Academic literature on the topic 'Symbian OS (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symbian OS (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Symbian OS (Computer file)"

1

Sun, Hairong. "Symbian OS Communications Programming." Computer Communications 27, no. 13 (August 2004): 1354. http://dx.doi.org/10.1016/j.comcom.2004.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pooters, Ivo. "Full user data acquisition from Symbian smart phones." Digital Investigation 6, no. 3-4 (May 2010): 125–35. http://dx.doi.org/10.1016/j.diin.2010.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cassinda Quissanga, Fernando. "Characterization of cellular mobile operating systems: Android, Symbian, iphone and Windows phone." Project, Design and Management 1, no. 2 (November 18, 2019): 75–88. http://dx.doi.org/10.35992/pdm.v1i2.200.

Full text
Abstract:
The present theme refers to the characterization of cellular mobile operating systems: Android, Symbian, iPhone, Windows Phone. To present which of the cellular mobile operating systems, is the most secure and the most susceptible to computer viruses, the qualitative methodology based on the bibliographic reference, data collected in books, technical manuals, manufacturer information and on internet sites; to the analysis of the documentary data, done in tables. However, it is concluded that not all types of computer viruses infect cell phones, it depends on the kernel of the operating system. It was possible to know that Symbian is the operating system most prone to contamination of computer viruses, this operating system is made of a C ++ programming language coming from the C language one of the most popular and has many developers. Android is a mobile operating system, not so secure, based on the kernel of Linux, being free software allows more number of developers of the technology. Windows phone is the least susceptible to virtual pests. And Microsoft has invested heavily in their security system, restricted access to the app store to prevent the user from downloading programs out of the market, since every day are placed numerous applications. Bluetooth technology represents a major form of virus transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

ZHANG, Lin, Yin-zhuo LUO, Meng-long YUAN, and Ming-shan LUO. "Design and implementation of a streaming media system for symbian based smartphone." Journal of China Universities of Posts and Telecommunications 17 (December 2010): 26–31. http://dx.doi.org/10.1016/s1005-8885(09)60587-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thrasher, T. S. "Computer File Format Standards." SPE Computer Applications 3, no. 01 (January 1, 1991): 15–18. http://dx.doi.org/10.2118/20596-pa.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Crampon, Jean E. "Multiple File Computer Searching." Reference Librarian 8, no. 19 (May 5, 1987): 195–207. http://dx.doi.org/10.1300/j120v08n19_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cornali, M., and A. P. Battaglia. "Computer-based teaching file." British Journal of Radiology 65, no. 770 (February 1992): 187. http://dx.doi.org/10.1259/0007-1285-65-770-187-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Penel, Simon, Hugo Menet, Théo Tricou, Vincent Daubin, and Eric Tannier. "Thirdkind: displaying phylogenetic encounters beyond 2-level reconciliation." Bioinformatics 38, no. 8 (February 9, 2022): 2350–52. http://dx.doi.org/10.1093/bioinformatics/btac062.

Full text
Abstract:
Abstract Motivation Reconciliation between a host and its symbiont phylogenies or between a species and a gene phylogenies is a prevalent approach in evolution, however no simple generic tool (i.e. virtually usable by all reconciliation software, from host/symbiont to species/gene comparisons) is available to visualize reconciliation results. Moreover there is no tool to visualize 3-levels reconciliations, i.e. to visualize 2 nested reconciliations as for example in a host/symbiont/gene complex. Results Thirdkind is a light and easy to install command line software producing svg files displaying reconciliations, including 3-levels reconciliations. It takes a standard format recPhyloXML as input, and is thus usable with most reconciliation software. Availability and implementation https://github.com/simonpenel/thirdkind/wiki. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
9

Vajk, Tamas, Paul Coulton, Will Bamford, and Reuben Edwards. "Using a Mobile Phone as a “Wii-like” Controller for Playing Games on a Large Public Display." International Journal of Computer Games Technology 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/539078.

