Mobile Application Search: A QoS-Aware and Tag-Based Approach
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2015, Vol 2, Issue 4
Abstract
The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users to find apps by issuing query keywords; however, the ranking of search results does not always satisfy the expectations of users. This study proposes a novel approach to address this issue, called Tag-based and QoS-aware Mobile Application Search and Management (TQMASM). The proposed system provides two functionalities: (1) QoS-aware app search and tag-based app recommendation; and (2) tag-based app management. QoS-aware app search is an objective means of sorting search results by considering QoS (Quality of Service) factors, popularity, and reputation. Tag-based recommendation is used to find apps according to tags annotated by all users. Tag-based management utilizes an hierarchical tree and tag annotation to facilitate the management and usage of apps. A prototype realization of TQMASM was developed to evaluate the feasibility of the proposed approach. Experiment results demonstrate the efficacy of the proposed system in providing a satisfactory ranking of retrieved apps.
Authors and Affiliations
Shang-Pin Ma, Shin-Jie Lee, Wen-Tin Lee, Jing-Hong Lin, Jui-Hsaing Lin
A Review of Research on Acoustic Detection of Heat Exchanger Tube
Leakage in heat exchanger tubes can result in unreliable products and dangerous situations, which could cause great economic losses. Along with fast development of modern acoustic detection technology, using acoustic sig...
SMC-I with Approach Angle Method for Slip Suppression of Electric Vehicles
This study presents SMC-I (sliding mode control with integral action) with approach angle method applied to slip suppression problem of electric vehicles (EVs). In SMC, chattering phenomenon always occurs through high fr...
Securing Smart Grid In-Network Aggregation through False Data Detection
Existing prevention-based secure in-network data aggregation schemes for the smart grids cannot eectively detect accidental errors and falsified data injected by malfunctioning or compromised meters. In this work, we de...
Light-weight Key Management Scheme for Active RFID Applications
Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constraine...
Performance evaluation of composite Web services
Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging i...