A typical mobile user employs multiple devices (e.g., a smart-phone, a tablet, wearables, etc.). These devices are powered by varying mobile platforms. Enabling such cross-platform devices to seamlessly share their co...
详细信息
mobile cross-platform tools (CPTs) provide an interesting alternative to native development. Cross-platform tools aim at sharing a significant portion of the application codebase between the implementations for the di...
详细信息
ISBN:
(纸本)9781509022335
mobile cross-platform tools (CPTs) provide an interesting alternative to native development. Cross-platform tools aim at sharing a significant portion of the application codebase between the implementations for the different platforms. This can drastically decrease the development costs of mobile applications. There is, however, some reluctance of mobile application developers to adopt these tools. One of the reasons is that the landscape of CPTs is so diverse that it is hard to select the most suitable CPT to implement a specific application. The contribution of this paper is twofold. First, it presents a performance analysis of a fully functional mobile application implemented with ten cross-platform tools and native for Android, iOS and Windows Phone. The performance tests are executed on a high- and low-end Android and iOS device, and a Windows Phone device. second, based on the performance analysis, general conclusions of which application developers should be aware when selecting a specific (type of) cross-platform tool are drawn.
New mobile hardware technologies open up new possibilities for developing augmented reality applications of different types. In the advent of mature next-generation hardware, it is already possible to recognize some o...
详细信息
New mobile hardware technologies open up new possibilities for developing augmented reality applications of different types. In the advent of mature next-generation hardware, it is already possible to recognize some of the key concepts and software technologies to support the augmented reality application paradigm. In this paper we focus to the rendering part of the future augmented reality application paradigm, especially the 3D techniques that fulfill the main needs for the future augmented reality application paradigm.
Finding suitable developers for a given task is critical and challenging for successful crowdsourcing software development. In practice, the development skills will be improved as developers accomplish more developmen...
详细信息
ISBN:
(纸本)9781538626849
Finding suitable developers for a given task is critical and challenging for successful crowdsourcing software development. In practice, the development skills will be improved as developers accomplish more development tasks. Prior studies on crowdsourcing developer recommendation do not consider the changing of skills, which can underestimate developers' skills to fulfill a task. In this work, we first conducted an empirical study of the performance of 74 developers on Topcoder. With a difficulty-weighted algorithm, we re-compute the scores of each developer by eliminating the effect of task difficulty from the performance. We find out that the skill improvement of Topcoder developers can be fitted well with the negative exponential learning curve model. second, we design a skill prediction method based on the learning curve. Then we propose a skill improvement aware framework for recommending developers for software development with crowdsourcing.
Over the past two decades, mobile technology has evolved from simple mobile phones to smartphones with location-sensing and multiple forms of Internet connectivity. In the past few years, these have been joined by var...
详细信息
Over the past two decades, mobile technology has evolved from simple mobile phones to smartphones with location-sensing and multiple forms of Internet connectivity. In the past few years, these have been joined by various Internet-connected, location-aware devices that make it possible to track the real-time location and behavior of millions of people. This paper summarizes major advantages and risks associated with the universal connectivity that is available with this technology.
mobile applications (apps) have access to a large volume of sensitive user information. Current mobile platforms such as Android do not provide a means for the user to quantitatively understand the nature of access to...
详细信息
mobile applications (apps) have access to a large volume of sensitive user information. Current mobile platforms such as Android do not provide a means for the user to quantitatively understand the nature of access to their sensitive data by apps. In this paper, we present our approach to profile app's access to user's data with the ultimate goal of developing a personal privacy threshold for users and privacy index for apps.
Addressing security and privacy requirements for mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we...
详细信息
Addressing security and privacy requirements for mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we propose a symmetric architecture that takes into account the privacy and security requirements of the two platforms and offers a straightforward instantiation pattern for realizing an end-to-end privacy solution where data is safely exchanged and consumed on mobile or Cloud platforms.
In Android, inter-app communication is a cornerstone feature where apps exchange special messages called Intents in order to integrate with each other and deliver a rich end-user experience. In particular, in case an ...
In Android, inter-app communication is a cornerstone feature where apps exchange special messages called Intents in order to integrate with each other and deliver a rich end-user experience. In particular, in case an app is granted special permission, it can dispatch privileged Intents to request sensitive tasks to system ***, a malicious app might hijack a defective privileged app and exploit it as a proxy, to forward attacking Intents to system components. We call this threat “second Order Permission Re-delegation” *** this paper, we present (i) a detailed description of this novel vulnerability and (ii) our approach based on static analysis and automated test cases generation to detect (and document) instances of this vulnerability. We empirically evaluated our approach on a large set of top Google Play apps. Results suggest that this novel vulnerability is neglected by state of the art, but that it is common even among popular apps. In fact, our approach found 27 real vulnerabilities with fast analysis time, while a state-of-the-art static analysis tool could find none of them.
software engineers and architects of complex softwaresystems need to balance hard quality attribute requirements while at the same time manage risks and make decisions with a system-wide and long-lasting impact. To a...
详细信息
ISBN:
(纸本)9781479919345
software engineers and architects of complex softwaresystems need to balance hard quality attribute requirements while at the same time manage risks and make decisions with a system-wide and long-lasting impact. To achieve these tasks efficiently, they need quantitative information about design-time and run-time system aspects through usable and quick tools. While there is body of work focusing on code quality and metrics, their applicability at the design and architecture level and at scale are inconsistent and not proven. We are interested in exploring whether architecture can assist with better contextualizing existing system and code quality and metrics approaches. Furthermore, we ask whether we need additional architecture-level metrics to make progress and whether something as complex and subtle as software architecture can be quantified. The goal of this workshop is to discuss progress, gather empirical evidence, and identify priorities for a research agenda on architecture and metrics in the softwareengineering field.
This paper describes the content of a tutorial on the development of mobile business applications. Key aspects addressed are the design of the mobile user interface and the integrated conception of a sound architectur...
详细信息
This paper describes the content of a tutorial on the development of mobile business applications. Key aspects addressed are the design of the mobile user interface and the integrated conception of a sound architecture. The design of the user interface follows a user-centered design approach considering key aspects of mobile app development. Based on architectural scenarios, the architecture is specified with an emphasis on transferring lessons learned from various mobile projects with regard to achieving a high quality architecture definition.
暂无评论