To see the other types of publications on this topic, follow the link: Mobile computing.

Dissertations / Theses on the topic 'Mobile computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Mobile computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Houacine, Fatiha. "Service-Oriented Architecture for the Mobile Cloud Computing." Thesis, Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1110/document.

Full text
Abstract:
La croissance des appareils connectés, principalement due au grand nombre de déploiements de l'internet des objets et à l'émergence des services de cloud mobile, introduit de nouveaux défis pour la conception d'architectures de services dans le Cloud Computing Mobile (CCM) du cloud computing mobile. Nous montrons dans cette thèse comment l'architecture orientée services SOA peut être une solution clé pour fournir des services cloud mobiles distribués et comment la plate-forme OSGi peut être un cadre adaptatif et efficace pour fournir une telle implémentation. Nous adaptons le cadre CCM proposé à différents contextes d'architecture. Le premier est un modèle centré traditionnel, où les appareils mobiles sont réduits à consommer des services. Le second est un modèle distribué où la puissance de l'interaction de mobile à mobile offre des opportunités illimitées de services de valeur, et enfin, l'architecture à trois niveaux est considérée avec l'introduction de la notion de cloudlet. Pour chaque contexte, nous explorons la performance de notre cadre axé sur le service et le comparons à d'autres solutions existantes
The growth of connected devices, mostly due to the large number of internet of things IoT deployments and the emergence of mobile cloud services, introduces new challenges for the design of service architectures in mobile cloud computing MCC. An MCC framework should provide elasticity and scalability in a distributed and dynamic way while dealing with limited environment resources and variable mobile contexts web applications, real-time, enterprise services, mobile to mobile, hostile environment, etc. that may include additional constraints impacting the design foundation of cloud services. We show in this thesis how service-oriented architecture SOA can be a key solution to provide distributed mobile cloud services and how OSGi platform can be an adaptive and efficient framework to provide such implementation. We adapt the proposed MCC framework to different architecture contexts. The first one is a traditional centric model, where mobile devices are reduced to consuming services. The second one is a distributed model where the power of mobile-to-mobile interaction offers unlimited value-services opportunities, and finally, three-tier architecture is considered with the introduction of the cloudlet notion. For each context, we explore the performance of our service-oriented framework, and contrast it with alternative existing solutions
APA, Harvard, Vancouver, ISO, and other styles
2

Pamplona, Rodrigo Christovam. "Data replication in mobile computing." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16448.

Full text
Abstract:
With the advances of technology and the popularization of mobile devices, the need of researching and discussing subjects related to mobile devices has raised. One of the subjects that needs to be further analyzed is data replication. This study investigates data replication on mobile devices focusing on power consumption. It presents four different scenarios that propose, describe, apply and evaluate data replication mechanisms, with the purpose of finding the best scenario that presents less energy consumption. In order to make the experiments, Sun SPOT was chosen as a mobile device. This device is fully programmed in a java environment. A different software was created in each scenario in order to verify the performance of the mobile devices regarding energy saving. The results found did not meet the expectations. While trying to find the best scenario a hardware limitation was found. Although software can be easily changed to fix errors, hardware cannot be changed as easily. The implications for the hardware limitation found in this study prevented the results to be optimal. The results found also imply that new hardware should be used in further experimentation. As this study proved to be limited, it suggests that additional studies should be carried out applying the new version of the hardware used in this study.
APA, Harvard, Vancouver, ISO, and other styles
3

Pope, Steven Leslie. "Application support for mobile computing." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Phanse, Vivek 1974. "Enabling technology for mobile computing." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9034.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Materials Science and Engineering; and, (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.
Includes bibliographical references (p. 75).
A strategic, technical, and organizational examination of the customer enabling effort at Intel Corporation was undertaken. The context of this study was the launch of the first boxed mobile processor in the company's history. The technical component of the work consisted of the design and development of a thermal solution to complement the boxed processor. The organizational component involved an examination of the way the team was structured to execute the project. The strategic component looked at the effect of the enabling effort on the mobile computing industry at large. Thermal solutions that met the technical specifications of the boxed mobile processor were successfully designed and prototyped. The implication of a specific thermal solution design on the level of standardization of the notebook computer platform is discussed. The conclusion is that the level of standardization in the industry is already high and is unlikely to be influenced by the boxed mobile processor. Tactics for organizational structure design are suggested for future project staffing.
by Vivek Phanse.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
5

Jetter, Stefanie. "Ubiquitous Computing allgegenwärtige mobile Kommunikation /." [S.l. : s.n.], 2005. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11759328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

PREMOLI, MARCO LUIGI. "MOBILE EDGE COMPUTING NETWORK OPTIMIZATION." Doctoral thesis, Università degli Studi di Milano, 2018. http://hdl.handle.net/2434/543621.

Full text
Abstract:
Smart mobile devices are becoming more and more important in every aspects of human life, and mobile application are becoming more and more resources demanding with a widening gap between the required resources and those available on mobile devices. To bridge this gap, Mobile Edge Computing paradigm has been introduced to bring IT applications, computational and storage resources to the periphery, or edges, of the cellular mobile network. Several complementary technologies have been presented to implement Mobile Edge Computing, all of them considering the deployment of virtualization facilities within mobile access and backhaul network. In this thesis we face several optimization problems related to the planning of a Mobile Edge Computing Network. In the first part of the thesis we present the Mobile Edge Computing Network Design Problem (MNDP), that considers the design of a full mobile access and backhaul network together with the location of the virtualization facilities. Two variants of the problem are considered: either assuming a static condition of the network or dynamic variations of traffic demands and the human mobility that causes these variations. Matheuristics are proposed to solve MNDP and best practices are drawn on real world data. In the second part of the thesis, we face a tactical side of the optimal Mobile Edge Computing network planning, that is the routing in time of access point traffic to specific Mobile Edge Computing facilities on a fixed network structure. We present exact Branch-and-Price algorithm to solve the problem, experimenting on real-world dataset. Finally, driven by the fact that the knowledge of mobile user mobility represents a key data for the MNDP, in the third part of the thesis we face the problem of estimating human mobility given very aggregated data, that is the network traffic demand variations in time. We propose mathematical programming formulation and column generation algorithm to solve this problem, experimenting on both real-world and synthetic datasets.
APA, Harvard, Vancouver, ISO, and other styles
7

Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2000.
Thesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Zambrano, Jesus. "Mobile Cloud Computing: Offloading Mobile Processing to the Cloud." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/594.

