartphone applications","volume-title":"Proc. USENIX Conf. Annu. Tech. Conf.","author":"Kwon"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29336-8_4"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000000"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"ref70","first-page":"93","article-title":"COMET: Code offload by migrating execution transparently","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Des. Implementation","author":"Gordon"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742649"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4286"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815360"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254075"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606602"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2661694.2661695"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.46"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238197"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668030"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635903"},{"key":"ref81","first-page":"1117","article-title":"A study and toolkit for asynchronous programming in c#","volume-title":"Proc. 36th Int. Conf. Softw. Eng.","author":"Okur"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.50"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00067"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307651"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180249"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281416"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00013"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01802-2_28"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2010.5669738"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2011.6163105"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IBICA.2011.85"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494980"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2013.6623485"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.23.118"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2834395"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2448556.2448651"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2012.133"},{"key":"ref99","first-page":"303","article-title":"What are your programming languages energy-delay implications?,","volume-title":"Proc. IEEE 15th Int. Conf. Mining Softw. Repositories","author":"Georgiou"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2013.116"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307648"},{"key":"ref102","first-page":"76","article-title":"An android application launch analyzing system","volume-title":"Proc. 8th Int. Conf. Comput. Technol. Inf. Manage.","author":"Nagata"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2894755"},{"key":"ref104","first-page":"259","article-title":"FAST: Quick application launch on solid-state drives","volume-title":"Proc. 9th UNENIX Conf. File Storage Technol.","author":"Joo"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632080"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493490"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480461"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3090052"},{"key":"ref109","article-title":"Effective handling of low memory scenarios in android using logs","volume-title":"Dept. Comput. Sci. Eng.","author":"Prodduturi","year":"2013"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2014.6884413"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/RAICS.2015.7488407"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562705"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986619"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037383"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685302"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370243"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494146"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27552-4_89"},{"key":"ref120","first-page":"327","article-title":"Androstep: Android storage performance analysis tool","volume-title":"Proc. Softw. Eng. Workshop","author":"Jeong"},{"issue":"2","key":"ref121","first-page":"35","article-title":"Automated memory leakage detection in android based systems","volume":"5","author":"Park","year":"2012","journal-title":"Int. J. Control Automat."},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.32"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society.2016.7854196"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966522"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/2512989.2512999"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2013.6487055"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2017.8229458"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/icce.2014.6775893"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6626238"},{"key":"ref130","first-page":"309","article-title":"I\/O stack optimization for smartphones","volume-title":"Proc. USENIX Annu. Techn. Conf","author":"Jeong"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2656045.2656049"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2754169.2754179"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2016.7763226"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.01.004"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/3126509"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937852"},{"key":"ref137","article-title":"Impacts of java language features on the memory performances of android apps","author":"De La Torre","year":"2017"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.161"},{"key":"ref139","first-page":"21","article-title":"An analysis of power consumption in a smartphone","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Carroll"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2380445.2380503"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632082"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2757486"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669135"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2840723"},{"key":"ref145","first-page":"702","article-title":"Battery-aware transformations in mobile applications","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Cito"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/2380445.2380502"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635871"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030157"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827066"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134075"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287014"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966460"},{"key":"ref154","first-page":"387","article-title":"AppScope: Application energy metering framework for android smartphone using kernel activity monitoring","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Yoon"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786847"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102585"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/1791314.1791326"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/GREENS.2012.6224263"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606555"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483780"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00115"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931067"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348583"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3067695.3082519"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2019.8790246"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3377930.3390245"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377739"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6645020"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/2348676.2348680"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583581"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.28"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10359-4_3"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2014.10"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.2015.3.3.2"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/2525526.2525848"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465378"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2769646"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/3125778"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070567"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307661"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323982"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106244"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168841"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/2593902.2593918"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.101"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568321"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754752"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897086"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.21"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2689012"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.19"},{"key":"ref193","article-title":"Using