Full text
Abstract:
Undoubtedly the biggest success amongst the recent games console releases has been the launch of the Nintendo Wii. This is arguably due to its most innovative attribute—the wireless controller or “Wiimote.” The Wiimote can be used as a versatile game controller, able to detect motion and rotation in three dimensions which allows for very innovative game play. Prior to the Wii, and with much less furor, Nokia launched its 5500 model phone which contains 3D motion sensors. Using the Sensor API library available for the Symbian OS, this sensor data can be used by developers to create interesting new control schemes for mobile games. Whilst 3D motion can be utilized for ondevice games, in this paper we present a novel system that connects these phones to large public game screens via Bluetooth where it becomes a game controller for a multiplayer game. We illustrate the potential of this system through a multiplayer driving game using the Microsoft XNA framework and present preliminary feedback on the user experience from a public trial which highlights that these controls can be both intuitive and fun.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaneko, Yutaka. "Image File Format on Computer." Journal of the Institute of Image Information and Television Engineers 54, no. 5 (2000): 672–73. http://dx.doi.org/10.3169/itej.54.672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Symbian OS (Computer file)"

1

Färnlycke, Isak. "An approach to automating mobile application testing on Symbian Smartphones : Functional testing through log file analysis of test cases developed from use cases." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116778.

Full text
Abstract:
Many developers today have difficulties testing their applications on mobile devices. This is due to a number of factors, such as the fact that the mobile phone market has become even more fragmented with the introduction of touch screen technology. Existing software that was designed for traditional mobile handhelds is not necessarily compatible with the newest models and vice versa. For developers this incompatibility increases the difficulty when creating software. Lack of resources for testing the application may lead to the application being limited to either just a specific model or in some cases to only one specific version of the operating system software. Without providing support for a large number of models the product may have difficulty attracting customers, and hence fail to gain the desired market share. The challenge is to find a way to make testing simple, effective, and automated on a large number of mobile devices. To achieve this test automation applicationsare needed and a test strategy must be devised. Additionally, testing is often described as never-ending since testing generally reveals errors rather than demonstrating when errors are absent. Because of this some limitations of testing are justified. In order to limit the scope of this thesis I have selected some of the most appropriate methods for testing, and will only examine these specific methods.  The focus for the testing is not specifically to find errors, but rather to confirm that the product offers the specified functionality. This thesis describes an approach to functional testing of an application for Symbian mobile devices based upon log analysis. Unfortunately, testing applications on mobile devices is still not straightforward, and this thesis does not shed any light upon how to lessen this complexity. However, I believe that both testing and development will be more and more built around use cases in the future. Unfortunately, automation of testing based uponthese use cases will be further complicated by the increasing use of touch screens and physical input (such as gestures).
Idag har många utvecklare problem med att testa sina applikationer på mobila enheter.Detta har många orsaker, exempelvis att den globala mobila marknaden har blivit än mer fragmenterad i och med introduktionen av pekskärmstekniken och de snabba förändringar som sker idag. På grund av de många telefoner som idag finns så finns det ett behov för en automatiserad testprocess då det tar för lång tid att göra manuellt. OptiCall Solutions AB har utvecklat en applikation för Symbian S60 som behöver kunna köra på många olika telefoner. Denna masteruppsats har målet att hitta ett sätt att automatisera testning av mobilapplikationer på olika enheter, mer specifikt enheter som kör Symbian S60.  OptiCaller är målet för testerna. Testmetodologier och verktyg har analyserats och kraven har samlats in på den önskade lösningen. Lösningen består av ett program som kör testskripten direkt på telefonen, mjukvara som analyserar testresultaten och presenterar dem i ett GUI, ett teststrategidokument, samt ett felrapporteringssystem. Med hjälp av dess kan testaren skapa sina egna skript för att automatisera och sedan samla in resultaten för analys. Detta eliminerar behovet för manuell testning och gör testningen effektivare, speciellt när man kör många tester. Analysmjukvaran är även integrerad med Felrapporteringssystemet för att underlätta felrapportering.
APA, Harvard, Vancouver, ISO, and other styles
2

Enany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.

