Generations of computer programmers are taught to prefetch net-work objects in computer science classes. In practice, prefetching can be harmful to the user’s wallet when she is on a limited or pay-per-byte cellular data plan. Many popular, professionally-written smartphone apps today prefetch large amounts of network data that the typical user may never use. We present Procrastinator, which automatically decides when to fetch each network object that an app requests. This decision is made based on whether the user is on Wi-Fi or cellular, how many bytes are remaining on the user’s data plan, and whether the object is needed at the present time. Procras-tinator does not require app developer effort, nor app source code, nor OS changes – it ...
Abstract. Mobile platforms combined with large databases promise new opportunities for mobile applic...
With the growth of mobile data and the increasing density of base stations, mobility management in f...
This disclosure describes techniques to manage consumption of network bandwidth, e.g., by a mobile d...
Abstract – Generations of computer programmers are taught to prefetch network objects in computer sc...
Abstract—For mobile devices, communication via cellular networks consumes more energy than via WiFi ...
Smart phones should not just accompany their owners: they should provide them with the data they wan...
National audienceWe present PCach, a smartphone-based approach for relieving the congestion in cellu...
Mobile devices regularly move between feast and famine—environments that diff er greatly in the capa...
The popularity of smartphones and mobile applications has experienced a considerable growth during t...
Abstract—Many mobile applications require frequent wireless transmissions between the content provid...
It is well-known that the performance of Web-browsing as well as mobile applications (or apps) suffe...
To cope with recent exponential increases in demand for mobile data, wireless Internet service provi...
© 2021 USENIX Annual Technical Conference. All rights reserved.With mobile applications' ever-i...
Mobile devices regularly move between feast and famine—environments that differ greatly in the capac...
Abstract—Real-time entertainment constitutes the majority of traffic in today’s mobile networks. The...
Abstract. Mobile platforms combined with large databases promise new opportunities for mobile applic...
With the growth of mobile data and the increasing density of base stations, mobility management in f...
This disclosure describes techniques to manage consumption of network bandwidth, e.g., by a mobile d...
Abstract – Generations of computer programmers are taught to prefetch network objects in computer sc...
Abstract—For mobile devices, communication via cellular networks consumes more energy than via WiFi ...
Smart phones should not just accompany their owners: they should provide them with the data they wan...
National audienceWe present PCach, a smartphone-based approach for relieving the congestion in cellu...
Mobile devices regularly move between feast and famine—environments that diff er greatly in the capa...
The popularity of smartphones and mobile applications has experienced a considerable growth during t...
Abstract—Many mobile applications require frequent wireless transmissions between the content provid...
It is well-known that the performance of Web-browsing as well as mobile applications (or apps) suffe...
To cope with recent exponential increases in demand for mobile data, wireless Internet service provi...
© 2021 USENIX Annual Technical Conference. All rights reserved.With mobile applications' ever-i...
Mobile devices regularly move between feast and famine—environments that differ greatly in the capac...
Abstract—Real-time entertainment constitutes the majority of traffic in today’s mobile networks. The...
Abstract. Mobile platforms combined with large databases promise new opportunities for mobile applic...
With the growth of mobile data and the increasing density of base stations, mobility management in f...
This disclosure describes techniques to manage consumption of network bandwidth, e.g., by a mobile d...