Academic literature on the topic 'Système des d'exploitation mobile'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Système des d'exploitation mobile.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Système des d'exploitation mobile"
-Saint Girons, Régis. "OpenTV : un système d'exploitation pour les décodeurs numériques interactifs." Revue de l'Electricité et de l'Electronique -, no. 02 (1997): 62. http://dx.doi.org/10.3845/ree.1997.021.
Full textCarrier, B. "Résultats d'exploitation d'un four électrique équipé d'un système à tiroir." Revue de Métallurgie 84, no. 10 (October 1987): 705–8. http://dx.doi.org/10.1051/metal/198784100705.
Full textMorlon, P., and M. Benoit. "Étude méthodologique d'un parcellaire d'exploitation agricole en tant que système." Agronomie 10, no. 6 (1990): 499–508. http://dx.doi.org/10.1051/agro:19900608.
Full textSamson, Roch. "La Gaspésie au XIXe siècle : espace maritime, espace marchand." Cahiers de géographie du Québec 28, no. 73-74 (April 12, 2005): 205–21. http://dx.doi.org/10.7202/021655ar.
Full textGHOERGHE, ANDREI-COSMIN, HORIA ANDREI, EMIL DIACONU, GEORGE SERITAN, and Bogdan Enache. "SYSTÈME INTELLIGENT POUR LA RÉDUCTION DE LA CONSOMMATION ÉLECTRIQUE EN VEILLE DES ÉQUIPEMENTS MÉNAGERS." REVUE ROUMAINE DES SCIENCES TECHNIQUES — SÉRIE ÉLECTROTECHNIQUE ET ÉNERGÉTIQUE 68, no. 4 (December 14, 2023): 413–18. http://dx.doi.org/10.59277/rrst-ee.2023.4.15.
Full textBaumann, Andrea, Linda O'Brien-Pallas, Raisa Deber, Gail Donner, Dyanne Semogas, and Barbara Silverman. "Réductions au sein du système hospitalier — Un processus de restructuration." Healthcare Management Forum 9, no. 4 (December 1996): 14–23. http://dx.doi.org/10.1016/s0840-4704(10)60757-0.
Full textHall, Stephen J. G., L. K. Gnaho, and C. Meghen. "Une enquête sur la race bovine Somba au Bénin." Revue d’élevage et de médecine vétérinaire des pays tropicaux 48, no. 1 (January 1, 1995): 77–83. http://dx.doi.org/10.19182/remvt.9492.
Full textRey, Bernard, and U. Jacob. "Modalités d'exploitation des caprins dans la province de Ngozi, Burundi." Revue d’élevage et de médecine vétérinaire des pays tropicaux 46, no. 4 (April 1, 1993): 637–44. http://dx.doi.org/10.19182/remvt.9420.
Full textN’Goran Etienne, Loukou, Soro Kouhana, Soro Brahima, Rognon Xavier, Kayang B. Boniface, Youssao Abdou Karim Issaka, and Abdou Karim Issaka. "Caracteristiques Du Système D'exploitation Des Poulets Locaux Dans Deux Zones Agro-Ecologiques (Sud Forestier Et Centre Savanicole) De La Côte D’Ivoire." European Scientific Journal ESJ 17, no. 40 (November 30, 2021): 240–62. http://dx.doi.org/10.19044/esj.2021.v17n40p240.
Full textDoumerc, Bernard. "La crise structurelle de la marine vénitienne au XVe siècle : le problème du retard des Mude." Annales. Histoire, Sciences Sociales 40, no. 3 (June 1985): 605–23. http://dx.doi.org/10.3406/ahess.1985.283187.
Full textDissertations / Theses on the topic "Système des d'exploitation mobile"
Konaré, Dougoukolo. "Contribution à un système d'exploitation générique d'infrastructures urbaines avec composantes mobiles." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ65586.pdf.