Full text
Abstract:
The current proliferation of mobile systems, such as smart phones, PDA and tablets, has led to their adoption as the primary computing platforms for many users. This trend suggests that designers will continue to aim towards the convergence of functionality on a single mobile device. However, this convergence penalizes the mobile system in computational resources such as processor speed, memory consumption, disk capacity, as well as in weight, size, ergonomics and the user’s most important component, battery life. Therefore, this current trend aims towards the efficient and effective use of its hardware and software components. Hence, energy consumption and response time are major concerns when executing complex algorithms on mobile devices because they require significant resources to solve intricate problems. Current cloud computing environments for performing complex and data intensive computation remotely are likely to be an excellent solution for off-loading computation and data processing from mobile devices restricted by reduced resources. In cloud computing, virtualization enables a logical abstraction of physical components in a scalable manner that can overcome the physical constraint of resources. This optimizes IT infrastructure and makes cloud computing a worthy cost effective solution. The intent of this thesis is to determine the types of applications that are better suited to be off-loaded to the cloud from mobile devices. To this end, this thesis quantitatively and qualitatively compares the performance of executing two different kinds of workloads locally on two different mobile devices and remotely on two different cloud computing providers. The results of this thesis are expected to provide valuable insight to developers and architects of mobile applications by providing information on the applications that can be performed remotely in order to save energy and get better response times while remaining transparent to users.
APA, Harvard, Vancouver, ISO, and other styles
10

Houacine, Fatiha. "Service-Oriented Architecture for the Mobile Cloud Computing." Electronic Thesis or Diss., Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1110.

Full text
Abstract:
La croissance des appareils connectés, principalement due au grand nombre de déploiements de l'internet des objets et à l'émergence des services de cloud mobile, introduit de nouveaux défis pour la conception d'architectures de services dans le Cloud Computing Mobile (CCM) du cloud computing mobile. Nous montrons dans cette thèse comment l'architecture orientée services SOA peut être une solution clé pour fournir des services cloud mobiles distribués et comment la plate-forme OSGi peut être un cadre adaptatif et efficace pour fournir une telle implémentation. Nous adaptons le cadre CCM proposé à différents contextes d'architecture. Le premier est un modèle centré traditionnel, où les appareils mobiles sont réduits à consommer des services. Le second est un modèle distribué où la puissance de l'interaction de mobile à mobile offre des opportunités illimitées de services de valeur, et enfin, l'architecture à trois niveaux est considérée avec l'introduction de la notion de cloudlet. Pour chaque contexte, nous explorons la performance de notre cadre axé sur le service et le comparons à d'autres solutions existantes
The growth of connected devices, mostly due to the large number of internet of things IoT deployments and the emergence of mobile cloud services, introduces new challenges for the design of service architectures in mobile cloud computing MCC. An MCC framework should provide elasticity and scalability in a distributed and dynamic way while dealing with limited environment resources and variable mobile contexts web applications, real-time, enterprise services, mobile to mobile, hostile environment, etc. that may include additional constraints impacting the design foundation of cloud services. We show in this thesis how service-oriented architecture SOA can be a key solution to provide distributed mobile cloud services and how OSGi platform can be an adaptive and efficient framework to provide such implementation. We adapt the proposed MCC framework to different architecture contexts. The first one is a traditional centric model, where mobile devices are reduced to consuming services. The second one is a distributed model where the power of mobile-to-mobile interaction offers unlimited value-services opportunities, and finally, three-tier architecture is considered with the introduction of the cloudlet notion. For each context, we explore the performance of our service-oriented framework, and contrast it with alternative existing solutions
APA, Harvard, Vancouver, ISO, and other styles
11

Hall, Malcolm. "Contextual mobile adaptation." Thesis, Connect to e-thesis, 2008. http://theses.gla.ac.uk/240/.

Full text
Abstract:
Thesis (Ph.D.) - University of Glasgow, 2008.
Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, Department of Computing Science, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
APA, Harvard, Vancouver, ISO, and other styles
12

Kubach, Uwe. "Vorabübertragung ortsbezogener Informationen zur Unterstützung mobiler Systeme." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10252163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Oh, Sangyoon. "Web service architecture for mobile computing." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3229598.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2006.
"Title from dissertation home page (viewed July 11, 2007)." Source: Dissertation Abstracts International, Volume: 67-08, Section: B, page: 4529. Adviser: Geoffrey C. Fox.
APA, Harvard, Vancouver, ISO, and other styles
14

Leung, Adrian Ho Yin. "Securing mobile ubiquitous services trusted computing." Thesis, Royal Holloway, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wagealla, Waleed. "Reliable mobile agents for distributed computing." Thesis, Nottingham Trent University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272441.

Full text
Abstract:
The emergence of platform-independent, mobile code technologies has created big opportunities for Internet-based applications. Mobile agents are being utilized to perform a variety of tasks from personalized computing to business-critical transactions. Unfortunately, these advances were not matched by correspondent research into the reliability of these new technologies. This work has been undertaken to investigate the faulttolerance of this new paradigm. Agent programs' mobility and autonomy of execution has introduced a new class of failures different to that of traditional distributed systems. Therefore, fault tolerance is one of the main problems that must be resolved to improve the adoption of an agents' paradigm. The investigation of mobile agents reliability in this thesis resulted in the development of REMA (REliable Mobile Agents), which guarantees the reliable execution, migration, and communication of mobile agents in the presence of faults that might affect the agents hosts or their communication network. We introduced an algorithm for the transparent detection of faults that might affect agent execution, migration, and communication. A decentralized structure was used to divide the agent dynamic distributed system into network-partitioning proof spaces. Lightweight messaging was adopted as the basic error detection engine, which together with the loosely coupled detection managers provided an efficient, low overhead detection mechanism for agent-based distributed processing. The problem of taking checkpoint of agent execution is hampered by the lack of the accessibility of the underlying structure of the JVM. Thus, an alternative solution has been achieved through the REMA Checkpoint and Recovery (REMA-CR) package. REMA-CR provides the developer with powerful classes and methods that allow for capturing the critical data of agents' execution. The developed recovery protocol offers a communication-pairs, independent checkpointing strategy at a low-cost, that covers all possible faults that might invalidate reliable agent execution, migration and communication and maintains the exactly once execution property. The results and the performance of REMA confirmed our objectives of providing a fault tolerant wrapper for agents and their applications with acceptable overhead cost.
APA, Harvard, Vancouver, ISO, and other styles
16

Browne, James D. "Masterless Distributed Computing Over Mobile Devices." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17328.

