Dissertations / Theses on the topic 'Mobile computing - Computer system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Mobile computing - Computer system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ceran, Onur. "A Context Aware Emergency Management System Using Mobile Computing." Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615606/index.pdf.
Full textPrabhu, Nitin Kumar Vijay. "Transaction processing in Mobile Database System." Diss., UMK access, 2006.
Find full text"A dissertation in computer science and informatics and telecommunications and computer networking." Advisor: Vijay Kumar. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 152-157). Online version of the print edition.
周彧 and Yuk Chow. "A light-weight mobile code system for pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.
Full textPinkerton, Michael David. "Ubiquitous computing : extending access to mobile data." Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.
Full textLiu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.
Full textBerrios, Moron Jonathan Glenn. "Quality of Experience Provisioning in Mobile Cloud Computing." Thesis, Luleå tekniska universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70837.
Full textMomin, Kaleem A. "A transaction execution model for mobile computing environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.
Full textBridle, Robert Angus. "Adaptive user interfaces for mobile computing devices /." View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081117.184430/index.html.
Full textWarshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.
Full textDrakatos, Stylianos. "Context-aware data caching for mobile computing environments." FIU Digital Commons, 2006. http://digitalcommons.fiu.edu/etd/3082.
Full textAshbrook, Daniel Lee. "Enabling mobile microinteractions." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33986.
Full textDelwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.
Full textStearns, Cameron P. cstearns. "A SYSTEM FOR CELL PHONE ANTI-THEFT THROUGH GAIT RECOGNITION." DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1216.
Full textAzam, A. S. M. Faruque, and Markus Johnsson. "Mobile One Time Passwords and RC4 Encryption for Cloud Computing." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14661.
Full textTiwari, Shivendra Prasad. "Erection of interesting geospatial regions in the context of on-the-spot learning." Thesis, IIT Delhi, 2016. http://localhost:8080/iit/handle/2074/7045.
Full text翁楚灝 and Chor-ho Yung. "A mobile object container for dynamic component composition." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31225573.
Full textYung, Chor-ho. "A mobile object container for dynamic component composition." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23234428.
Full textSong, Xiang. "Seamless mobility in ubiquitous computing environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24671.
Full textCommittee Chair: Ramachandran, Umakishore; Committee Member: Ahamad, Mustaque; Committee Member: Edwards, Keith; Committee Member: Liu, Ling; Committee Member: Suh, Sang-bum
Chan, Yew Meng. "Processing mobile read-only transactions in broadcast environments with group consistency /." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b19887504a.pdf.
Full text"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 98-102)
Chen, Jianwen, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Data and knowledge transaction in mobile environments." THESIS_CSTE_CIT_Chen_J.xml, 2004. http://handle.uws.edu.au:8081/1959.7/806.
Full textDoctor of Philosophy (PhD) (Science)
Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
Hill, Ryan Tebbutt. "Adaptive interfaces for mobile preference-based searching." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1248.
Full textChau, Ming Kit. "Quality of service routing in mobile ad hoc networks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20CHAU.
Full textIncludes bibliographical references (leaves 156-159). Also available in electronic version. Access restricted to campus users.
Liu, Yu. "Power-based routing schemes for mobile ad hoc networks /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20LIUY.
Full textIncludes bibliographical references (leaves 137-142). Also available in electronic version. Access restricted to campus users.
Jiang, Haotian. "WEARABLE COMPUTING TECHNOLOGIES FOR DISTRIBUTED LEARNING." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1571072941323463.
Full textSundaram, Madhu, and Kejvan Redjamand. "Strategy of Mobile Communication System Providers in Cloud (Implementation of cloud in telecom by Ericsson)." Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2814.
Full textZhao, Xiaogeng. "A comparative analysis of Java and .NET mobile development environments for supporting mobile services." Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1003064.
Full textKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Chen, Jianwen. "Data and knowledge transaction in mobile environments." Thesis, View thesis, 2004. http://handle.uws.edu.au:8081/1959.7/806.
Full textDarling, James Campbell Charles. "The application of distributed and mobile computing techniques to advanced simulation and virtual reality systems." Thesis, University of Surrey, 1998. http://epubs.surrey.ac.uk/843917/.
Full textKarlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.
Full textCailean, Diana Andreea, and Kobra Sharifi. "Mobile ERP : A literature review on the concept of Mobile ERP systems." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-23522.
Full textTsai, Chia-Yu. "Prescription Express System." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2400.
Full textDey, Anind K. "Providing architectural support for building context-aware applications." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/9232.
Full textChen, Jianwen. "Data and knowledge transaction in mobile environments." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050729.131812/index.html.
Full textA thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy (Science) - Computing and Information Technology. Includes bibliography.
Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.
Full textLe, Dantec Christopher. "Community resource messenger: a mobile system and design exploration in support of the urban homeless." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41128.
Full textHu, Cheng. "Bio-inspired visual motion sensing systems for mobile robots." Thesis, University of Lincoln, 2017. http://eprints.lincoln.ac.uk/32117/.
Full textBani, Yassein Muneer O. "On the performance of probabilistic flooding in wireless mobile ad hoc networks." Thesis, Connect to e-thesis, 2006. http://theses.gla.ac.uk/720/.
Full textPh.D. thesis submitted to the Faculty of Information and Mathematical Sciences, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
Xu, Zichen. "Energy Modeling and Management for Data Services in Multi-Tier Mobile Cloud Architectures." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1468272637.
Full textSeshasayee, Balasubramanian. "Middleware-based services for virtual cooperative mobile platforms." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24791.
Full textCommittee Chair: Schwan, Karsten; Committee Member: Fujimoto, Richard; Committee Member: Narasimhan, Nitya; Committee Member: Pande, Santosh; Committee Member: Riley, George.
Jacobs, Gershwin. "User experience guidelines for mobile natural user interfaces: a case study of physically disabled users." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/17547.
Full textZhou, Junyang. "Enhanced signal propagation models and algorithm selector for providing location estimation services within cellular radio networks." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/776.
Full textKaddour, Inan. "Mobile Cloud Computing: A Comparison Study of Cuckoo and AIOLOS Offloading Frameworks." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/785.
Full textChong, Ming Ki. "Usable Authentication for Mobile Banking." Thesis, University of Cape Town, 2009. http://pubs.cs.uct.ac.za/archive/00000520/.
Full textImsuksri, Sumit. "Mobile order entry system based on the wireless technology." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2265.
Full textKeshariya, Mayank. "Extended Policy-Based Management Framework to Provide Always Best Connected Services in Heterogeneous Mobile Environments." Thesis, University of Canterbury. Computer Science and Software Engineering, 2009. http://hdl.handle.net/10092/2549.
Full textHightower, Jeffrey. "The location stack /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6917.
Full textZhu, Manli. "On processing spatial queries in mobile client/server environments /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20ZHU.
Full textMihailescu, Patrik 1977. "MAE : a mobile agent environment for resource limited devices." Monash University, School of Network Computing, 2003. http://arrow.monash.edu.au/hdl/1959.1/5805.
Full textCheung, Kin Pong. "Performance evaluation of scheduling algorithms on Bluetooth piconet and scatternet network /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20CHEUNG.
Full textIncludes bibliographical references (leaves 63-66). Also available in electronic version. Access restricted to campus users.