Default Cover Image

2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)

May 16 2016 to May 17 2016

Austin, TX

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xi
Message from the MobileSoft ChairsFreely available from IEEE.pp. xii-xiii
Welcome Message from the SRC ChairFreely available from IEEE.pp. xv-xv
Welcome Message from the Mobile Applications Track ChairFreely available from IEEE.pp. xvi-xvii
MobileSoft committees and reviewersFreely available from IEEE.pp. xviii-xx
Sponsors and supportersFreely available from IEEE.pp. xxi-xxi
Indoor Localization: Challenges and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
User Interaction Monitoring and Analysis FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 7-8
Towards Having a Cloud of Mobile Devices Specialized for Software TestingFull-text access may be available. Sign in or learn about subscription options.pp. 9-10
Estimate Method Calls in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 13-14
Inter-App Communication between Android Apps Developed in App-Inventor and Android StudioFull-text access may be available. Sign in or learn about subscription options.pp. 17-18
BehaviorDroid: Monitoring Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 19-20
Middleware for Writing Distributed Applications on Physical Computing DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 21-22
Preserving Energy Resources Using an Android Kernel Extension: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 23-24
Mobile Exergaming: Exergames on the GoFull-text access may be available. Sign in or learn about subscription options.pp. 25-26
Regression Test Selection for Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 27-28
Toward Designing Mobile Software to Predict Hypoglycemia for Patients with DiabetesFull-text access may be available. Sign in or learn about subscription options.pp. 29-30
A Novel Approach to Mobile Indoor Navigation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31-33
Helping Mobile Software Code Reviewers: A Study of Bug Repair and Refactoring PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 34-35
Integrating Mobile and Cloud for PPG Signal Selection to Monitor Heart Rate during Intensive Physical ExerciseFull-text access may be available. Sign in or learn about subscription options.pp. 36-37
Comparing Performance Parameters of Mobile App Development StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 38-47
Profiling the Responsiveness of Android Applications via Automated Resource AmplificationFull-text access may be available. Sign in or learn about subscription options.pp. 48-58
An Empirical Study of the Performance Impacts of Android Code SmellsFull-text access may be available. Sign in or learn about subscription options.pp. 59-69
Reproducing Context-Sensitive Crashes of Mobile Apps Using Crowdsourced MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 88-99
Mason: An Open Development Contextual Sensing Framework Enabling Reactive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 100-110
Blending Mobile Programming and Liberal Education in a Social-Economic High SchoolFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Debugging Energy-Efficiency Related Field Failures in Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 127-138
Automated Re-factoring of Android Apps to Enhance Energy-EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 139-150
Generative Patterns for Designing Multiple User InterfacesFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Scenario-Based Programming for Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 161-172
A Distributed Open Social Platform for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 173-174
Coordinating Proactive Social Devices in a Mobile Cloud: Lessons Learned and a Way ForwardFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Towards Cooperative Content Downloading for Resource-Constrained Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 189-198
Evaluating BSS Algorithms in a Mobile Context Realized by a Client-Server ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 199-209
Migrating User Interfaces in Native Mobile Applications: Android to iOSFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
On the IO Characteristics of the SQLite TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 214-224
Understanding Code Smells in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 225-236
Extending App Installable Memory in Android SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 237-240
Web-Based Hybrid Mobile Apps: State of the Practice and Research OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 241-242
Mobile App and App Store Analysis, Testing, and OptimisationFull-text access may be available. Sign in or learn about subscription options.pp. 243-244
Virtualization Toolset for Emulating Mobile Devices and NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 245-254
Cognitive Mobile Security: Invited Conference KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 267-268
A Pro-active and Dynamic Prediction Assistance Using BaranC FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 269-270
XD (Exchange-Deliver): A Middleware for Developing Device-to-Device Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 271-274
Pinpointing Mobile Malware Using Code AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 275-276
Improving Design Validation of Mobile Application User Interface ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 277-278
Model Under Design and Over Design on Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 279-280
idb: A Tool for Blackbox iOS Security AssessmentsFull-text access may be available. Sign in or learn about subscription options.pp. 281-282
Faux Disk Encryption: Realities of Secure Storage on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 283-284
VALERA: An Effective and Efficient Record-and-Replay Tool for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 285-286
App Security with JSFlowFull-text access may be available. Sign in or learn about subscription options.pp. 289-290
Eavesdropping and Obfuscation Techniques for SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 291-292
DroidMate: A Robust and Extensible Test Generator for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 293-294
Cross-Platform Access-Rights Analysis of Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 295-296
A Framework for Automatic Anomaly Detection in Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 297-298
Mining Usage Data from Large-Scale Android Users: Challenges and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 301-302
Author indexFreely available from IEEE.pp. 303-305
Showing 71 out of 71