Improving the Performance of Smartphone Apps with Soft Hang Bug Detection and Dynamic Resource Management

Total Page:16

File Type:pdf, Size:1020Kb

Improving the Performance of Smartphone Apps with Soft Hang Bug Detection and Dynamic Resource Management Improving the Performance of Smartphone Apps with Soft Hang Bug Detection and Dynamic Resource Management Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Marco Brocanelli, M.S. Graduate Program in Electrical and Computer Engineering The Ohio State University 2018 Dissertation Committee: Dr. Xiaorui Wang, Advisor Dr. Feng Qin Dr. Christopher C. Stewart ⃝c Copyright by Marco Brocanelli 2018 Abstract Two critical quality factors for mobile devices (e.g., smartphones, tablets) are battery life and apps’ user perceived performance. For example, apps that require frequent user actions with the user interface should have high responsiveness, which indicates how fast an app reacts to user actions. On the other hand, apps used mostly for video/music play should have a high throughput, which allows for example a video to be played smoothly without perceivable frame rate loss. Two main causes of poor performance for these apps are soft hang bugs and resource contention. A soft hang bug causes the app to have soft hangs, i.e., the app’s response time of handling a certain user action is longer than a user-perceivable delay. A soft hang bug is a blocking operations that executes on the app’s main thread and can be fixed by moving the execution of this operation to a background worker thread. Resource contention can cause concurrent foreground apps to miss their performance target. Indeed, during recent years, the improvements in mobile operating system performance and the increasing display size have brought these resource constrained devices to be able to execute multiple apps at the same time, e.g., watch a video while chatting with a friend. As a result, the resource contention among the apps sharing the screen can either cause performance degradation for at least one of the concurrent apps or cause an unnecessarily high energy consumption. In this dissertation, we first introduce Hang Doctor, a runtime soft hang detection and diagnosis methodology that runs in the wild on user devices. Hang Doctor helps developers ii track the responsiveness performance of their apps and provides diagnosis information for them to fix soft hangs. Hang Doctor exploits performance event counters toensure high detection quality and low overhead. In particular, we propose a soft hang filter that examines the performance event counters during the app execution to automatically prune false positives. We have implemented Hang Doctor and tested it with the latest releases of 114 real-world apps. Hang Doctor has found 34 new soft hang bugs previously unknown to their developers. So far, 62% of the bugs have already been confirmed by the developers and 68% are missed by offline detection algorithms. Second, in order to ensure good user-perceived performance of concurrent apps and low energy consumption, we propose SURF, Supervisory control of User-perceived peRFor- mance. Specifically, first, SURF dynamically balances the performance of the concurrent apps to regulate the resource allocation among the concurrent apps according to their actual performance needs. Then, when the concurrent foreground apps have balanced performance, SURF manipulates CPU DVFS (dynamic voltage and frequency scaling) to ensure that the user-perceived performance of all the apps stay close to their desired values while mini- mizing the energy consumption. A key advantage of SURF is that it is designed rigorously based on supervisory control theory, which provides analytical stability and performance guarantees compared to heuristic solutions. We test SURF on several mobile device models with real-world open-source apps and show that it can reduce the CPU energy consumption by 30-90% compared to state-of-the-art solutions while causing no perceivable performance degradation. iii Dedicated to all the people that guided me to this life achievement iv Acknowledgments The first person that I want to thank is my advisor Dr. Xiaorui Wang. Since thefirstday in my Ph.D., he pushed me to improve myself and do things that I didn’t know I could do. He thought me how to properly conduct scientific research, develop projects, write papers, and present in front of a large amount of people. I really appreciate his great contribution to my personal and professional development, which will positively impact my