Full text
Abstract:
Approved for public release; distribution is unlimited
It is obvious that information is becoming increasingly important in todays society. This can be seen by the widespread availability of high-speed Internet in homes and the ubiquity of smart phones. This new information centric paradigm is possible because of a large supporting infrastructure without which the Internet, the volumes of information, and the speed we can access them would not exist. The military has recognized the potential value of this trend because the greatest hindrance that any commander has is the fog of warthe absence of the information necessary to make critical decisions. On a battlefield, a commander would like to know the status and location of all of his soldiers, the same for enemy troops, and optimal strategies to accomplish their mission. Unfortunately this needed information is currently impossible to obtain in a timely manner. This thesis addresses these problems by presenting an architecture for ad-hoc distributed computing among mobile devices. Our results show that our system does indeed, as devices are added, speed up a distributed calculation and does it in a way that does not rely on the presence of a routable network. We also show that the speedup obtained nears optimal as the size of the computation necessary to calculate an update increases. Additionally, we have shown that we can chain distributed computations together resulting in a decreased amount of time needed to perform an SVD, an important step in many data-mining algorithms.
APA, Harvard, Vancouver, ISO, and other styles
17

Joseph, Anthony Douglas 1966. "Mobile computing with the Rover Toolkit." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46115.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaves 138-147).
by Anthony Douglas Joseph.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
18

Bruce, Richard James. "Algorithmic problems in mobile computing environments." Thesis, University of Leicester, 2003. http://hdl.handle.net/2381/30520.

Full text
Abstract:
A mobile computer has become a powerful tool. From laptop computers to cellular phones, in the past decade mobile computers have become prevalent in society. In this thesis we shall review and present various algorithms for use with mobile computers; in particular algorithms for mobile ad hoc wireless networks.;Routing problems in ad hoc wireless networks have been one of the most intensely studied areas of research. We shall review various routing algorithms presented by others, verify some of their results, and present our own algorithms for a particular type of routing called fan routing, along with statistical analysis.;The frequency assignment problem has been investigated for many years. We shall investigate two frequency assignment problems for mobile networks. The first uses a limited amount of information to compute an assignment for a host when it is added to a network, where the remainder of the hosts have already been assigned frequencies. We shall present our algorithms and compare them. The second looks at particular graphs, known as outerplanar graphs, and how to use the minimal amount of frequencies for these graphs.;The final area we shall investigate is efficient update strategies for geometric computing with uncertainty. That is, if you know a property of some objects is true; after some time, is this property still true even if the objects have moved? We present a generalised algorithm for verifying any given property and use this generalised algorithm for the maximal points problem.
APA, Harvard, Vancouver, ISO, and other styles
19

Rusanova, Olga, Alexander Korochkin, and Oleg Shevelo. "Scheduling problems for mobile cloud computing." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50689.

Full text
Abstract:
Nowadays the popularity of mobile devices is rapidly increased. New facilities of them (Wi-Fi, GPS, high speed processors etc.) allows to improve mobile applications in commerce, learning, gaming, health monitoring, sports etc. But really there are several reasons that limit mobile computing: limited storage capacity, limited battery life and limited processing power of mobile devices. This paper is dedicated to Mobile cloud computing (MCC). We consider MCC as combination of mobile and cloud computing where both data storage and data processing are performed outside the mobile device but inside the cloud.
APA, Harvard, Vancouver, ISO, and other styles
20

Paverd, Andrew James. "Enhanced mobile computing using cloud resources." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11063.

Full text
Abstract:
Summary in English.
Includes bibliographical references.
The purpose of this research is to investigate, review and analyse the use of cloud resources for the enhancement of mobile computing. Mobile cloud computing refers to a distributed computing relationship between a resource-constrained mobile device and a remote high-capacity cloud resource. Investigation of prevailing trends has shown that this will be a key technology in the development of future mobile computing systems. This research presents a theoretical analysis framework for mobile cloud computing. This analysis framework is a structured consolidation of the salient considerations identified in recent scientific literature and commercial endeavours. The use of this framework in the analysis of various mobile application domains has elucidated several significant benefits of mobile cloud computing including increases in system performance and efficiency. Based on recent scientific literature and commercial endeavours, various implementation approaches for mobile cloud computing have been identified, categorized and analysed according to their architectural characteristics. This has resulted in a set of advantages and disadvantages for each category of system architecture. Overall, through the development and application of the new analysis framework, this work provides a consolidated review and structured critical analysis of the current research and developments in the field of mobile cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
21

Reichart, Markus. "Workflow management in mobile computing environments." [S.l.] : Universität Stuttgart , Fakultät Informatik , Institut für Parallele und Verteilte Höchstleistungsrechner, Abteilung Verteilte Systeme, 2000. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8619091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ha, Kiryong. "System Infrastructure for Mobile-Cloud Convergence." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/704.

