Fine-Grained Power Modeling for Smartphones Using System Call Tracing

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=HrqgQ2KrOoA



Duration: 1:04:59
138 views
1


Accurate, fine-grained online energy estimation and accounting of mobile devices such as smartphones is of critical importance to understanding and debugging the energy consumption of mobile applications. We observe that state-of-the-art, utilization-based power modeling correlates the (actual) utilization of a hardware component with its power state, and hence is insufficient in capturing several power behavior not directly related to the component utilization in modern smartphones. Such behavior arise due to various low level power optimizations programmed in the device drivers. We propose a new, system-call-based power modeling approach which gracefully encompasses both utilization-based and non-utilization-based power behavior. We present the detailed design of such a power modeling scheme and its implementation on Android and Windows Mobile. Our experimental results using a diverse set of applications confirm that the new model significantly improves the fine-grained as well as whole-application energy consumption accuracy. We further demonstrate fine-grained energy accounting enabled by such a fined-grained power model, via a manually implemented eprof, the energy counterpart of the classic gprof tool, for profiling application energy drain.




Other Videos By Microsoft Research


2016-08-16The Reconstruction Problem on the Tree
2016-08-16Information and Interactive Communication
2016-08-16The Impact of Visualization on Search and Discovery; ScienceCinema; Speech Processing Quaero
2016-08-16Interactive Illustrations; Delivering Interactive 3D Moleculars; Interactive Multimedia Publishing
2016-08-16Semantics of Innovation in Visualization; PivotViewer; Visualization of Ecological Data
2016-08-16Telling Stories in the Cloud; Communications from the Particle Frontier; Video Analytics
2016-08-16On Users' Mental Models of Security Controls
2016-08-16Why Don't Software Developers Use their Tools?
2016-08-16The Mathematics of Side-Channel Attacks
2016-08-16PyPy's Approach to Implementing Dynamic Languages Using a Tracing JIT Compiler
2016-08-16Fine-Grained Power Modeling for Smartphones Using System Call Tracing
2016-08-16We Will be Right With You: Managing Customers Expectations with Vague Promises and Cheap Talk
2016-08-16Information That Matters: Investigating Relevance of Entities in Social Media Networks
2016-08-16Efficient Bayesian Algorithmic Mechanism Design
2016-08-16Extreme Learning Machine: Learning Without Iterative Tuning
2016-08-16Extracting Knowledge from Networks: Rumors, Superstars, and Communities
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Limit Theorems in Pseudorandomness and Learning Theory
2016-08-16Empirical Software Engineering, Version 2.0
2016-08-16A Master Bijection for Planar Maps, and Its Applications
2016-08-16Password-based Authenticated Key Exchange at the Cost of Diffie-Hellman



Tags:
microsoft research