future. I would like to thank Dr. Feng Qin, Dr. Christopher Stewart, Dr. Fusun Ozguner, and Dr. Jian Tan for being part of my candidacy and final exam committees. They all gave me insightful feedbacks on my projects and I really hope to collaborate with them in the future. I also want to thank my present and former lab mates Kuangyu Zheng, Li Li, Bruce Beitman, Yunhao Bai, Wenli Zheng, Zichen Xu, Kai Ma, and Xiaodong Wang for all the invaluable time spent discussing research ideas, which has highly contributed to the successful publication of many papers. Special thanks go to Dr. Andrea Serrani, who helped me come to The Ohio State University at the end of my master studies. My life would be so much different without his help and I would have probably not even started a Ph.D. if it was not for him. Last but not least, I would like to thank my family. I want to thank my mom Lorella, my sister Linda, and all the rest of my Italian family for encouraging and supporting me to pursue a career outside my home-country, Italy. In addition, I would like to thank my wife Paula and my Colombian family for all the moral support and kindness given to me. v Vita 2012-Present . Ph.D., Electrical and Computer Engineering, The Ohio State University, USA. 2010 . Visiting Scholar, Control Engineer, The Ohio State University, USA. 2008 . M.S., Control Systems, University of Rome Tor Vergata, Italy. 2005 . B.S., Control Systems, University of Rome Tor Vergata, Italy. Publications Research Publications Marco Brocanelli, Xiaorui Wang. “SURF: Supervisory Control of User-Perceived Per- formance for Mobile Device Energy Savings”. International Conference on Distributed Computing Systems (ICDCS), July 2018. Marco Brocanelli, Xiaorui Wang. “Hang Doctor: Runtime Detection and Diagnosis of Soft Hangs for Smartphone Apps”. European Conference on Computer Systems (EuroSys), April 2018. Marco Brocanelli, Xiaorui Wang. “Smartphone Radio Interface Management for Longer Battery Lifetime”. IEEE International Conference on Autonomic Computing (ICAC), July 2017. vi Marco Brocanelli, Sen Li, Xiaorui Wang, Wei Zhang. “Maximizing the revenues of data centers in regulation market by coordinating with electric vehicles”. Sustainable Computing: Informatics and Systems, 6: 26-38. June 2015. Marco Brocanelli, Wenli Zheng, Xiaorui Wang. “Reducing the expenses of geo-distributed data centers with portable containerized modules”. IFIP WG 7.3 Performance14, September 2014. Sen Li, Marco Brocanelli, Wei Zhang, Xiaorui Wang. “Integrated Power Management of Data Centers and Electric Vehicles for Energy and Regulation Market Participation”. IEEE Transactions on Smart Grid, 5(5): 2283-2294. June 2014. Marco Brocanelli, Sen Li, Xiaorui Wang, Wei Zhang. “Joint management of data centers and electric vehicles for maximized regulation profits”. International Green Computing Conference (IGCC), June 2013. Sen Li, Marco Brocanelli, Wei Zhang, Xiaorui Wang. “Data center power control for frequency regulation”. Power and Energy Society General Meeting (PES), July 2013. Marco Brocanelli, Yakup Gunbatar, Andrea Serrani, Michael Bolender, “Robust Control for Unstart Recovery in Hypersonic Vehicles”. AIAA Guidance, Navigation, and Control Conference, August 2012. Fields of Study Major Field: Electrical and Computer Engineering vii Table of Contents Page Abstract . ii Dedication . iv Acknowledgments . .v Vita ........................................... vi List of Tables . .x List of Figures . xi 1. Introduction . .1 1.1 Soft Hang Bugs . .2 1.2 Resource Contention . .3 1.3 Major Contributions . .4 2. Hang Doctor: Runtime Detection and Diagnosis of Soft Hangs for Smartphone Apps........................................6 2.1 Background and Motivation . 10 2.1.1 Background . 10 2.1.2 Motivation . 13 2.2 Design of Hang Doctor . 15 2.2.1 Goals and Challenges . 15 2.2.2 Design Overview . 16 2.2.3 First Phase: S-Checker . 20 2.2.4 Second Phase: Diagnoser . 31 2.2.5 Hang doctor Implementation . 33 2.3 Evaluation . 34 viii 2.3.1 Baselines and Performance Metrics . 34 2.3.2 Result Summary and Developers’ Response . 36 2.3.3 Example Runtime Hang Bug Detection . 40 2.3.4 Detection Performance Comparison . 43 2.3.5 Overhead Analysis . 46 2.3.6 Alternative Approaches and Limitations . 47 2.4 Related Work . 49 3. SURF: Supervisory Control of User-Perceived Performance for Mobile Device Energy Savings . 51 3.1 Related Work . 54 3.2 Background and Motivation . 55 3.2.1 Background . 55 3.2.2 Motivation . 56 3.3 Design of SURF . 61 3.3.1 Design Overview . 61 3.3.2 Inner Loop: Performance Balancer . 