Full text
Abstract:
The convergence of mobile computing and cloud computing enables new mobile applications that are both resource-intensive and interactive. For these applications, end-to-end network bandwidth and latency matter greatly when cloud resources are used to augment the computational power and battery life of a mobile device. This dissertation designs and implements a new architectural element called a cloudlet, that arises from the convergence of mobile computing and cloud computing. Cloudlets represent the middle tier of a 3-tier hierarchy, mobile device — cloudlet—cloud, to achieve the right balance between cloud consolidation and network responsiveness. We first present quantitative evidence that shows cloud location can affect the performance of mobile applications and cloud consolidation. We then describe an architectural solution using cloudlets that are a seamless extension of todays cloud computing infrastructure. Finally, we define minimal functionalities that cloudlets must offer above/beyond standard cloud computing, and address corresponding technical challenges.
APA, Harvard, Vancouver, ISO, and other styles
23

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Full text
Abstract:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
25

林偉業 and Wai-yip Vincent Lum. "Effective content adaptation strategies for mobile computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31226450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lum, Wai-yip Vincent. "Effective content adaptation strategies for mobile computing /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B25151265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Delwadia, Vipul. "RemoteME: Experiments in Thin-Client Mobile Computing." Thesis, ResearchArchive@Victoria e-Thesis, 2009. http://eprints.rclis.org/16124/1/VipulDelwadia300069307MScThesis.pdf.

Full text
Abstract:
Mobile phones are ubiquitous, however they are vastly underpowered compared to their desktop counterparts. We propose a technique to play potentially resource intensive games over a network, and provide a prototype system called RemoteME which implements this technique. We also explore the responsiveness requirement for systems of this nature, establish benchmarks for responsiveness via user studies. We evaluate our implementation by measuring its responsiveness and comparing it to this benchmark.
APA, Harvard, Vancouver, ISO, and other styles
28

Hamrén, Oskar. "Mobile phones and cloud computing : A quantitative research paper on mobile phone application offloading by cloud computing utilization." Thesis, Umeå universitet, Institutionen för informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-60741.

Full text
Abstract:
The development of the mobile phone has been rapid. From being a device mainly usedfor phone calls and writing text messages the mobile phone of today, or commonlyreferred to as the smartphone, has become a multi-purpose device. Because of its size andthermal constraints there are certain limitations in areas of battery life andcomputational capabilities. Some say that cloud computing is just another buzzword, away to sell already existing technology. Others claim that it has the potential to transformthe whole IT-industry. This thesis is covering the intersection of these two fields byinvestigating if it is possible to increase the speed of mobile phones by offloadingcomputational heavy mobile phone application functions by using cloud computing. Amobile phone application was developed that conducts three computational heavy tests.The tests were run twice, by not using cloud computing offloading and by using it. Thetime taken to carry out the tests were saved and later compared to see if it is faster to usecloud computing in comparison to not use it. The results showed that it is not beneficial touse cloud computing to carry out these types of tasks; it is faster to use the mobile phone.
APA, Harvard, Vancouver, ISO, and other styles
29

Sylverberg, Tomas. "A Framework for Mobile Paper-based Computing." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8415.

Full text
Abstract:

Military work-practice is a difficult area of research where paper-based approaches are still extended. This thesis proposes a solution which permits the digitalization of information at the same time as workpractice remains unaltered for soldiers working with maps in the field. For this purpose, a mobile interactive paper-based platform has been developed which permits the users to maintain their current work-flow. The premise of the solution parts from a system consisting of a prepared paper-map, a cellular phone, a desktop computer, and a digital pen with bluetooth connection. The underlying idea is to permit soldiers to take advantage of the information a computerized system can offer, at the same time as the overhead it incurs is minimized. On one hand this implies that the solution must be light-weight, on the other it must retain current working procedures as far as possible. The desktop computer is used to develop new paper-driven applications through the application provided in the development framework, thus allowing the tailoring of applications to the changing needs of military operations. One major component in the application suite is a symbol recognizer which is capable of recognizing symbols parting from a template which can be created in one of the applications. This component permits the digitalization of information in the battlefield by drawing on the paper-map. The proposed solution has been found to be viable, but still there is a need for further development. Furthermore, there is a need to adapt the existing hardware to the requirements of the military to make it usable in a real-world situation.

APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Wei. "Cooperative Resource Sharing in Mobile Cloud Computing." 京都大学 (Kyoto University), 2015. http://hdl.handle.net/2433/199456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bridle, Robert Angus, and robert bridle@gmail com. "Adaptive User Interfaces for Mobile Computing Devices." The Australian National University. College of Engineering and Computer Sciences, 2008. http://thesis.anu.edu.au./public/adt-ANU20081117.184430.

Full text
Abstract:
This thesis examines the use of adaptive user interface elements on a mobile phone and presents two adaptive user interface approaches. The approaches attempt to increase the efficiency with which a user interacts with a mobile phone, while ensuring the interface remains predictable to a user. ¶ An adaptive user interface approach is presented that predicts the menu item a user will select. When a menu is opened, the predicted menu item is highlighted instead of the top-most menu item. The aim is to maintain the layout of the menu and to save the user from performing scrolling key presses. A machine learning approach is used to accomplish the prediction task. However, learning in the mobile phone environment produces several difficulties. These are limited availability of training examples, concept drift and limited computational resources. A novel learning approach is presented that addresses these difficulties. This learning approach addresses limited training examples and limited computational resources by employing a highly restricted hypothesis space. Furthermore, the approach addresses concept drift by determining the hypothesis that has been consistent for the longest run of training examples into the past. Under certain concept drift restrictions, an analysis of this approach shows it to be superior to approaches that use a fixed window of training examples. An experimental evaluation on data collected from several users interacting with a mobile phone was used to assess this learning approach in practice. The results of this evaluation are reported in terms of the average number of key presses saved. The benefit of menu-item prediction can clearly be seen, with savings of up to three key presses on every menu interaction. ¶ An extension of the menu-item prediction approach is presented that removes the need to manually specify a restricted hypothesis space. The approach uses a decision-tree learner to generate hypotheses online and uses the minimum description length principle to identify the occurrence of concept shifts. The identification of concept shifts is used to guide the hypothesis generation process. The approach is compared with the original menu-item prediction approach in which hypotheses are manually specified. Experimental results using the same datasets are reported. ¶ Another adaptive user interface approach is presented that induces shortcuts on a mobile phone interface. The approach is based on identifying shortcuts in the form of macros, which can automate a sequence of actions. A means of specifying relevant action sequences is presented, together with several learning approaches for predicting which shortcut to present to a user. A small subset of the possible shortcuts on a mobile phone was considered. This subset consisted of shortcuts that automated the actions of making a phone call or sending a text message. The results of an experimental evaluation of the shortcut prediction approaches are presented. The shortcut prediction process was evaluated in terms of predictive accuracy and stability, where stability was defined as the rate at which predicted shortcuts changed over time. The importance of stability is discussed, and is used to question the advantages of using sophisticated learning approaches for achieving adaptive user interfaces on mobile phones. Finally, several methods for combining accuracy and stability measures are presented, and the learning approaches are compared with these methods.
APA, Harvard, Vancouver, ISO, and other styles
32