Full text
Abstract:
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented in java and tested on an actual device, Nokia N70. In addition, we measured the time required by each of the algorithms we used to encrypt/decrypt a certain number of bytes. We found that the time taken by RSA and Blowfish algorithms will not be noticeable by the user. However, since the implementation of the Identity Based Cryptography we used was not meant to run on mobile devices, we encountered a noticeable delay whenever encrypting/decrypting the data using this algorithm. Securing the SMS messages will make it to be considered as one of the proposed means that could be used to conduct m-commerce. In addition, securing the MMS messages and the mobile content will increase the usability and the reliability of the mobile phones especially to the users on the move.
Phone: +46735731360
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Irene Y. (Irene Yun). "Efficient file distribution in a flexible,wide-area file system." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53188.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 63-65).
WheelFS is a wide-area distributed file system designed to help applications cope with the challenges of sharing data over the wide-area network. A wide range of applications can use WheelFS as a storage layer because applications can control various trade-offs in WheelFS, such as consistency versus availability, using semantic cues. One key feature that many applications require from any storage system is efficient file distribution. The storage system needs to be able to serve files quickly, even large or popular ones, and allow users and applications to quickly browse files. Wide-area links with high latency and low throughput make achieving these goals difficult for most distributed storage systems. This thesis explores using pre fetching, a traditional file system optimization technique, in wide-area file systems for more efficient file distribution. This thesis focuses on Tread, a pref etcher for WheelFS. Tread includes several types of pre fetching to improve the performance of reading files and directories in WheelFS: read-ahead pre fetching, whole file prefetching, directory prefetching and a prefetching optimization for WheelFS's built-in cooperative caching. To makes the best use of scarce wide-area resources, Tread adaptively rate-limits prefetching and gives applications control over what and how prefetching is done using WheelFS's semantic cues. Experiments show that Tread can reduce the time to read a 10MB file in WheelFS by 40% and the time to list a directory with 100 entries by more than 80%.
(cont.) In addition, experiments on Planetlab show that using prefetching with cooperative caching to distribute a 10MB file to 270 clients reduces the average latency for each client to read the file by almost 45%.
by Irene Y. Zhang.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Leal, Anamary. "Exploring the effectiveness of 3D file browsing techniques for file searching tasks." Honors in the Major Thesis, University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1285.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Engineering and Computer Science
Early Childhood Education
APA, Harvard, Vancouver, ISO, and other styles
5

Grusecki, Travis R. "Improving block sharing in the Write Anywhere File Layout file system." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76818.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 41).
It is often useful in modern file systems for several files to share one or more data blocks. Block sharing is used to improve storage utilization by storing only one copy of a block shared by multiple files or volumes. This thesis proposes an approach, called Space Maker, which uses garbage collection techniques to simplify the up-front cost of file system operations, moving some of the more difficult block tracking work, such as the work required to clean-up after a file delete, to a back-end garbage collector. Space Maker was developed on top of the WAFL file system used in NetApp hardware. The Space Maker is shown to have fast scan performance, while decreasing the front-end time to delete files. Other operations, like file creates and writes have similar performance to a baseline system. Under Space Maker, block sharing is simplified, making a possible for new file system features that rely on sharing to be implemented more quickly with good performance.
by Travis R. Grusecki.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Alsowail, Rakan. "Secure file sharing." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.

Full text
Abstract:
File sharing has become an indispensable part of our daily lives. The shared files might be sensitive, thus, their confidentially, integrity and availability should be protected. Such protection might be against external threats that are initiated by unauthorised users or insider threats that are initiated by authorised users. Our main interest in this thesis is with insider threats. Protecting shared files against insiders is a challenging problem. Insiders enjoy various characteristics such as being trusted and authorised, in addition to being inside the network perimeter and having knowledge of information systems. This makes it difficult to prevent or detect policy violation for these users. The goal of this thesis is to protect shared files from the perspective of insider security with language-based techniques. In the first part of the thesis, we define what we mean by an insider and the insider problem precisely, and propose an approach to classify the insider problem into different categories. We then define and focus on one category that is related to file sharing. Namely, protecting the confidentiality and integrity of the shared files against accidental misuse by insiders. Furthermore, we classify the activity of file sharing into different categories that describe all possible ways of performing the activity of file sharing. These categories represent policies that describe how files should be propagated and accessed by insiders. We show that enforcing these policies can protect the files against accidental misuse by insiders while allowing the activity of sharing to be performed as desired. Thus our interest can be summarised as keeping honest users safe. In the second part of the thesis, we develop a security type system that statically enforces information flow and access control policies in a file system. Files are associated with security types that represent security policies, and programs are sets of operations to be performed on files such as read, copy, move, etc. A type checker, therefore, will statically check each operation to be performed on a file and determine whether the operation satisfies the policy of the file. We prove that our type system is sound and develop a type reconstruction algorithm and prove its soundness and completeness. The type system we developed in this thesis protects the files against accidental misuse by insiders.
APA, Harvard, Vancouver, ISO, and other styles
7

