Computer Science ›› 2014, Vol. 41 ›› Issue (11): 25-30.doi: 10.11896/j.issn.1002-137X.2014.11.006

Previous Articles     Next Articles

User Behavior Modeling Method for Mobile Applications Based on Log Mining

CHEN San-chuan,WU Guo-quan,WEI Jun and HUANG Tao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper presented a user behavior modeling method for mobile applications based on log mining.The method is two-fold,including monitoring instructions instrumentation and UI access modeling.We presented an automatic monitoring instructions instrumentation method that uses static analysis to automatically insert monitoring instructions at the appropriate site in order to dynamically monitor user behavior at run time.We also presented an automata based user behavior modeling method for mobile applications.Information attached to states and transitions of the automata in user behavior model describes transitions between UIs and the usage of each widget within UIs.The test results on real world mobile applications show that this method can both successfully instrument monitoring instructions and effectively obtain the UI access behaviors.

Key words: Mobile applications,User interface access behavior,UI transition graph,Instrumentation

[1] 友盟统计分析平台.http://www.umeng.com/analytics
[2] Flurry Analytics.http://www.flurry.com/flurry-analytics.html
[3] Ravindranath L,Padhye J,Agarwal S,et al.AppInsight:Mobile App Performance Monitoring in the Wild[C]∥Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation.Hollywood,USA,2012
[4] Enck W,PGilbert W,Chun B-G,et al.TaintDroid:An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones[C]∥Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation.Vancouver,Canada,2010
[5] Yang Wei,Prasad M R,Xie Tao.A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications[C]∥Proceedings of the 16th International Conference on Fundamental Approaches to Software Engineering.Rome,Italy,2013
[6] Hao Shuai,Li Ding,Halfond W G J,et al.SIF:A Selective Instrumentation Framework for Mobile Applications[C]∥Proceeding of the 11th Annual International Conference on Mobile Systems,Applications,and Services.Taipei,Taiwan,2013
[7] Brooks P A,Memon A M.Automated GUI Testing Guided By Usage Profiles[C]∥Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering.Atlanta,USA,2007
[8] Zheng Cong,Zhu Shi-xiong,Dai Shuai-fu,et al.SmartDroid:an Automatic System for Revealing UI-based Trigger Conditions in Android Applications[C]∥Proceedings of 2nd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.Raleigh,USA,2012
[9] Menascé D A,Almeida V A F,Fonseca R,et al.A Methodology for Workload Characterization of E-commerce Sites[C]∥Proceedings of the First ACM Conference on Electronic Commerce.Denver,USA,1999
[10] Cook J E,Wolf A L.Discovering Models of Software Processes from Event-Based Data[J].ACM Transactions on Software Engineering and Methodology,1998,7(3):215-249
[11] Biermann A W,Feldman J A.On the Synthesis of Finite-State Machines from Samples of Their Behavior[J].IEEE Transactions on Computers,1972,21(6):592-597
[12] Gomez L,Neamtiu I,Azim T,et al.RERAN:timing- and touch-sensitive record and replay for Android[C]∥Proceedings of the 35th International Conference on Software Engineering.San Francisco,USA,2013
[13] Yang Li,Lin Zuo,Jun Wei,et al.Sequential Pattern-Based CacheReplacement in Servlet Container[C]∥Proceedings of the 7th international conference on Web engineering.Como,Italy,2007
[14] 黄翔,王伟,张文博,等.面向性能剖析的Web应用自动性能建模方法[J].软件学报,2012,23(4):786-801
[15] 张怡阳.基于依赖注入的移动终端应用开发[J].计算机应用,2009,29(6)

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!