Pinkerton, Michael David. "Ubiquitous computing : extending access to mobile data." Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Baraki, Harun [Verfasser]. "MOCCAA - MObile Cloud Computing AdaptAble / Harun Baraki." Kassel : Universitätsbibliothek Kassel, 2019. http://d-nb.info/1202721729/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Grace, Paul. "Overcoming middleware heterogeneity in mobile computing applications." Thesis, Lancaster University, 2004. http://eprints.lancs.ac.uk/41569/.

Full text
Abstract:
Recent technical advances have fuelled the popularity of mobile computing. Mobile devices such as smart phones and personal digital assistants are becoming more commonly used due to the reduction in their size and increase of computational power. In addition, wireless network hotspots (in airports, hotels and commercial outlets) are now beginning to populate the environment. With these advances, new types of mobile applications are becoming available to support users on the move. The mobile environment presents a number of challenges to application developers (including frequent network disconnection and variable bandwidth); therefore mobile middleware platforms have emerged to simplify the development process of distributed mobile applications. However, the range of platforms now available introduces the new problem of middleware heterogeneity, i.e., applications developed upon different types of middleware do not interoperate with one another. Hence, the next generation of mobile computing applications must be developed independently of specific middleware implementation to allow them to continue interoperating in new locations. This thesis investigates the problem of middleware heterogeneity in the mobile computing environment. The approach taken to solve this problem involves the development of a component-based, higher-level middleware framework (named ReMMoC) that can dynamically adapt its underlying behaviour between different concrete middleware implementations e.g. in one location CORBA is utilised, whereas at the next location SOAP is used. Furthermore, this framework promotes a higher-level programming abstraction based upon the abstract services concepts of the Web Services Architecture. The ReMMoC framework is evaluated to ensure that middleware transparency is achieved and that applications can be developed that will operate in unknown locations across unpredictable middleware implementation. Inevitably, the ability to overcome heterogeneity comes at the cost of an incurred performance overhead; hence, this thesis also evaluates the impact of this overhead in the domain of mobile computing.
APA, Harvard, Vancouver, ISO, and other styles
35

Wei, Jian. "Hybrid mobile computing for connected autonomous vehicles." Thesis, Aston University, 2018. http://publications.aston.ac.uk/37533/.

Full text
Abstract:
With increasing urbanization and the number of cars on road, there are many global issues on modern transport systems. Autonomous driving and connected vehicles are the most promising technologies to tackle these issues. The so-called integrated technology connected autonomous vehicles (CAV) can provide a wide range of safety applications for safer, greener and more efficient intelligent transport systems (ITS). As computing is an extreme component for CAV systems, various mobile computing models including mobile local computing, mobile edge computing and mobile cloud computing are proposed. However it is believed that none of these models fits all CAV applications, which have highly diverse quality of service (QoS) requirements such as communication delay, data rate, accuracy, reliability and/or computing latency. In this thesis, we are motivated to propose a hybrid mobile computing model with objective of overcoming limitations of individual models and maximizing the performances for CAV applications. In proposed hybrid mobile computing model three basic computing models and/or their combinations are chosen and applied to different CAV applications, which include mobile local computing, mobile edge computing and mobile cloud computing. Different computing models and their combinations are selected according to the QoS requirements of the CAV applications. Following the idea, we first investigate the job offloading and allocation of computing and communication resources at the local hosts and external computing centers with QoS aware and resource awareness. Distributed admission control and resource allocation algorithms are proposed including two baseline non-cooperative algorithms and a matching theory based cooperative algorithm. Experiment results demonstrate the feasibility of the hybrid mobile computing model and show large improvement on the service quality and capacity over existing individual computing models. The matching algorithm also largely outperforms the baseline non-cooperative algorithms. In addition, two specific use cases of the hybrid mobile computing for CAV applications are investigated: object detection with mobile local computing where only local computing resources are used, and movie recommendation with mobile cloud computing where remote cloud resources are used. For object detection, we focus on the challenges of detecting vehicles, pedestrians and cyclists in driving environment and propose three methods to an existing CNN based object detector. Large detection performance improvement is obtained over the KITTI benchmark test dataset. For movie recommendation we propose two recommendation models based on a general framework of integrating machine learning and collaborative filtering approach. The experiment results on Netflix movie dataset show that our models are very effective for cold start items recommendation.
APA, Harvard, Vancouver, ISO, and other styles
36

Vieira, André Fonseca dos Santos Dias. "Context-aware personalization environment for mobile computing." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8649.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Currently, we live in a world where the amount of on-line information vastly outstrips any individual’s capability to survey it. Filtering that information in order to obtain only useful and interesting information is a solution to this problem. The mobile computing area proposes to integrate computation in users’ daily activities in an unobtrusive way, in order to guarantee an improvement in their experience and quality of life. Furthermore, it is crucial to develop smaller and more intelligent devices to achieve this area’s goals, such as mobility and energy savings. This computing area reinforces the necessity to filter information towards personalization due to its humancentred paradigm. In order to attend to this personalization necessity, it is desired to have a solution that is able to learn the users preferences and needs, resulting in the generation of profiles that represent each style of interaction between a user and an application’s resources(e.g. buttons and menus). Those profiles can be obtained by using machine learning algorithms that use data derived from the user interaction with the application, combined with context data and explicit user preferences. This work proposes an environment with a generic context-aware personalization model and a machine learning module. It is provided the possibility to personalize an application, based on user profiles obtained from data, collected from implicit and explicit user interaction. Using a provided personalization API (Application Programming Interface) and other configuration modules, the environment was tested on LEY (Less energy Empowers You), a persuasive mobile-based serious game to help people understand domestic energy usage.
APA, Harvard, Vancouver, ISO, and other styles
37

Alessi, Marco. "Spatial computing per dispositivi mobile ed embedded." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8618/.