Full textEl, Hatib Souad. "Une approche sémantique de détection de maliciel Android basée sur la vérification de modèles et l'apprentissage automatique." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66322.
Full textThe ever-increasing number of Android malware is accompanied by a deep concern about security issues in the mobile ecosystem. Unquestionably, Android malware detection has received much attention in the research community and therefore it becomes a crucial aspect of software security. Actually, malware proliferation goes hand in hand with the sophistication and complexity of malware. To illustrate, more elaborated malware like polymorphic and metamorphic malware, make use of code obfuscation techniques to build new variants that preserve the semantics of the original code but modify it’s syntax and thus escape the usual detection methods. In the present work, we propose a model-checking based approach that combines static analysis and machine learning. Mainly, from a given Android application we extract an abstract model expressed in terms of LNT, a process algebra language. Afterwards, security related Android behaviours specified by temporal logic formulas are checked against this model, the satisfaction of a specific formula is considered as a feature, finally machine learning algorithms are used to classify the application as malicious or not.
Sokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Full textNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Limam, Bedhiaf Imen. "Virtualisation des infrastructures des opérateurs de réseaux mobiles." Paris 6, 2011. http://www.theses.fr/2011PA066341.
Full textPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Full textWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Gomez, Lacruz Maria. "Towards improving the quality of mobile app by leveraging crowdsourced feedback." Thesis, Lille 1, 2016. http://www.theses.fr/2016LIL10158/document.
Full textThe popularity of smartphones is leading to an ever growing number of mobile apps that are published in official app stores. In fact, previous studies have demonstrated that app users are intolerant to quality issues (e.g., crashes). Users who encounter issues frequently uninstall apps and move to alternative apps. Hence, quickly detecting and preventing issues is crucial for staying competitive in the market. Although developers use emulators and test apps before deployment, many bugs emerge in the wild. Developing apps which run without errors along time remains a primary concern for app developers. The big challenge is that the environment is out of the app developers’ control. More specifically, the mobile ecosystem faces rapid platform evolution, high device fragmentation, and high diversity of execution contexts. This thesis introduces a new generation of app stores which exploit crowdsourced information about apps, devices and users to increase the overall quality of the delivered mobile apps. We claim that app stores can exploit the wisdom of the crowd to distill actionable insights from the feedback returned by the crowds. These actionable insights assist app developers to deal with potential errors and threats that affect their apps prior to publication or even when the apps are in the hands of end-users
Hamzaoui, Khalil Ibrahim. "Contribution à la modélisation de la consommation d'énergie dans un dispositif mobile." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1I030/document.
Full textThe main goal of this thesis is to model the power consumption of a particular application running on a mobile device. We propose a model of energy behavior monitoring, we also describe a methodology to identify the parameters of the model. To this end, we analyzed a collection of experimental data collected during my tour de France in an electric wheelchair. We applied statistical tools to obtain the parameters of the model. Finally, we validate the model by comparing the results with other experimental data.The first case study compares the evolution of the energy cost in the mobile environments of the different components of smartphones based on several energy models.- The second case study deals with the evaluation, the measurements of the energy cost consumed and the problems encountered in the methods used for the evaluation of energy consumption. For a better evaluation, the case study of energy behavior was introduced using the virtual machines.- The third case study is based on the treatment of the results of the measurements obtained during my tour of France in a connected electric wheelchair. The goal is to anticipate resource management, realizing measurements, and then tracking energy behavior in a real and diverse environment. The model can be used to define an optimal frequency in terms of energy consumption for specific situations without degrading the quality of service desired by the user
Achara, Jagdish Prasad. "Unveiling and Controlling Online Tracking." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM069/document.
