Peeking without Spying: Collecting End-Host Measurements to Improve User Experience
نویسندگان
چکیده
Obtaining data directly from end hosts could benefit a broad set of applications, including application performance diagnosis, network troubleshooting, security profiling and even energy-saving policies. However, the data central to the study and development of such tools is fundamentally hard to collect. This situation has arisen both for technical reasons and for psychological ones. We believe that a lack of such end-host data has been a limiting factor in research on these topics. In this paper, we explore the design space of a measurement tool to run on end-hosts. Many tradeoffs arise such as the utility or benefit of collecting a given piece of data, the user’s comfort with that data being monitored, and the overhead incurred via the technique used to collect the data. We combine both qualitative and quantitative elements to drive our own decisions for designing such a tool: we conduct a user survey to understand user comfort issues, and we carry out evaluations of the overhead and utility of different techniques for collecting various data. We build an instance of such a data collection tool which exposes these tradeoffs in an explicit way and describe its design.
منابع مشابه
USENIX Association Proceedings of the 2 nd Workshop on Industrial Experiences with Systems Software
Performance is a requirement for all interactive applications. For Internet-based distributed applications, the need is even more acute – users have a choice about where they browse, and if a site’s performance frustrates them they may never return. The goal of this paper is to demonstrate the power of end-toend latency measurements of actual site traffic for assuring the performance of Interne...
متن کاملEthical Considerations in Augmented Reality Applications
Augmented reality (AR) is a powerful technology that has a direct effect on the end user experience. AR is a persuasive technology that is already having direct impact on the end user, all the while collecting information about them and their actions. AR is currently being used to advise, inform, track, manipulate, entertain and persuade the end user while collecting and utilizing their data. T...
متن کاملFragmented Monitoring
Field data is an invaluable source of information for testers and developers because it witnesses how software systems operate in real environments, capturing scenarios and configurations relevant to end-users. Unfortunately, collecting traces might be resource-consuming and can significantly affect the user experience, for instance causing annoying slowdowns. Existing monitoring techniques can...
متن کاملDon ’ t touch a word ! A practical input eavesdropping attack against mobile touchscreen devices
Spying on a person is a subtle, yet easy and reliable method to obtain sensitive information. Even if the victim is well protected from digital attacks, spying may be a viable option. In addition, the pervasiveness of mobile devices increases an attacker’s opportunities to observe the victims while they are accessing or entering sensitive information. This risk is exacerbated by the remarkable ...
متن کاملNetwork Resource Management for Improving Users Quality of experience in Software Defined Network by Weighted Fuzzy Petri-NetMethod
The rapid rise in popularity of multimedia applications, such as VoIP, IPTV and Video Conferencing, intensifies the need to consider resource management for user satisfaction. Furthermore, improving Quality of Experience (QoE) in Software Defined Networks (SDNs) services is one of the important issues to be addressed by provisioning optimum resource management. In this paper, resource allocatio...
متن کامل