To Run or Not to Run: Predicting Resource Usage Pattern in a Smartphone

  • Arijit MukherjeeEmail author
  • Anupam Basu
  • Swarnava Dey
  • Pubali Datta
  • Himadri Sekhar Paul
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 150)


Smart mobile phones are vital to the Mobile Cloud Computing (MCC) paradigm where compute jobs can be offloaded to the devices from the Cloud and vice-versa, or the devices can act as peers to collaboratively perform a task. Recent research in IoT context also points to the use of smartphones as sensor gateways highlighting the importance of data processing at the network edge. In either case, when a smart phone is used as a compute resource or a sensor gateway, the corresponding tasks must be executed in addition to the user’s normal activities on the device without affecting the user experience. In this paper, we propose a framework that can act as an enabler of such features by classifying the availability of system resources like CPU, memory, network usage based on applications running on an Android phone. We show that, such app-based classifications are user-specific and app usage varies with different handsets, leading to different classifications. We further show that irrespective of such variation in classification, distinct patterns exist for all users with available opportunity to schedule external tasks, without affecting user experience. Based on the next to-be-used applications, we output a predicted set of system resources. The resource levels along with handset architecture may be used to estimate worst case execution time for external jobs.


Smart phone Usage prediction Resource utilisation Machine learning Mobile cloud computing IoT Sensor data 


  1. 1.
    Marinelli, E.E.: Hyrax: Cloud Computing on Mobile Devices using MapReduce (2009)Google Scholar
  2. 2.
    Shi, C., Ammar, M.H. Zegura, E.W., Naik, M.: Computing in cirrus clouds: the challenge of intermittent connectivity. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC 2012, New York, NY, USA, pp. 23–28. ACM (2012)Google Scholar
  3. 3.
    Shi, C., Lakafosis, V., Ammar, M.H., Zegura, E.W.: Serendipity: enabling remote computing among intermittently connected mobile devices. In: Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2012, New York, NY, USA, pp. 145–154. ACM (2012)Google Scholar
  4. 4.
    Bonomi, F., Milito, R., Zhu, J., Addepalli, S:. Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC 2012, New York, NY, USA, pp. 13–16. ACM (2012)Google Scholar
  5. 5.
    Mukherjee, A., Paul, H.S., Dey, S., Banerjee, A.: Angels for distributed analytics in IoT. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 565–570. IEEE (2014)Google Scholar
  6. 6.
    Adeel, U., Yang, S., McCann, J.A.: Self-optimizing citizen-centric mobile urban sensing systems. In: 11th International Conference on Autonomic Computing (ICAC 2014), Philadelphia, PA, pp. 16–1167. USENIX Association, June 2014Google Scholar
  7. 7.
    Yang, S., Adeel, U., McCann, J.: Selfish mules: social profit maximization in sparse sensornets using rationally-selfish human relays. IEEE J. Sele. Areas Commun. 31, 1124–1134 (2013)CrossRefGoogle Scholar
  8. 8.
    Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys 2010, New York, NY, USA, pp. 179–194. ACM (2010)Google Scholar
  9. 9.
    Xu, Q., Erman, J., Gerber, A., Mao, Z., Pang, J., Venkataraman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, New York, NY, USA, pp. 329–344. ACM (2011)Google Scholar
  10. 10.
    An EEMBC Benchmark for Android Devices.
  11. 11.
    Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H., Hoeller, A.: Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques (2009)Google Scholar
  12. 12.
    Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G.: On the automatic categorisation of android applications. In: CCNC, pp. 149–153. IEEE (2012)Google Scholar
  13. 13.
    Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: 2010 International Conference on Computational Intelligence and Security (CIS), pp. 329–333, December 2010Google Scholar
  14. 14.
  15. 15.
    MacQueen, J.: Some methods for classification and analysis of multivariate observations (1967)Google Scholar
  16. 16.
  17. 17.
    Shin, C., Hong, J.-H., Dey, A.K.: Understanding and prediction of mobile application usage for smart phones. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, New York, NY, USA, pp. 173–182. ACM (2012)Google Scholar
  18. 18.
    Garner, S.R.: Weka: The waikato environment for knowledge analysis. In: Proceedings of the New Zealand Computer Science Research Students Conference, pp. 57–64 (1995)Google Scholar
  19. 19.
  20. 20.
  21. 21.
    Ling, C.X., Huang, J., Zhang, H.: AUC: a better measure than accuracy in comparing learning algorithms. In: Xiang, Y., Chaib-draa, B. (eds.) Canadian AI 2003. LNCS (LNAI), vol. 2671, pp. 329–341. Springer, Heidelberg (2003) CrossRefGoogle Scholar
  22. 22.
    Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2005) zbMATHGoogle Scholar
  23. 23.
    Hand, D.J.: Measuring classifier performance: A coherent alternative to the area under the roc curve. Mach. Learn. 77, 103–123 (2009)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Arijit Mukherjee
    • 1
    Email author
  • Anupam Basu
    • 2
  • Swarnava Dey
    • 1
  • Pubali Datta
    • 1
  • Himadri Sekhar Paul
    • 1
  1. 1.Innovation LabsTata Consultancy ServicesKolkataIndia
  2. 2.Department of Computer Science and EngineeringIIT KharagpurKharagpurIndia

Personalised recommendations