Full textIt is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. Smartphones are naturally gathering a lot of personal information as the user communicates, browses the web and runs various Apps. They are equipped with GPS, NFC and digital camera facilities and therefore smartphones generate new personal information as they are used. Since they are almost always connected to the Internet, and are barely turned off, they can potentially reveal a lot of information about the activities of their owners. The close arrival of smart-‐watches and smart-‐glasses will just increase the amount of personal information available and the privacy leakage risks. This subject is closely related to the Mobilitics project that is currently conducted by Inria/Privatics and CNIL, the French data protection authority [1][2][3]. Therefore, the candidate will benefit from the investigations that are on progress in this context, in order to understand the situation and the trends. The candidate will also benefit from all the logging and analysis tools we developed for the iOS and Android Mobile OSes, as well as the experienced gained on the subject. Another question is the arrival of HTML5 based Mobile OSes, like Firefox OS: it clearly opens new directions as it "uses completely open standards and there’s no proprietary software or technology involved" (Andreas Gal, Mozilla). But what are the implications from a Mobile OS privacy point of view? That's an important topic to analyze. Beyond understanding the situation, the candidate will also explore several directions in order to improve the privacy control of mobile devices. First of all, a privacy-‐by-‐design approach, when feasible, is an excellent way to tackle the problem. For instance the current trend is to rely more and more on cloud-‐based services, either directly (e.g., via Dropbox, Instagram, Social Networks, or similar services), or indirectly (e.g., when a backup of the contact, calendar, accounts databases is needed). But pushing data on cloud-‐based systems, somewhere on the Internet, is in total contradiction with our privacy considerations. Therefore, an idea is to analyze and experiment with personal cloud services (e.g., ownCLoud, diaspora) that are fully managed by the user. Here the goal is to understand the possibilities, the opportunities, and the usability of such systems, either as a replacement or in association with commercial cloud services. Another direction is to carry out behavioral analyses. Indeed, in order to precisely control the privacy aspects, at one extreme, the user may have to deeply interact with the device (e.g., through pop-ups each time a potential privacy leak is identified), which negatively impacts the usability of the device. At the other extreme, the privacy control may be oversimplified, in the hope not to interfere too much with the user, as is the case with the Android static authorizations or the one-‐time pop-‐ups of iOS6. This is not appropriate either, since using private information once is not comparable to using it every minute. A better approach could be to perform, with the help of a machine learning system for instance, a dynamic analysis of the Mobile OS or App behavior from a privacy perspective and to interfere with the user only when it is deemed appropriate. This could enable a good tradeoff between privacy control and usability, with user actions only when meaningful. How far such a behavioral analysis can go and what are the limitations of the approach (e.g., either from a CPU/battery drain perspective, or in front of programming tricks to escape the analysis) are open questions. Tainting techniques applied to Mobile OSes (e.g., Taint-Droid) can be used as a basic bloc to build a behavioral analysis tool, but they have limited accuracy are unable to analyze native code and have poor performances
Irolla, Paul. "Formalization of Neural Network Applications to Secure 3D Mobile Applications." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS585/document.
Full textThis thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing(HPC) technology to the biomedical world. This solution will give the opportunity for experts from different fields to navigate intuitivelyin the Big Data imaging with access via 3D light terminals. Biomedicaldata protection against data leaks is of foremost importance. As such,the client environnement and communications with the server must besecured. We focused our work on the development of antimalware solutionon the Android OS. We emphasizes the creation of new algorithms,methods and tools that carry advantages over the current state-of-the-art, but more importantly that can be used effectively ina production context. It is why, what is proposed here is often acompromise between what theoretically can be done and its applicability. Algorithmic and technological choices are motivated by arelation of efficiency and performance results. This thesis contributes to the state of the art in the following areas:Static and dynamic analysis of Android applications, application web crawling.First, to search for malicious activities and vulnerabilities, oneneeds to design the tools that extract pertinent information from Android applications. It is the basis of any analysis. Furthermore,any classifier or detector is always limited by the informative power of underlying data. An important part of this thesis is the designing of efficient static and dynamic analysis tools forapplications, such as an reverse engineering module, a networkcommunication analysis tool, an instrumented Android system, an application web crawlers etc.Neural Network initialization, training and anti-saturation techniques algorithm.Neural Networks are randomly initialized. It is possible to control the underlying random distribution in order to the reduce the saturation effect, the training time and the capacity to reach theglobal minimum. We developed an initialization procedure that enhances the results compared to the state-of-the-art. We also revisited ADAM algorithm to take into account interdependencies with regularization techniques, in particular Dropout. Last, we use anti-saturation techniques and we show that they are required tocorrectly train a neural network.An algorithm for collecting the common sequences in a sequence group.We propose a new algorithm for building the Embedding Antichain fromthe set of common subsequences. It is able to process and represent allcommon subsequences of a sequence set. It is a tool for solving the Systematic Characterization of Sequence Groups. This algorithm is a newpath of research toward the automatic creation of malware familydetection rules
Karam, Louis. "Pseu : prototype d'un système d'exploitation universel." Aix-Marseille 3, 1993. http://www.theses.fr/1993AIX32027.