64 3.3.3 Outer Loop: Performance Controller . 70 3.3.4 Discussion . 72 3.4 Experimental Results . 73 3.4.1 Experimental Setup . 73 3.4.2 SURF: Overall Summary of Results . 75 3.4.3 Inner Loop: Performance Balancer . 77 3.4.4 Outer Loop: Performance Controller . 78 3.4.5 Integrated Solution: SURF . 80 4. Conclusions . 85 Bibliography . 87 ix List of Tables Table Page 2.1 Apps with well-known soft hang bugs tested in the motivation study. The commit number refers to the app version that has the bug. 13 2.2 The timeout value influences the performance of Timeout-based runtime detection algorithms. The numbers report the average numbers of true positives and false positives detected for the apps in Table 2.1. 14 2.3 Correlation analysis results used for the design of S-Checker. Top-10 most correlated performance events for soft hang diagnosis. (a) Monitoring main thread and render thread increases the correlation of about 14% on average compared to (b) monitoring only the main thread.
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Pega Customer Service Reference Guide Iii
    Pega Customer Service 7.1.4 Version REFERENCE GUIDE © Copyright 2015 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. Other brand or product names are trademarks of their respective holders. Consult the 718ThirdPartyLicense.pdf file on the installation media for information about the software delivered with the product. Notices This publication describes and/or represents products and services of Pegasystems Inc. It may contain trade secrets and proprietary information that are protected by various federal, state, and international laws, and distributed under licenses restricting their use, copying, modification, distribution, or transmittal in any form without prior written authorization of Pegasystems Inc. This publication is current as of the date of publication only. Changes to the publication may be made from time to time at the discretion of Pegasystems Inc. This publication remains the property of Pegasystems Inc. and must be returned to it upon request. This publication does not imply any commitment to offer or deliver the products or services described herein. This publication may include references to Pegasystems Inc. product features that have not been licensed by you or your company. If you have questions about whether a particular capability is included in your installation, please consult your Pegasystems Inc. services consultant. Although Pegasystems Inc. strives for accuracy in its publications, any publication may contain inaccuracies or typographical errors, as well as technical inaccuracies. Pegasystems Inc. may make improvements and/or changes to the publication at any time. Any references in this publication to non-Pegasystems websites are provided for convenience only and do not serve as an endorsement of these websites.
    [Show full text]
  • Windows 7 – Hands-On Training Table of Contents PINNING PROGRAMS and USING JUMP LISTS
    Windows 7 – Hands-on Training Table of Contents PINNING PROGRAMS AND USING JUMP LISTS ..................................................................................... 3 THE START MENU .............................................................................................................................................. 3 Pin a program icon to the Start menu ............................................................................................................. 3 View the Jump List for a program .................................................................................................................. 4 Open an item from the Jump List ................................................................................................................... 4 Pin an item to a Jump List .............................................................................................................................. 4 Unpin an item ................................................................................................................................................. 4 THE TASKBAR .................................................................................................................................................... 5 Pin a program icon to the taskbar ................................................................................................................... 5 View the Jump List for a program .................................................................................................................