Heger, Dominique A. "The Design of a Logarithmic File Data Allocation Algorithm for Extent Based File Systems." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/578.

Full text
Abstract:
I/O has become the major bottleneck in application performance as processor speed has skyrocket over the last few years, leaving storage hardware and file systems struggling to be competitive. This study presented a new methodology to evaluate workload-dependent file system performance. Applying the new methodology, the benchmarks conducted on the VxFS file system served as a baseline for the design of a new logarithmic file data allocation algorithm for extent based file systems. Most of the I/O performance evaluations conducted today have reached a steady state in which new developments are evolutionary, not revolutionary. The performance model that was introduced in this thesis is revolutionary, as it produces an application as well as a system characterization vector that allows researchers to conduct an in -depth analysis of a complete system environment. The constructed performance hierarchy incorporates performance dependencies at all levels of a system, which allows comparing, evaluating, and analyzing the system at any level of abstraction. When combining the performance characterization vectors, a single, application specific metric allows the analyst to conduct a sensitivity study. The characterization vectors and the resulting single metric satisfy all the potential demands for analyzing I/O performance, in particular systems evaluation, comparison, and optimization. The main argument made throughout this study is that systems performance has to be measured in the context of a particular application and a particular workload. The performance evaluation methodology presented in this thesis enables such measurements. Utilizing the methodology, the in-depth file system performance analysis conducted on different hardware and software configurations reviled that the new approach taken in this study was successful, as it was possible to rank the test systems in their proper order of relative performance measurements. The methodology allowed to normalize the results and to quantify performance in terms of performance paths that included an application, an operating system, as well as the underlying hardware subsystems. The file system benchmarks conducted on VxFS and UFS file systems respectively disclosed the strengths and weaknesses of an extent-based and a block-based file system design. In both architectures, fragmentation substantially impacts I/O performance as the file systems age. The performance measurements outlined the correlation between internal and external fragmentation, and made a strong case for a much enhanced file data allocation algorithm for extent based file systems. The second part of this research introduced a new file data allocation algorithm for extent based file systems that is unique in its approach in that it questioned established boundaries and redistributed existing responsibilities. The new allocation algorithm fulfilled the major requirements of increasing I/O performance by lowering internal fragmentation without significantly increasing the metadata overhead. The presented analytical data model, as well as the actual simulation of the new file data allocation algorithm proofed the great potential of the new design. The study concluded with the recommendation for a new I/O model that is fundamentally different from all the existing once. The vision is that a completely redesigned I/O model is necessary to provide adequate I/O performance. To be efficient, the new I/O model will have to work around the expensive memory-copy to and from user and kernel address space. Moving the data in an out of virtual address ·space is poor overhead, and if the subsystem that is moving the data does not have any virtual memory technique implemented to avoid the data copy, performance is limited to approximately 1,4 of the memory speed. The next generation I/O model envisioned in this study focuses on alleviating all unnecessary overhead in the I/O path , allowing the hardware to operate at its full potential.
APA, Harvard, Vancouver, ISO, and other styles
8

Rao, Herman Chung-Hwa. "The Jade File System." Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185569.

Full text
Abstract:
File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems such as Unix support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. This thesis recognizes four characteristics of scalability: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. This thesis introduces the Jade File System, which provides a uniform way to name and access files in the internet environment. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: It allows multiple file systems to be mounted under one directory, and it permits one logical name space to mount other logical name spaces. A prototype of Jade has been implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.