Full textComputers are making progress so rapidly that concepts and tools primarily defined for medium or large machines are now being applied to microcomputers. It is obvious that it is the case for operating systems which can seem to be an obstacle when someone wishes to use components of a computer other than the machine language. The first objective of this thesis is to povide a proven simple and logical method of a universal operating system prototype. The second objective of this thesis is to allow administrators without an elaborate knowledge of operating systems to remain in control and independent when confronted by counsellors or computer salesmen. The third objective is to attract computer firm' attention on problems during the course of each migration by proposing solutions which can be the centre of a more complex development
Books on the topic "Système des d'exploitation mobile"
Android: Développer des applications mobiles pour les Google Phones. Paris: Dunod, 2009.
Find full textMaking Win32 Applications Mobile. New York: John Wiley & Sons, Ltd., 2002.
Find full textTraduction, Djibel Dalil, and Farine Arnaud Traduction, eds. Développement d'applications professionnelles avec Android 2. Paris: Pearson, 2010.
Find full textNicolaisen, Nancy. Making Win32 applications mobile: Porting to Windows CE. Indianapolis, Ind: John Wiley, 2002.
Find full textAndroid Studio development essentials. United States?]: EBookFrenzy, 2014.
Find full textGuignard, Damien. Programmation Android. Paris: Eyrolles, 2010.
Find full textSystème d'exploitation et extensions du matériel. Paris: Masson, 1987.
Find full textRohaut, Sébastien. Linux: Maîtrisez l'administration du système. 2nd ed. St Herblain: Éd. ENI, 2009.
Find full textStark, Jonathan. Building Android apps with HTML, CSS, and JavaScript. Beijing: O'Reilly, 2010.
Find full textLe logiciel système. Paris: Presses universitaires de France, 1992.
Find full textBook chapters on the topic "Système des d'exploitation mobile"
YAHYAOUI, Khadidja. "Approche hybride pour la navigation autonome des robots mobiles." In Optimisation et apprentissage, 173–209. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9071.ch7.
Full textConference papers on the topic "Système des d'exploitation mobile"
Bouidghaghen, Ourdia, Lynda Tamine-Lechani, and Mohand Boughanem. "Vers la définition du contexte d'un utilisateur mobile de système de recherche d'information." In the 5th French-Speaking Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1739268.1739274.
Full textCHAZALY, Bertrand. "Mise en œuvre d'un système de numérisation 3D mobile pour le suivi détaillé d'un linéaire de 3.5 km de falaises à Carry-le-Rouet (Bouches-du-Rhône)." In Journées Nationales Génie Côtier - Génie Civil. Editions Paralia, 2012. http://dx.doi.org/10.5150/jngcgc.2012.061-c.
Full textReports on the topic "Système des d'exploitation mobile"
Daniellou, François. Les facteurs humains et organisationnels dans le projet de conception d'un système à risques. Fondation pour une culture de sécurité industrielle, August 2013. http://dx.doi.org/10.57071/398epw.
Full text