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • SILK Using the Remote Desktop Scheduler Logging Into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide
    SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Overview As of October 21, 2015, there are two methods of logging into the SILK Scheduler: LBLESD Citrix Login Interface or the new LBL Remote Desktop User Logon Interface. Citrix Login Interface is used to provide a secured entry into SILK applications. Citrix requires a license for each person logging into using SILK. The Remote Desktop Login Interface (for SILK - RD SILK Scheduler) is another type of secure login method for accessing SILK. LBL has purchased a single license for this product that allows an unlimited number of client users. LBL Information Systems and LBL Network are promoting the use of the Remote Desktop Login Interface for SILK because of: • Security control • Quicker logon response • No idle time limits • No limit to the number of users logged into SILK • Uses the same security – Domain, User ID and Password • SILK works as it always has • And works with web browsers: IE (10 and up), Mozilla Firefox, and Google Chrome Logging into SILK using RD SILK Scheduler To log into SILK using the RD SILK Scheduler you will need to know the Domain, your User ID, and password. For most SILK users the domain is SIS. The user id and password is the same that you currently use for SILK. During your first time using this URL address, you may encounter several Firefox browser security windows before you are allowed to log into your SILK district. Using Mozillia Firefox, enter the following URL to access the RD SILK Scheduler: https://scheduler.lblesd.k12.or.us Linn Benton Lincoln ESD Help Desk: 541.812.2800 or 866.914.2800 firefox browser-remote desktop silk scheduler.docx www.lblesd.k12.or.us https://swhelpdesk.lblesd.k12.or.us version date: 2015.12.04 SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Once the User Login page is displayed, enter your SILK security information.
    [Show full text]
  • ARCHIVE 2711.Pdf
    ComputorEdge 3/13/09 ComputorEdge™ Online — 03/13/09 This issue: Flash Drives: Computing in Your Pocket The little memory chips have become more than just a way to save and move files. Now you can carry all your computing with you to work with any computer. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader wants to run antivirus software from a flash drive; a reader's new external SATA drive isn't much faster than his old ATA drive; why would a reader's computer be shutting down at random intervals? Flash Drive Security by Michael J. Ross They're handy, portable and easy to lose. The diminutive size and light weight of flash drives makes them ideal for portable data storage, but it also makes them easily lost or stolen. Flash drive manufacturers and security software developers are creating a variety of solutions. Linux on a Flash Drive by Michael J. Ross Shrinking OS meets growing-capacity drives. (Click Banner) Linux is an operating system shrinking in size, while USB flash drives are growing in capacity. It was inevitable that a point would be reached at which Linux could be running on a simple flash drive. Windows Vista Tips and Tricks by Jack Dunning Save Time by Using Favorite Links in Windows Explorer Many people ignore the existence of the Favorite Links feature. However, if you take the time to play with it, you will most likely fall in love with this extra feature of Windows Vista. Wally Wang's Apple Farm by Wally Wang New Macintosh Models After a seeming eternity of waiting, Apple released updates to the Mac Pro, (Click Banner) iMac and Mac mini.