automatic refactoring to improve energy efficiency of android apps","volume-title":"Proc. CIbSE XXI Ibero-Amer. Conf. Softw. Eng.","author":"Cruz"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2012.6164445"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/2494232.2466586"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/2908961.2931691"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.32"},{"key":"ref198","first-page":"652","article-title":"Power modeling of graphical user interfaces on oled displays","volume-title":"Proc. 46th Annu. Des. Automat. Conf.","author":"Dong"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000002"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.210"},{"key":"ref201","first-page":"1","article-title":"Catch your attention: Quality-retaining power saving on mobile OLED displays","volume-title":"Proc. 51st ACM\/EDAC\/IEEE Des. Automat. Conf.","author":"Lin"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2013.10.020"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/2627369.2627612"},{"key":"ref204","article-title":"FingerShadow: An OLED power optimization based on smartphone touch interactions","volume-title":"Proc. 6th Workshop Power-Aware Comput. Syst.","author":"Chen"},{"issue":"5","key":"ref205","article-title":"Mobile GPU power consumption reduction via dynamic resolution and frame rate scaling","volume-title":"Proc. 6th Workshop Power-Aware Comput. Syst","author":"Nixon"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790117"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2017.8009181"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2844202"},{"key":"ref209","first-page":"1","article-title":"LSIM : Ultra lightweight similarity measurement for mobile graphics applications","volume-title":"Proc. 56th Annu. Des. Automat. Conf.","author":"Chang"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465887"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/2512840.2512867"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/2539036.2539049"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2014.6881412"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/2829946"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.02.004"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2911049"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965548"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814463"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814464"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070952"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.184"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2274074"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597085"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814459"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421769"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370219"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2218122"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567083"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/2457413.2457417"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884867"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790107"},{"key":"ref232","first-page":"563","article-title":"Selectively taming background android apps to improve battery lifetime","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Martins"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493505"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1145\/2757667.2757674"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2512904"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444781"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/3241742"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.34"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00051"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054206"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/2593743.2593748"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/2525526.2525846"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2501083"},{"key":"ref244","first-page":"4","article-title":"Energy efficiency of mobile clients in cloud computing","volume":"10","author":"Miettinen","year":"2010","journal-title":"HotCloud"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2019.2946163"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.25"},{"key":"ref247","volume-title":"Software Requirements","author":"Wiegers","year":"2013"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491435"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00053-0"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.32"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.86"},{"key":"ref252","first-page":"220","article-title":"Jouletrack: A web based tool for software energy profiling","volume-title":"Proc. 38th Annu. Des. Automat. Conf.","author":"Sinha"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750375"},{"key":"ref254","first-page":"603","article-title":"Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Des. Implementation","author":"Zhao"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.103"},{"key":"ref257","first-page":"17","article-title":"Improving linux startup time using software resume (and other techniques)","volume-title":"Proc. Linux Symp.","author":"Kaminaga"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1145\/125826.125932"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652538"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/1165573.1165674"},{"key":"ref262","first-page":"77","article-title":"CAFTL: A content-aware flash translation layer enhancing the lifespan of flash memory based solid state drives","volume-title":"Proc. 9th USENIX Conf. File Storage Technol.","volume":"11","author":"Chen"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024412"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1145\/235160.235164"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.24"},{"key":"ref266","article-title":"Adroitness: An android-based middleware for fast development of high-performance apps","author":"Romero","year":"2019"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332486"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"ref270","first-page":"332","article-title":"What developers want and need from program analysis: An empirical study","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Christakis"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624035"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00013"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.04.018"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09682-0"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09703-y"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583580"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.9"},{"key":"ref278","first-page":"220","article-title":"The android update problem: An empirical study","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Mahmoudi"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.18"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635909"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884828"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00019"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.64"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912257"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"ref286","first-page":"749","article-title":"Mining user opinions in mobile app reviews: A keyword-based approach (t)","volume-title":"Proc. 30th IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Vu"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180218"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332476"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1145\/1925019.1925023"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9507-3"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557366"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173918"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1145\/3161413"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26979-5_1"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9857502\/09397392.pdf?arnumber=9397392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:29:13Z","timestamp":1725082153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9397392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":296,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3071193","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}