Full text
Abstract:
Questa tesi si focalizza sulle possibili tecnologie per realizzare comunicazioni opportunistiche fra dispositivi mobile ed embedded, con l'obiettivo di integrarle nel contesto di sistemi a larga scala situati, e con particolare riferimento al prototipo denominato "Magic Carpet". Vengono considerate in particolare le tecnologie WiFi ad-hoc e Bluetooth Low Energy su Android e Raspberry Pi.
APA, Harvard, Vancouver, ISO, and other styles
38

Moran, Kevin Patrick. "Automating Software Development for Mobile Computing Platforms." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153845.

Full text
Abstract:
Mobile devices such as smartphones and tablets have become ubiquitous in today's computing landscape. These devices have ushered in entirely new populations of users, and mobile operating systems are now outpacing more traditional "desktop" systems in terms of market share. The applications that run on these mobile devices (often referred to as "apps") have become a primary means of computing for millions of users and, as such, have garnered immense developer interest. These apps allow for unique, personal software experiences through touch-based UIs and a complex assortment of sensors. However, designing and implementing high quality mobile apps can be a difficult process. This is primarily due to challenges unique to mobile development including change-prone APIs and platform fragmentation, just to name a few. in this dissertation we develop techniques that aid developers in overcoming these challenges by automating and improving current software design and testing practices for mobile apps. More specifically, we first introduce a technique, called Gvt, that improves the quality of graphical user interfaces (GUIs) for mobile apps by automatically detecting instances where a GUI was not implemented to its intended specifications. Gvt does this by constructing hierarchal models of mobile GUIs from metadata associated with both graphical mock-ups (i.e., created by designers using photo-editing software) and running instances of the GUI from the corresponding implementation. Second, we develop an approach that completely automates prototyping of GUIs for mobile apps. This approach, called ReDraw, is able to transform an image of a mobile app GUI into runnable code by detecting discrete GUI-components using computer vision techniques, classifying these components into proper functional categories (e.g., button, dropdown menu) using a Convolutional Neural Network (CNN), and assembling these components into realistic code. Finally, we design a novel approach for automated testing of mobile apps, called CrashScope, that explores a given android app using systematic input generation with the intrinsic goal of triggering crashes. The GUI-based input generation engine is driven by a combination of static and dynamic analyses that create a model of an app's GUI and targets common, empirically derived root causes of crashes in android apps. We illustrate that the techniques presented in this dissertation represent significant advancements in mobile development processes through a series of empirical investigations, user studies, and industrial case studies that demonstrate the effectiveness of these approaches and the benefit they provide developers.
APA, Harvard, Vancouver, ISO, and other styles
39

Tang, Yutao. "Exploring New Paradigms for Mobile Edge Computing." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550154000.

Full text
Abstract:
Edge computing has been rapidly growing in recent years to meet the surging demands from mobile apps and Internet of Things (IoT). Similar to the Cloud, edge computing provides computation, storage, data, and application services to the end-users. However, edge computing is usually deployed at the edge of the network, which can provide low-latency and high-bandwidth services for end devices. So far, edge computing is still not widely adopted. One significant challenge is that the edge computing environment is usually heterogeneous, involving various operating systems and platforms, which complicates app development and maintenance. in this dissertation, we explore to combine edge computing with virtualization techniques to provide a homogeneous environment, where edge nodes and end devices run exactly the same operating system. We develop three systems based on the homogeneous edge computing environment to improve the security and usability of end-device applications. First, we introduce vTrust, a new mobile Trusted Execution Environment (TEE), which offloads the general execution and storage of a mobile app to a nearby edge node and secures the I/O between the edge node and the mobile device with the aid of a trusted hypervisor on the mobile device. Specifically, vTrust establishes an encrypted I/O channel between the local hypervisor and the edge node, such that any sensitive data flowing through the hosted mobile OS is encrypted. Second, we present MobiPlay, a record-and-replay tool for mobile app testing. By collaborating a mobile phone with an edge node, MobiPlay can effectively record and replay all types of input data on the mobile phone without modifying the mobile operating system. to do so, MobiPlay runs the to-be-tested application on the edge node under exactly the same environment as the mobile device and allows the tester to operate the application on a mobile device. Last, we propose vRent, a new mechanism to leverage smartphone resources as edge node based on Xen virtualization and MiniOS. vRent aims to mitigate the shortage of available edge nodes. vRent enforces isolation and security by making the users' android OSes as Guest OSes and rents the resources to a third-party in the form of MiniOSes.
APA, Harvard, Vancouver, ISO, and other styles
40

Bridle, Robert Angus. "Adaptive user interfaces for mobile computing devices /." View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081117.184430/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Le, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148/document.

Full text
Abstract:
Nous vivons aujourd’hui dans l'ère cybernétique où de nouvelles technologies naissent chaque jour avec la promesse de rendre la vie humaine plus confortable, pratique et sûre. Parmi ces nouvelles technologies, l'informatique mobile se développe en influençant la vie de l’utilisateur. En effet, les plates-formes mobiles (smartphone, tablette) sont devenues les meilleurs compagnons de l’utilisateur pour mener à bien ses activités quotidiennes, comme les activités commerciales ou de divertissement. En jouant ces rôles importants, les plates-formes mobiles doivent opérer dans des environnements de confiance. Dans cette thèse, nous étudions la sécurité des plates-formes mobiles en passant d’un niveau de sécurité primitif qui s’appuie sur les plates-formes de confiance, à un niveau plus sophistiqué qui se base sur de l’intelligence bio-inspirée. Plus précisément, après avoir abordé les défis du cloud computing mobile (MCC), nous développons une étude de cas appelée Droplock pour le cloud mobile et nous étudions son efficacité énergétique et ses performances pour illustrer le modèle MCC. En outre, en s’appuyant sur les plates-formes de confiance (comme les TPM), nous avons introduit un nouveau schéma d'attestation à distance pour sécuriser les plates-formes mobiles dans le contexte du cloud mobile. Pour améliorer le niveau de sécurité et être adaptatif au contexte, nous avons utilisé de la logique floue combinant un système de colonies de fourmis pour évaluer la confiance et la réputation du cloud mobile basé sur la notion de cloudlets
As living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important roles, mobile devices deserve to work in the environment which they can trust for serving us better. In this thesis, we investigate the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence). More precisely, after addressing the challenges of mobile cloud computing (MCC), we have studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, as well as proposed a demonstration of particular MCC model, called Droplock system. Moreover, taking advantages of trusted platform module functionality, we introduced a novel schema of remote attestation to secure mobile devices in the context of Mobile-Cloud based solution. To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on the cloudlet notion
APA, Harvard, Vancouver, ISO, and other styles
42