    [Show full text]
  • Technical Design of Open Social Web for Crowdsourced Democracy
    Project no. 610349 D-CENT Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Version Number: 1 Lead beneficiary: OKF Due Date: 31 October 2014 Author(s): Pablo Aragón, Francesca Bria, Primavera de Filippi, Harry Halpin, Jaakko Korhonen, David Laniado, Smári McCarthy, Javier Toret Medina, Sander van der Waal Editors and reviewers: Robert Bjarnason, Joonas Pekkanen, Denis Roio, Guido Vilariño Dissemination level: PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Approved by: Francesca Bria Date: 31 October 2014 This report is currently awaiting approval from the EC and cannot be not considered to be a final version. FP7 – CAPS - 2013 D-CENT D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Contents 1 Executive Summary ........................................................................................................................................................ 6 Description of the D-CENT Open Democracy pilots ............................................................................................. 8 Description of the lean development process .......................................................................................................... 10 Hypotheses statements
    [Show full text]
  • Technical Blueprint for Vertical Use Cases and Validation Framework
    Deliverable 1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Version 1.0 Partners This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 957242 Abstract This document describes the five use cases that are the targets for 5G Non-Public Network (NPN) developments within the FUDGE-5G project. The use cases addressed are: (i) Concurrent Media Delivery, (ii) Public Protection and Public Relief (PPDR), (iii) 5G Virtual Office, (iv) Industry 4.0, (v) Interconnected NPNs. List of Authors and Reviewers 1.1. Authors Author Partner Carlos Barjau, Josep Ribes, Borja Iñesta, David Gomez-Barquero UPV Kashif Mahmood (Editor), Pål Grønsund, Ole Grøndalen, Andres Gonzalez TNOR Daniele Munaretto, Marco Centenaro, Nicola di Pietro ATH Jose Costa, Mika Skarp CMC Pousali Charkaborty, Marius Corici FHG Peter Sanders O2M Thanos Xirofotos UBI Luis Cordeiro, André Gomes, António Borges ONE Manuel Fuentes, Andrés Meseguer, Teresa Pardo, David Martín-Sacristán 5CMM Sebastian Robitzsch, Kay Hänsge IDE Zoran Despotovic, Artur Hecker, Dirk Trossen HWDU Filippo Rebecchi THA D1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Page 2 of 85 1.2. Reviewers Reviewer Partner Erik Vold NRK Waqas Ikram ABB Kennet Nomeland Norwegian Defense Materiel Agency (NDMA) Karl Øyri Oslo University Hospital (OUS) Steve Appleby British Telecom (BT) Disclaimer This FUDGE-5G D1.1 deliverable is not yet approved nor rejected, neither financially nor content-wise by the European Commission. The approval/rejection decision of work and resources will take place at the Mid-Term Review Meeting planned in November 2021, after the monitoring process involving experts has come to an end.
    [Show full text]
  • AN EXPLORATORY STUDY of SCIENCE BLOGGERS Degree Candidate
    ABSTRACT Title of Thesis: OPENING UP THE CONVERSATION: AN EXPLORATORY STUDY OF SCIENCE BLOGGERS Degree Candidate: Gregory Michael Masters Degree and Year: Master of Arts, 2013 Thesis Directed by: Dr. Carol L. Rogers Philip Merrill College of Journalism Over the past decade, science blogs have experienced tremendous growth and changes in organization, becoming an important part of what researchers have called the “evolving science media ecosystem.” This thesis explores the practices and perceptions of science bloggers through 20 in-depth interviews and through a review of the blogs themselves. The research suggests areas where this medium is having a unique impact on how science communication occurs. The interview results revealed that science bloggers are motivated mainly by enjoyment, have a wide variety of routines and reporting/writing processes, strive to incorporate a personal touch, and are very engaged with readers and fellow writers through social media. This research found that science blogs have important roles in complementing other forms of science communication, opening aspects of science to wider view, promoting conversations about science through blog comments and social media, and exploiting digital tools to enhance communication. OPENING UP THE CONVERSATION: AN EXPLORATORY STUDY OF SCIENCE BLOGGERS by Gregory Michael Masters Thesis submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of Master of Arts 2013 Advisory Committee: Dr. Carol L. Rogers, Chair Dr. Ira Chinoy Carl Sessions Stepp © Copyright by Greg Masters 2013 PREFACE As teenagers, my brother and I would often drive far into Western Maryland to escape the city lights, parking at the edge of fields in the middle of nowhere to lie on the hood and peer at the stars.
    [Show full text]
  • Security Analysis of Browser Extension Concepts
    Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Bachelor's thesis Security Analysis of Browser Extension Concepts A comparison of Internet Explorer 9, Safari 5, Firefox 8, and Chrome 14 submitted by Karsten Knuth submitted January 14, 2012 Supervisor Prof. Dr. Michael Backes Advisors Raphael Reischuk Sebastian Gerling Reviewers Prof. Dr. Michael Backes Dr. Matteo Maffei Statement in Lieu of an Oath I hereby confirm that I have written this thesis on my own and that I have not used any other media or materials than the ones referred to in this thesis. Saarbr¨ucken, January 14, 2012 Karsten Knuth Declaration of Consent I agree to make both versions of my thesis (with a passing grade) accessible to the public by having them added to the library of the Computer Science Department. Saarbr¨ucken, January 14, 2012 Karsten Knuth Acknowledgments First of all, I thank Professor Dr. Michael Backes for giving me the chance to write my bachelor's thesis at the Information Security & Cryptography chair. During the making of this thesis I have gotten a deeper look in a topic which I hope to be given the chance to follow up in my upcoming academic career. Furthermore, I thank my advisors Raphael Reischuk, Sebastian Gerling, and Philipp von Styp-Rekowsky for supporting me with words and deeds during the making of this thesis. In particular, I thank the first two for bearing with me since the release of my topic. My thanks also go to Lara Schneider and Michael Zeidler for offering me helpful advice.
    [Show full text]
  • Top Comment Or Flop Comment? Predicting and Explaining User Engagement in Online News Discussions
    Top Comment or Flop Comment? Predicting and Explaining User Engagement in Online News Discussions Julian Risch, Ralf Krestel Hasso Plattner Institute, University of Potsdam, Germany fi[email protected] Abstract editors. This manual effort is costly and comes on top of the task of moderating hate speech and other banned content. Comment sections below online news articles enjoy growing Major news platforms allow users to upvote comments, popularity among readers. However, the overwhelming num- ber of comments makes it infeasible for the average news but for several reasons these platforms do not use votes as a consumer to read all of them and hinders engaging discus- ranking criterion for comments. First, there is the cold start sions. Most platforms display comments in chronological or- problem: Whenever a new comment is posted, it has not yet der, which neglects that some of them are more relevant to received any upvotes. An accordingly low rank affects the users and are better conversation starters. comment’s exposure to users and reduces its chance of ever In this paper, we systematically analyze user engagement in receiving any upvotes. Moreover, such a ranking algorithm the form of the upvotes and replies that a comment receives. can easily be gamed. Malicious users can register multiple Based on comment texts, we train a model to distinguish com- accounts or collaborate to break the ranking system and up- ments that have either a high or low chance of receiving many vote comments of their favored opinion. upvotes and replies. Our evaluation on user comments from Today’s platforms refrain from using an upvote-based TheGuardian.com compares recurrent and convolutional neu- ranking algorithm and simply sort comments chronologi- ral network models, and a traditional feature-based classifier.
    [Show full text]
  • Optimizing Windows 10, Build 2004, for a Virtual Desktop Role
    Optimizing Windows 10, Build 2004, for a Virtual Desktop role Written by Robert M. Smith, Program Manager, Azure Global Customer Engineering Date Created: May 12, 2020 Date Updated: July 08, 2020 Date Published: tbd Contributors: Tim Muessig, Senior Premier Field Engineer; Narklis Engler, Principal Program Manager Version 1.2 Document Change History Version Changes 1.0 Adding verbiage for Windows Virtual Desktop, and Windows 10 build 2004 specifically 1.1 Additional updates for 2004 1.2 Final pass, updated group policy, services, tasks, and added info about Storage Sense for disk cleanup. Introduction This article is intended to provide suggestions for configurations for Windows 10, build 2004, for optimal performance in Virtualized Desktop environments, including Virtual Desktop Infrastructure (VDI) and Windows Virtual Desktop (WVD). All settings in this guide are suggested optimization settings only and are in no way requirements. The information in this guide is pertinent to Windows 10, version 2004, operating system (OS) build 19041. The guiding principles to optimize performance of Windows 10 in a virtual desktop environment are to minimize graphic redraws and “effects”, background activities that have no major benefit to the virtual desktop environment, and generally reduce running processes to the bare minimum. A secondary goal is to reduce disk space usage in the base image to the bare minimum. With virtual desktop implementations, the smallest possible base, or “gold” image size, can slightly reduce memory utilization on the host system, as well as a small reduction in overall network operations required to deliver the desktop environment to the consumer. No optimizations should reduce the user experience.
    [Show full text]