Detecting User-Perceived Failure in Mobile Applications via Mining User Traces

@article{Tian2021DetectingUF,
  title={Detecting User-Perceived Failure in Mobile Applications via Mining User Traces},
  author={Deyu Tian},
  journal={2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)},
  year={2021},
  pages={123-125}
}
  • Deyu Tian
  • Published 24 March 2021
  • Computer Science
  • 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
Mobile applications (apps) often suffer from failure nowadays. Developers usually pay more attention to the failure that is perceived by users and compromises the user experience. Existing approaches focus on mining large volume logs to detect failure, however, to our best knowledge, there is no approach focusing on detecting whether users have actually perceived failure, which directly influence the user experience. In this paper, we propose a novel approach to detecting user-perceived failure… 

Figures from this paper

References

SHOWING 1-10 OF 31 REFERENCES

Clickstream User Behavior Models

TLDR
This article proposes clickstream models to characterize user behavior in large online services and builds an unsupervised system that aims to capture and understand the fine-grained user behavior.

Characterizing typical and atypical user sessions in clickstreams

TLDR
The approach to identify typical and atypical user sessions is based on detecting outliers using Mahalanobis distance in the user session space and incorporates several key clickstream characteristics including a novel conformance score obtained by Markov Chain analysis.

Detecting Malicious Social Bots Based on Clickstream Sequences

TLDR
A novel method of detecting malicious social bots, including both features selection based on the transition probability of clickstream sequences and semi-supervised clustering, is presented, which not only analyzes transition probabilities of user behavior clickstreams but also considers the time feature of behavior.

Experience Report: System Log Analysis for Anomaly Detection

TLDR
A detailed review and evaluation of six state-of-the-art log-based anomaly detection methods, including three supervised methods and three unsupervised methods, and also releases an open-source toolkit allowing ease of reuse.

Log Clustering Based Problem Identification for Online Service Systems

TLDR
Through experiments on two Hadoop-based applications and two large-scale Microsoft online service systems, it is shown that the LogCluster approach is effective and outperforms the state-of-the-art work proposed by Shang et al. in ICSE 2013.

Characterizing and Forecasting User Engagement with In-App Action Graph: A Case Study of Snapchat

TLDR
This paper proposes to formalize individual user's in-app action transition patterns as a temporally evolving action graph, and analyze its characteristics in terms of informing future user engagement, and designs an end-to-end, multi-channel neural model to encode both temporal action graphs, activity sequences, and other macroscopic features.

Detecting large-scale system problems by mining console logs

TLDR
This work first parse console logs by combining source code analysis with information retrieval to create composite features, and then analyzes these features using machine learning to detect operational problems to automatically detect system runtime problems.

Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection

TLDR
This work targets minimal human intervention for logfile processing and proposes a new approach that considers logs as regular text, which allows to leverage modern techniques from natural language processing and shows a strong predictive performance using three out-of-the-box classifiers.

LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs

TLDR
Empowered by template2vec, a novel, simple yet effective method to extract the semantic information hidden in log templates, LogAnomaly can detect both sequential and quantitive log anomalies simultaneously, which has not been done by any previous work.

LogLens: A Real-Time Log Analysis System

TLDR
This paper presents a real-time log analysis system called LogLens that automates the process of anomaly detection from logs with no (or minimal) target system knowledge and user specification, and presents an extensible system for supporting both stateless and stateful log analysis applications.