Full text
Abstract:
This dissertation describes the design and implementation of the file system component of the Saguaro operating system for computers connected by a local-area network. Systems constructed on such an architecture have the potential advantage of increased file availability due to their inherent redundancy. In Saguaro, this advantage is made available through two mechanisms that support semi-automatic file replication and access: reproduction sets and metafiles. A reproduction set is a collection of files that the system attempts to keep identical on a "best effort" basis, relying on the user to handle unusual situations that may arise. A metafile is a special file that contains symbolic path names of other files; when a metafile is opened, the system selects an available constituent file and opens it instead. These mechanisms are especially appropriate for situations that do not require guaranteed consistency or a large number of copies. Other interesting aspects of the Saguaro file system design are also described. The logical file system forms a single tree, yet any file can be placed in any of the physical file systems. This organization allows the creation of a logical association among files that is quite different from their physical association. In addition, the broken path algorithm is described. This algorithm makes it possible to bypass elements in a path name that are on inaccessible physical file systems. Thus, any accessible file can be made available, regardless of the availability of directories in its path. Details are provided on the implementation of the Saguaro file system. The servers of which the system is composed are described individually and a comprehensive operational example is supplied to illustrate their interation. The underlying data structures of the file system are presented. The virtual roots, which contain information used by the broken path algorithm, are the most novel of these. Finally, an implementation of reproduction sets and metafiles for interconnected networks running Berkeley UNIX is described. This implementation demonstrates the broad applicability of these mechanisms. It also provides insight into the way in which mechanisms to facilitate user controlled replication of files can be inexpensively added to existing file systems. Performance measurements for this implementation are also presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Full text
Abstract:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Symbian OS (Computer file)"

1

Sales, Jane. Symbian OS Internals. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mikkonen, Tommi, Frank H. P. Fitzek, and Tony Torp. Qt for Symbian. Chichester, West Sussex, U.K: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jipping, Michael J. Symbian OS communications programming. Chichester: Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stichbury, Jo. Symbian OS Explained. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

J, Jipping Michael, ed. Symbian OS communications programming. Hoboken, NJ: John Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wood, David. Symbian for Software Leaders. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qt for Symbian. Chichester, West Sussex, U.K: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hayun, Roy Ben. Java ME on Symbian OS. New York: John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Babin, Steve. Developing Software for Symbian OS. New York: John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Babin, Steve. Developing Software for Symbian OS. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Symbian OS (Computer file)"

1

Weik, Martin H. "file." In Computer Science and Communications Dictionary, 604. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Xiaodong. "File Carving." In Introductory Computer Forensics, 211–33. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00581-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Townsend, Brian J. "File management." In Computer-aided Draughting Workbook, 45. London: Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-12681-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "source file." In Computer Science and Communications Dictionary, 1620. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "spike file." In Computer Science and Communications Dictionary, 1638. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weik, Martin H. "spool file." In Computer Science and Communications Dictionary, 1642. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "storage file." In Computer Science and Communications Dictionary, 1670. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "symbolic file." In Computer Science and Communications Dictionary, 1704. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "system file." In Computer Science and Communications Dictionary, 1719. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weik, Martin H. "temporary file." In Computer Science and Communications Dictionary, 1760. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19337.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Symbian OS (Computer file)"

1

Pashayeva, Yegana. "Processing of electrocardiogram file in mobile phones on symbian operating system." In 2012 IV International Conference "Problems of Cybernetics and Informatics" (PCI). IEEE, 2012. http://dx.doi.org/10.1109/icpci.2012.6486335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chunmin, Lin, Luo Delin, and Wu Shunxiang. "File Transmission via Socket from Smartphone to PC Based on Symbian OS." In 2009 International Conference on Wireless Networks and Information Systems (WNIS). IEEE, 2009. http://dx.doi.org/10.1109/wnis.2009.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forstner, B., L. Lengyel, I. Kelenyi, T. Levendovszky, and H. Charaf. "Supporting Rapid Application Development on Symbian Platform." In EUROCON 2005 - The International Conference on "Computer as a Tool". IEEE, 2005. http://dx.doi.org/10.1109/eurcon.2005.1629861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Jianguo, and Guisheng Yin. "Sentence-Level Intelligent Input Method Based On Symbian OS." In Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007). IEEE, 2007. http://dx.doi.org/10.1109/imsccs.2007.4392642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Jianguo, and Guisheng Yin. "Sentence-Level Intelligent Input Method Based On Symbian OS." In Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2007). IEEE, 2007. http://dx.doi.org/10.1109/imsccs.2007.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Panchul, Aleksandr, and David Akopian. "On porting of computer applications into symbian cell phone platform." In 2006 IEEE Region 5 Conference. IEEE, 2006. http://dx.doi.org/10.1109/tpsd.2006.5507442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jia Liu and Weiyao Lan. "Retrieving the GPS information of telephone based on Symbian OS." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5563638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Jianguo, Bingquan Liu, and Xuan Wang. "Research of Sentence-Level Intelligent Input Method Based on Symbian OS." In 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS). IEEE, 2006. http://dx.doi.org/10.1109/imsccs.2006.258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cherng-Ying Ing and Tzao-Lin Lee. "Heterogeneous file sharing by file-system emulation." In 2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/apcsac.2008.4625479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Intro file." In 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, 2015. http://dx.doi.org/10.1109/aiccsa.2015.7507263.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Symbian OS (Computer file)"

1

Schwarz, Randolph A., Leland L. Carter, and Schwarz Alysia L. Conversion of Input Data between KENO and MCNP File Formats for Computer Criticality Assessments. US: Visual Editor Consultants, Richland, WA, November 2006. http://dx.doi.org/10.2172/895741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jain, Rishub. Converting Between PLY and Ballistic Research Lab-Computer-Aided Design (BRL-CAD) File Formats. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada618185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patel, Yusef. File to Factory: A case study of automated prefabrication house-building methods for small-to-medium enterprises. Unitec ePress, December 2017. http://dx.doi.org/10.34074/ocds.0823.

Full text
Abstract:
The Eco-Digital Fabrication (EDFAB) research project aimed to investigate how automated prefabrication technologies and off-the-shelf construction products can be employed to disrupt building industry norms. The aim of this research – conducted at the University of Auckland and Unitec Institute of Technology from 2014 onward – was to provide small-to-medium enterprises in the construction industry with a pathway to upskill and increase construction productivity through the use of these processes. The availability of automated machines and easy-to-use fabrication software is increasing dramatically and this can be paired with readily available construction products to produce novel mass-customised housing solutions. The application of basic automated technologies – such as CNC (Computer Numerical Control) routers – allowed researchers to create ‘recipes’ that can be adopted and adapted relatively easily. By no means did the research favour digital manufacture or assembly processes over traditional analogue construction techniques – the goal was to provide logical, productive and accessible blended solutions for greater affordability and flexibility in design. For example, the designed experiments were required to be built from readily available products, and used simple readymade screw fixings rather than digitally produced custom fixings or joining mechanisms. The research project aimed to generate discussion and provide recommendations on how the construction industry might support the adoption of automated prefabrication technology in small-to-medium enterprise (SME).
APA, Harvard, Vancouver, ISO, and other styles
4

Mintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3866.

Full text
Abstract:
The article analyzes the results of the survey of 75 lecturers on using learning content management system (LCMS) Moodle in the educational process. It is defined that more than 75% of the respondents use LCMS Moodle. The lecturers up to 30 or over 60 years old, with up to 3-year-work experience in Universities need methodic assistance. Textual e-learning resources are widely used in developed courses while video and audio are not used enough. LCMS Moodle is mostly used during exams or tests and student work, and using LCMS Moodle should be intensified in lectures, laboratory and practical classes. Among the most demanded resources are label, page, file, URL, book, assignment, attendance, glossary, quiz. Thus, the popularization of other resources is identified as one of the most important. An action plan how to improve LCMS Moodle usage: increasing the IT competencies of both teachers and students – planned long-term courses “IT in full-time (blended) learning”; seminars, consultations, (group and individual forms) both on general issues, and according to the specificity of the specialties; methodic handouts and recommendations; improving logistics; improving logistical support – ensuring constant access to the Internet, updating and equipping computer classrooms; creating of transparent, predictable and attractive for authors content of the regulatory framework.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography