Shaocheng Wang, Guojun Wu

Similar documents
Characterizing Smartphone Usage Patterns from Millions of Android Users

Ubiquitous and Mobile Computing CS 403x: Falling Asleep with Angry Birds, Facebook and Kindle

Ubiquitous and Mobile Computing CS 525M: Virtually Unifying Personal Storage for Fast and Pervasive Data Accesses

Slide 1. Opera Max. Migrating the next billion smartphone users for better app experience

1 Technical methodology

DS595/CS525: Urban Network Analysis --Urban Mobility Prof. Yanhua Li

Ubiquitous and Mobile Computing CS 528:EnergyEfficiency Comparison of Mobile Platforms and Applications: A Quantitative Approach. Norberto Luna Cano

START GUIDE CDMNEXT CEIC Data. All rights reserved.

CDMNEXT START GUIDE CEIC Data. All rights reserved.

CS 525M Mobile and Ubiquitous Computing: Getting Closer: An Empirical Investigation of the Proximity of User to Their Smart Phones

START GUIDE CDMNEXT CEIC Data. All rights reserved.

Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices

A Systemic Smartphone Usage Pattern Analysis: Focusing on Smartphone Addiction Issue

A1. Technical methodology

Predicting Library OPAC Users Cross-device Transitions

Configuring an Android Device for inet Guardian

News Filtering and Summarization System Architecture for Recognition and Summarization of News Pages

FCC&TC April Browsers. Bob Heath

Comment Extraction from Blog Posts and Its Applications to Opinion Mining

arxiv: v1 [cs.se] 30 Nov 2017

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

Before Google. 6/14/2018 Google At Home & On The Go 2

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp

U.S. Mobile Benchmark Report

The Mobile Internet Underclass: Reality or Hyperbole?

Oracle Marketing Cloud Service Descriptions and Metrics January 25, 2018

Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli

CS 525M Mobile and Ubiquitous Computing TagSense: A Smartphone based Approach to Automatic Image Tagging

Orphek Atlantik V2 Wireless

CompTIA Mobility+ Certification

Generating Cross level Rules: An automated approach

Web OS Opportunities and Challenges in China. Robert Wang Project Manager of China Mobile

Google Chrome For Windows Xp 32 Bit Full Version Offline

START GUIDE CDMNEXT CEICData. All rights reserved.

DCBench: a Data Center Benchmark Suite

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Development of a mobile application for manual traffic counts

A Tale of Two Studies Establishing Google & Bing Click-Through Rates

Characterizing a User from Large-scale Smartphone-sensed Data

MAdFraud: Investigating Ad Fraud in Android Applications

2. Do all itreasury users have access to the 15-day preview period or just the administrators? And, what should I be done during this time?

CS435 Introduction to Big Data Spring 2018 Colorado State University. 3/21/2018 Week 10-B Sangmi Lee Pallickara. FAQs. Collaborative filtering

Advanced Computer Graphics CS 525M: Crowds replace Experts: Building Better Location-based Services using Mobile Social Network Interactions

China Internet Market and Online Audience Measurement

AdMob Mobile Metrics Report - Southeast Asia

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY

Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP. Zhenhua Li Chunjing Han Gaogang Xie

Machine Learning Feature Creation and Selection

DETERMINATION OF THE PERFORMANCE

The impact of fiber access to ISP backbones in.jp. Kenjiro Cho (IIJ / WIDE)

HOW TO BUY IMPROVE YOUR LIFE WITH A CALM MIND AT AMAZON

Duo Security Enrollment Guide

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Personalized Mobile Application Discovery

IP Cam EdiLife Quick Installation Guide

A Multi-Faceted Company

Energy-constrained Wi-Fi Offloading Method Using Prefetching

TOMTOM GO x20/x200. Sales Kit 2016

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES

INTRODUCTION 2016 SITE STATS

Association-Rules-Based Recommender System for Personalization in Adaptive Web-Based Applications

Manual Internet Explorer 9 For Windows Xp Sp2 32 Bit

Cybersecurity and the China Mobile Payment Market: The Risk to Chinese Consumers Is Great

SMART RADIO MONITOR (SRM)

Data Mining in the Application of E-Commerce Website

PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users. Xiaofei Wang and Min Chen Speaker: 饒展榕

V-EDGE: FAST SELF-CONSTRUCTIVE POWER MODELING OF SMARTPHONES BASED ON BATTERY VOLTAGE DYNAMICS

STAROS user manual. Headquarter Flat D, 5/F, Excelsior Building, 364 Nathan Rd., Kowloon, H.K TEL: (852) FAX: (852)

Connected Mobile Experiences

SHIFTING MOBILE DATA PLANS EXTRACT FROM THE ERICSSON MOBILITY REPORT

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Fraud Detection of Mobile Apps

Mobile Data Trends and Networks Fit for Purpose

Ubiquitous and Mobile Computing CS 525M: DroidCluster: Towards Smartphone Cluster Computing

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

A Novel deep learning models for Cold Start Product Recommendation using Micro blogging Information

Center for Networked Computing

Analysing Search Trends

INDIA DIGITAL STATSHOT KEY STATISTICAL INDICATORS FOR INTERNET, MOBILE, AND SOCIAL MEDIA USAGE IN INDIA IN AUGUST 2015 SIMON KEMP WE ARE SOCIAL

MURAL User Guide. Version 3.8. Published: Copyright 2016, Cisco Systems, Inc.

Takeaways in Large-scale Human Mobility Data Mining. Guangshuo Chen, Aline Carneiro Viana, and Marco Fiore

Keep this information secure

REDUNDANCY REMOVAL IN WEB SEARCH RESULTS USING RECURSIVE DUPLICATION CHECK ALGORITHM. Pudukkottai, Tamil Nadu, India

CS 528 Mobile and Ubiquitous Computing Lecture 7b: Smartphone Sensing. Emmanuel Agu

NTT DOCOMO Technical Journal

Automatic Identification of User Goals in Web Search [WWW 05]

Monitoring Driver Behaviour Through Mobile Phones OSeven

Omni-Channel Market Trends UK and Global January 2015

COMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319

Manual Internet Explorer 9 Xp 32 Bit Windows 7

Constructing Websites toward High Ranking Using Search Engine Optimization SEO

Mobile device report. June Android Samsung. Android. other iphone. Android HTC Android. Dongle/ datacard. BlackBerry. Tablet.

Chinese Search & Social Media A Winning Combination. Presented by Charles Coxhead ICEF ANZA Seminar Program April 4, 2018

Duo Security Enrollment Guide

Linking Entities in Chinese Queries to Knowledge Graph

SERVICES REMOTE AUCTION. Live Auction Broadcast and Mobile Lot Board. Both of these services are available in English and Chinese.

CS 525M Mobile and Ubiquitous Computing: The Wi Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi Fi

Transcription:

Ubiquitous and Mobile Computing CS 528: Characterizing Smartphone Usage Patterns from Millions of Android Users Shaocheng Wang, Guojun Wu Computer Science Dept. Worcester Polytechnic Institute (WPI)

Introduction (cont.) Understanding user behaviors of using mobile apps is critical to the industry. There are some previous studies which are lack of data. They conduct a comprehensive study to find some user patterns.

Introduction How can we characterize the app popularity among millions of users? How do mobile users choose and manage apps? How do different apps perform in network activity? How do economic factors affect app selection and network usage?

Related Work Understanding User Behavior by Field Study Mining App Marketplace Data ARMiner, WisCom Predicting Apps to Use

Data Set From: Wandoujia, an Android App Store which is the most popular in China. Size: 260,172 apps Subset: App management data set: 8,112,145 users Network usage data set: 2,031,007 users

App Popularity Metrics: the number of downloads of the app; the number of unique devices that download the app; the aggregated data traffic generated by the app; the aggregated access time that users interact with the app.

App Popularity Downloads Percentage of Downloads against App Rank Downloads of an App

App Popularity Unique Subscribers How many devices has downloaded a App Percentage of Unique Subscribers against App Rank Unique Subscribers of an App They did find some apps with high downloads and low unique users

App Popularity Network Traffic

App Popularity Network Traffic The data traffic comes from both foreground and background. The access time are only from foreground. 97% apps consume less than 100 MB traffic volume in one month, and about 95% apps are used less than 100 hours.

APP MANAGEMENT PATTERNS Duration About 32% downloading and updating activities are performed during 7:00 pm to 11:00 pm Midnight: still have 7%

APP MANAGEMENT PATTERNS App Selection Jaccard Coefficient: number of two things appear together/number of at least one appears. Apps from same vendor could be installed together.

APP MANAGEMENT PATTERNS App Selection The co occurrence of two catagories

APP MANAGEMENT PATTERNS Uninstallation I/U ratio: Number of Installation/Number of Uninstallation. Most of Apps can t survive more than one day.

NETWORK ACTIVITY PATTERNS Distinguish daily data traffic and access time from Wi Fi and cellular network, respectively from foreground and background, respectively Findings: know which apps are network intensive, and result in more data traffic and battery life

Data Traffic Patterns Aggregate apps by their categories and summarize the total traffic consumption from Wi Fi and cellular, respectively

Data Traffic of Wi Fi and Cellular Wi Fi accounts for more than 60% in total traffic.

Data Traffic of Foreground and Background The background traffic means the app is still connecting to network even users do not interact with it

Access Time Patterns The foreground access time of an app indicates how long a user interacts with it. The background access time indicates how long an app connects to network when users do not interact with it.

Price Sensitive Patterns Classify users by the prices of their devices Device Model Clustering Cluster users by their device models from the Networked App Set, that covers about 2 million users 96% device models have less than 500 users Take a set of popular device models Categorize 327 device models according to their onmarket sale prices.

Apps Used Among Groups The higher price a device model has, the more apps are used on this device model

Network Activity Among Groups The usage of Wi Fi also tends to take a positive correlation with device model prices

User Interest on Similar Apps News Reader: Netease, Sohu, Phoenix, Tencent, and Sina Browser: Chrome, FireFox, Opera, Maxthon, UCWeb, 360Safe, Baidu, and Sogou

Limitations The dataset is collected from a single app marketplace in China Users under study are mainly Chinese, the region differences should be considered The analysis is done on one month of usage data

Conclusion In this paper, the authors conducted a systematic descriptive analysis of a large collection of mobile app usage behaviors. Their findings in usage patterns provide valuable implications for different stackholders in mobile app industry and research community.

References Huoran Li et al., Characterizing Smartphone Usage Patterns from Millions of Android Users N. Chen et al., AR miner: mining informative reviews for developers from mobile app marketplace. In Proc. of ICSE, pages 767 778, 2014 https://www.wandoujia.com/

Thank you!