Le, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148.

Full text
Abstract:
Nous vivons aujourd’hui dans l'ère cybernétique où de nouvelles technologies naissent chaque jour avec la promesse de rendre la vie humaine plus confortable, pratique et sûre. Parmi ces nouvelles technologies, l'informatique mobile se développe en influençant la vie de l’utilisateur. En effet, les plates-formes mobiles (smartphone, tablette) sont devenues les meilleurs compagnons de l’utilisateur pour mener à bien ses activités quotidiennes, comme les activités commerciales ou de divertissement. En jouant ces rôles importants, les plates-formes mobiles doivent opérer dans des environnements de confiance. Dans cette thèse, nous étudions la sécurité des plates-formes mobiles en passant d’un niveau de sécurité primitif qui s’appuie sur les plates-formes de confiance, à un niveau plus sophistiqué qui se base sur de l’intelligence bio-inspirée. Plus précisément, après avoir abordé les défis du cloud computing mobile (MCC), nous développons une étude de cas appelée Droplock pour le cloud mobile et nous étudions son efficacité énergétique et ses performances pour illustrer le modèle MCC. En outre, en s’appuyant sur les plates-formes de confiance (comme les TPM), nous avons introduit un nouveau schéma d'attestation à distance pour sécuriser les plates-formes mobiles dans le contexte du cloud mobile. Pour améliorer le niveau de sécurité et être adaptatif au contexte, nous avons utilisé de la logique floue combinant un système de colonies de fourmis pour évaluer la confiance et la réputation du cloud mobile basé sur la notion de cloudlets
As living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important roles, mobile devices deserve to work in the environment which they can trust for serving us better. In this thesis, we investigate the way to secure mobile devices from the primitive security level (Trusted Platforms) to the sophisticated one (bio-inspired intelligence). More precisely, after addressing the challenges of mobile cloud computing (MCC), we have studied the real-case of mobile cloud computing, in terms of energy efficiency and performance, as well as proposed a demonstration of particular MCC model, called Droplock system. Moreover, taking advantages of trusted platform module functionality, we introduced a novel schema of remote attestation to secure mobile devices in the context of Mobile-Cloud based solution. To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on the cloudlet notion
APA, Harvard, Vancouver, ISO, and other styles
43

Rügge, Ingrid Herzog Otthein. "Mobile solutions : Einsatzpotenziale, Nutzungsprobleme und Lösungsansätze /." Wiesbaden : Dt. Univ.-Verl, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016228009&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yu, Shuai. "Multi-user computation offloading in mobile edge computing." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS462.

Full text
Abstract:
Mobile Edge Computing (MEC) est un modèle informatique émergent qui étend le cloud et ses services à la périphérie du réseau. Envisager l'exécution d'applications émergentes à forte intensité de ressources dans le réseau MEC, le déchargement de calcul est un paradigme éprouvé réussi pour activer des applications gourmandes en ressources sur les appareils mobiles. De plus, compte tenu de l'émergence de l'application collaborative mobile (MCA), les tâches déchargées peuvent être dupliquées lorsque plusieurs utilisateurs se trouvent à proximité. Cela nous motive à concevoir un schéma de déchargement de calcul collaboratif pour un réseau MEC multi-utilisateurs. Dans ce contexte, nous étudions séparément les schémas de déchargement par calcul collaboratif pour les scénarios de déchargement de MEC, de déchargement de périphérique à périphérique (D2D) et de déchargement hybride, respectivement. Dans le scénario de déchargement de MEC, nous supposons que plusieurs utilisateurs mobiles déchargent des tâches de calcul dupliquées sur les serveurs de périphérie du réseau et partagent les résultats de calcul entre eux. Notre objectif est de développer les stratégies optimales de déchargement collaboratif avec des améliorations de mise en cache afin de minimiser le délai d'exécution global du côté du terminal mobile. À cette fin, nous proposons un déchargement optimal avec un schéma d'amélioration de la mise en cache (OOCS) pour le scénario femto-cloud et le scénario d'informatique mobile, respectivement. Les résultats de la simulation montrent que comparé à six solutions alternatives dans la littérature, notre OOCS mono-utilisateur peut réduire les délais d'exécution jusqu'à 42,83% et 33,28% respectivement pour le femto-cloud mono-utilisateur et l'informatique mobile mono-utilisateur. D'un autre côté, notre système OOCS multi-utilisateur peut encore réduire le délai de 11,71% par rapport à l'OOCS mono-utilisateur grâce à la coopération des utilisateurs. Dans le scénario de déchargement D2D, nous supposons que lorsque des tâches de calcul en double sont traitées sur des utilisateurs mobiles spécifiques et que les résultats de calcul sont partagés via le canal de multidiffusion Device-to-Device (D2D). Notre objectif ici est de trouver une partition réseau optimale pour le déchargement multicast D2D, afin de minimiser la consommation d'énergie globale du côté du terminal mobile. À cette fin, nous proposons d'abord un cadre de déchargement de calcul basé sur la multidiffusion D2D où le problème est modélisé comme un problème d'optimisation combinatoire, puis résolu en utilisant les concepts de correspondance bipartite pondérée maximale et de jeu de coalition. Notez que notre proposition considère la contrainte de délai pour chaque utilisateur mobile ainsi que le niveau de la batterie pour garantir l'équité. Pour évaluer l'efficacité de notre proposition, nous simulons trois composants interactifs typiques. Les résultats de la simulation montrent que notre algorithme peut réduire considérablement la consommation d'énergie et garantir l'équité de la batterie entre plusieurs utilisateurs en même temps. Nous étendons ensuite le déchargement du D2D au déchargement hybride en tenant compte des relations sociales. Dans ce contexte, nous proposons un cadre d'exécution de tâches hybride multicast pour l'informatique mobile, où une foule d'appareils mobiles à la périphérie du réseau s'appuient sur la collaboration D2D assistée par réseau pour l'informatique distribuée sans fil et le partage des résultats. Le cadre est socialement conscient afin de construire des liens D2D efficaces. Un objectif clé de ce cadre est de mettre en place une politique d'attribution de tâches écoénergétique pour les utilisateurs mobiles. Pour ce faire, nous introduisons d'abord le modèle de système de déchargement de calcul hybride social-aware, puis nous formulons le problème d'affectation de tâches économe en énergie en prenant en compte les contraintes nécessaires [...]
Mobile Edge Computing (MEC) is an emerging computing model that extends the cloud and its services to the edge of the network. Consider the execution of emerging resource-intensive applications in MEC network, computation offloading is a proven successful paradigm for enabling resource-intensive applications on mobile devices. Moreover, in view of emerging mobile collaborative application (MCA), the offloaded tasks can be duplicated when multiple users are in the same proximity. This motivates us to design a collaborative computation offloading scheme for multi-user MEC network. In this context, we separately study the collaborative computation offloading schemes for the scenarios of MEC offloading, device-to-device (D2D) offloading and hybrid offloading, respectively. In the MEC offloading scenario, we assume that multiple mobile users offload duplicated computation tasks to the network edge servers, and share the computation results among them. Our goal is to develop the optimal fine-grained collaborative offloading strategies with caching enhancements to minimize the overall execution delay at the mobile terminal side. To this end, we propose an optimal offloading with caching-enhancement scheme (OOCS) for femto-cloud scenario and mobile edge computing scenario, respectively. Simulation results show that compared to six alternative solutions in literature, our single-user OOCS can reduce execution delay up to 42.83% and 33.28% for single-user femto-cloud and single-user mobile edge computing, respectively. On the other hand, our multi-user OOCS can further reduce 11.71% delay compared to single-user OOCS through users' cooperation. In the D2D offloading scenario, we assume that where duplicated computation tasks are processed on specific mobile users and computation results are shared through Device-to-Device (D2D) multicast channel. Our goal here is to find an optimal network partition for D2D multicast offloading, in order to minimize the overall energy consumption at the mobile terminal side. To this end, we first propose a D2D multicast-based computation offloading framework where the problem is modelled as a combinatorial optimization problem, and then solved using the concepts of from maximum weighted bipartite matching and coalitional game. Note that our proposal considers the delay constraint for each mobile user as well as the battery level to guarantee fairness. To gauge the effectiveness of our proposal, we simulate three typical interactive components. Simulation results show that our algorithm can significantly reduce the energy consumption, and guarantee the battery fairness among multiple users at the same time. We then extend the D2D offloading to hybrid offloading with social relationship consideration. In this context, we propose a hybrid multicast-based task execution framework for mobile edge computing, where a crowd of mobile devices at the network edge leverage network-assisted D2D collaboration for wireless distributed computing and outcome sharing. The framework is social-aware in order to build effective D2D links [...]
APA, Harvard, Vancouver, ISO, and other styles
45

Brander, William. "A model for adaptive multimodal mobile notification." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/699.

Full text
Abstract:
Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
APA, Harvard, Vancouver, ISO, and other styles
46

Barrios, Rita M., and Michael R. Lehrfeld. "Mobile Device Management: Policies for a Secured Mobile Workforce." Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/3045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Thomas, Godwin Dogara Ayenajeh. "A framework for secure mobile computing in healthcare." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/618.

Full text
Abstract:
Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
APA, Harvard, Vancouver, ISO, and other styles
48

Shi, Cong. "Addressing connectivity challenges for mobile computing and communication." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52252.

Full text
Abstract:
Mobile devices are increasingly being relied on for computation intensive and/or communication intensive applications that go beyond simple connectivity and demand more complex processing. This has been made possible by two trends. First, mobile devices, such as smartphones and tablets, are increasingly capable devices with processing and storage capabilities that make significant step improvements with every generation. Second, many improved connectivity options (e.g., 3G, WiFi, Bluetooth) are also available to mobile devices. In the rich computing and communication environment, it is promising but also challenging for mobile devices to take advantage of various available resources to improve the performance of mobile applications. First, with varying connectivity, remote computing resources are not always accessible to mobile devices in a predictable way. Second, given the uncertainty of connectivity and computing resources, their contention will become severe. This thesis seeks to address the connectivity challenges for mobile computing and communication. We propose a set of techniques and systems that help mobile applications to better handle the varying network connectivity in the utilization of various computation and communication resources. This thesis makes the following contributions: We design and implement Serendipity to allow a mobile device to use other encountered, albeit intermittently, mobile devices to speedup the execution of parallel applications through carefully allocating computation tasks among intermittently connected mobile devices. We design and implement IC-Cloud to enable a group of mobile devices to efficiently use the cloud computing resources for computation offloading even when the connectivity is varying or intermittent. We design and implement COSMOS to provide scalable computation offloading service to mobile devices at low cost by efficiently managing and allocating cloud computing resources. We design and implement CoAST to allow collaborative application-aware scheduling of mobile traffic to reduce the contention for bandwidth among communication-intensive applications without affecting their user experience.
APA, Harvard, Vancouver, ISO, and other styles
49

Pakkala, Daniel. "Lightweight distributed service platform for adaptive mobile services /." Espoo [Finland] : VTT Technical Research Centre of Finland, 2004. http://www.vtt.fi/inf/pdf/publications/2004/P519.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rosenberg, Robert. "Computing without mice and keyboards : text and graphic input devices for mobile computing." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography