Literatura académica sobre el tema "Système des d'exploitation mobile"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Système des d'exploitation mobile".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Système des d'exploitation mobile"
-Saint Girons, Régis. "OpenTV : un système d'exploitation pour les décodeurs numériques interactifs". Revue de l'Electricité et de l'Electronique -, n.º 02 (1997): 62. http://dx.doi.org/10.3845/ree.1997.021.
Texto completoCarrier, B. "Résultats d'exploitation d'un four électrique équipé d'un système à tiroir". Revue de Métallurgie 84, n.º 10 (octubre de 1987): 705–8. http://dx.doi.org/10.1051/metal/198784100705.
Texto completoMorlon, P. y M. Benoit. "Étude méthodologique d'un parcellaire d'exploitation agricole en tant que système". Agronomie 10, n.º 6 (1990): 499–508. http://dx.doi.org/10.1051/agro:19900608.
Texto completoSamson, Roch. "La Gaspésie au XIXe siècle : espace maritime, espace marchand". Cahiers de géographie du Québec 28, n.º 73-74 (12 de abril de 2005): 205–21. http://dx.doi.org/10.7202/021655ar.
Texto completoGHOERGHE, ANDREI-COSMIN, HORIA ANDREI, EMIL DIACONU, GEORGE SERITAN y Bogdan Enache. "SYSTÈME INTELLIGENT POUR LA RÉDUCTION DE LA CONSOMMATION ÉLECTRIQUE EN VEILLE DES ÉQUIPEMENTS MÉNAGERS". REVUE ROUMAINE DES SCIENCES TECHNIQUES — SÉRIE ÉLECTROTECHNIQUE ET ÉNERGÉTIQUE 68, n.º 4 (14 de diciembre de 2023): 413–18. http://dx.doi.org/10.59277/rrst-ee.2023.4.15.
Texto completoBaumann, Andrea, Linda O'Brien-Pallas, Raisa Deber, Gail Donner, Dyanne Semogas y Barbara Silverman. "Réductions au sein du système hospitalier — Un processus de restructuration". Healthcare Management Forum 9, n.º 4 (diciembre de 1996): 14–23. http://dx.doi.org/10.1016/s0840-4704(10)60757-0.
Texto completoHall, Stephen J. G., L. K. Gnaho y C. Meghen. "Une enquête sur la race bovine Somba au Bénin". Revue d’élevage et de médecine vétérinaire des pays tropicaux 48, n.º 1 (1 de enero de 1995): 77–83. http://dx.doi.org/10.19182/remvt.9492.
Texto completoRey, Bernard y U. Jacob. "Modalités d'exploitation des caprins dans la province de Ngozi, Burundi". Revue d’élevage et de médecine vétérinaire des pays tropicaux 46, n.º 4 (1 de abril de 1993): 637–44. http://dx.doi.org/10.19182/remvt.9420.
Texto completoN’Goran Etienne, Loukou, Soro Kouhana, Soro Brahima, Rognon Xavier, Kayang B. Boniface, Youssao Abdou Karim Issaka y Abdou Karim Issaka. "Caracteristiques Du Système D'exploitation Des Poulets Locaux Dans Deux Zones Agro-Ecologiques (Sud Forestier Et Centre Savanicole) De La Côte D’Ivoire". European Scientific Journal ESJ 17, n.º 40 (30 de noviembre de 2021): 240–62. http://dx.doi.org/10.19044/esj.2021.v17n40p240.
Texto completoDoumerc, Bernard. "La crise structurelle de la marine vénitienne au XVe siècle : le problème du retard des Mude". Annales. Histoire, Sciences Sociales 40, n.º 3 (junio de 1985): 605–23. http://dx.doi.org/10.3406/ahess.1985.283187.
Texto completoTesis sobre el tema "Système des d'exploitation mobile"
Konaré, Dougoukolo. "Contribution à un système d'exploitation générique d'infrastructures urbaines avec composantes mobiles". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ65586.pdf.
Texto completoEl, Hatib Souad. "Une approche sémantique de détection de maliciel Android basée sur la vérification de modèles et l'apprentissage automatique". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66322.
Texto completoThe ever-increasing number of Android malware is accompanied by a deep concern about security issues in the mobile ecosystem. Unquestionably, Android malware detection has received much attention in the research community and therefore it becomes a crucial aspect of software security. Actually, malware proliferation goes hand in hand with the sophistication and complexity of malware. To illustrate, more elaborated malware like polymorphic and metamorphic malware, make use of code obfuscation techniques to build new variants that preserve the semantics of the original code but modify it’s syntax and thus escape the usual detection methods. In the present work, we propose a model-checking based approach that combines static analysis and machine learning. Mainly, from a given Android application we extract an abstract model expressed in terms of LNT, a process algebra language. Afterwards, security related Android behaviours specified by temporal logic formulas are checked against this model, the satisfaction of a specific formula is considered as a feature, finally machine learning algorithms are used to classify the application as malicious or not.
Sokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns". Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Texto completoNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Limam, Bedhiaf Imen. "Virtualisation des infrastructures des opérateurs de réseaux mobiles". Paris 6, 2011. http://www.theses.fr/2011PA066341.
Texto completoPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem". Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Texto completoWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Gomez, Lacruz Maria. "Towards improving the quality of mobile app by leveraging crowdsourced feedback". Thesis, Lille 1, 2016. http://www.theses.fr/2016LIL10158/document.
Texto completoThe popularity of smartphones is leading to an ever growing number of mobile apps that are published in official app stores. In fact, previous studies have demonstrated that app users are intolerant to quality issues (e.g., crashes). Users who encounter issues frequently uninstall apps and move to alternative apps. Hence, quickly detecting and preventing issues is crucial for staying competitive in the market. Although developers use emulators and test apps before deployment, many bugs emerge in the wild. Developing apps which run without errors along time remains a primary concern for app developers. The big challenge is that the environment is out of the app developers’ control. More specifically, the mobile ecosystem faces rapid platform evolution, high device fragmentation, and high diversity of execution contexts. This thesis introduces a new generation of app stores which exploit crowdsourced information about apps, devices and users to increase the overall quality of the delivered mobile apps. We claim that app stores can exploit the wisdom of the crowd to distill actionable insights from the feedback returned by the crowds. These actionable insights assist app developers to deal with potential errors and threats that affect their apps prior to publication or even when the apps are in the hands of end-users
Hamzaoui, Khalil Ibrahim. "Contribution à la modélisation de la consommation d'énergie dans un dispositif mobile". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1I030/document.
Texto completoThe main goal of this thesis is to model the power consumption of a particular application running on a mobile device. We propose a model of energy behavior monitoring, we also describe a methodology to identify the parameters of the model. To this end, we analyzed a collection of experimental data collected during my tour de France in an electric wheelchair. We applied statistical tools to obtain the parameters of the model. Finally, we validate the model by comparing the results with other experimental data.The first case study compares the evolution of the energy cost in the mobile environments of the different components of smartphones based on several energy models.- The second case study deals with the evaluation, the measurements of the energy cost consumed and the problems encountered in the methods used for the evaluation of energy consumption. For a better evaluation, the case study of energy behavior was introduced using the virtual machines.- The third case study is based on the treatment of the results of the measurements obtained during my tour of France in a connected electric wheelchair. The goal is to anticipate resource management, realizing measurements, and then tracking energy behavior in a real and diverse environment. The model can be used to define an optimal frequency in terms of energy consumption for specific situations without degrading the quality of service desired by the user
Achara, Jagdish Prasad. "Unveiling and Controlling Online Tracking". Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM069/document.
Texto completoIt is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. Smartphones are naturally gathering a lot of personal information as the user communicates, browses the web and runs various Apps. They are equipped with GPS, NFC and digital camera facilities and therefore smartphones generate new personal information as they are used. Since they are almost always connected to the Internet, and are barely turned off, they can potentially reveal a lot of information about the activities of their owners. The close arrival of smart-‐watches and smart-‐glasses will just increase the amount of personal information available and the privacy leakage risks. This subject is closely related to the Mobilitics project that is currently conducted by Inria/Privatics and CNIL, the French data protection authority [1][2][3]. Therefore, the candidate will benefit from the investigations that are on progress in this context, in order to understand the situation and the trends. The candidate will also benefit from all the logging and analysis tools we developed for the iOS and Android Mobile OSes, as well as the experienced gained on the subject. Another question is the arrival of HTML5 based Mobile OSes, like Firefox OS: it clearly opens new directions as it "uses completely open standards and there’s no proprietary software or technology involved" (Andreas Gal, Mozilla). But what are the implications from a Mobile OS privacy point of view? That's an important topic to analyze. Beyond understanding the situation, the candidate will also explore several directions in order to improve the privacy control of mobile devices. First of all, a privacy-‐by-‐design approach, when feasible, is an excellent way to tackle the problem. For instance the current trend is to rely more and more on cloud-‐based services, either directly (e.g., via Dropbox, Instagram, Social Networks, or similar services), or indirectly (e.g., when a backup of the contact, calendar, accounts databases is needed). But pushing data on cloud-‐based systems, somewhere on the Internet, is in total contradiction with our privacy considerations. Therefore, an idea is to analyze and experiment with personal cloud services (e.g., ownCLoud, diaspora) that are fully managed by the user. Here the goal is to understand the possibilities, the opportunities, and the usability of such systems, either as a replacement or in association with commercial cloud services. Another direction is to carry out behavioral analyses. Indeed, in order to precisely control the privacy aspects, at one extreme, the user may have to deeply interact with the device (e.g., through pop-ups each time a potential privacy leak is identified), which negatively impacts the usability of the device. At the other extreme, the privacy control may be oversimplified, in the hope not to interfere too much with the user, as is the case with the Android static authorizations or the one-‐time pop-‐ups of iOS6. This is not appropriate either, since using private information once is not comparable to using it every minute. A better approach could be to perform, with the help of a machine learning system for instance, a dynamic analysis of the Mobile OS or App behavior from a privacy perspective and to interfere with the user only when it is deemed appropriate. This could enable a good tradeoff between privacy control and usability, with user actions only when meaningful. How far such a behavioral analysis can go and what are the limitations of the approach (e.g., either from a CPU/battery drain perspective, or in front of programming tricks to escape the analysis) are open questions. Tainting techniques applied to Mobile OSes (e.g., Taint-Droid) can be used as a basic bloc to build a behavioral analysis tool, but they have limited accuracy are unable to analyze native code and have poor performances
Irolla, Paul. "Formalization of Neural Network Applications to Secure 3D Mobile Applications". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS585/document.
Texto completoThis thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing(HPC) technology to the biomedical world. This solution will give the opportunity for experts from different fields to navigate intuitivelyin the Big Data imaging with access via 3D light terminals. Biomedicaldata protection against data leaks is of foremost importance. As such,the client environnement and communications with the server must besecured. We focused our work on the development of antimalware solutionon the Android OS. We emphasizes the creation of new algorithms,methods and tools that carry advantages over the current state-of-the-art, but more importantly that can be used effectively ina production context. It is why, what is proposed here is often acompromise between what theoretically can be done and its applicability. Algorithmic and technological choices are motivated by arelation of efficiency and performance results. This thesis contributes to the state of the art in the following areas:Static and dynamic analysis of Android applications, application web crawling.First, to search for malicious activities and vulnerabilities, oneneeds to design the tools that extract pertinent information from Android applications. It is the basis of any analysis. Furthermore,any classifier or detector is always limited by the informative power of underlying data. An important part of this thesis is the designing of efficient static and dynamic analysis tools forapplications, such as an reverse engineering module, a networkcommunication analysis tool, an instrumented Android system, an application web crawlers etc.Neural Network initialization, training and anti-saturation techniques algorithm.Neural Networks are randomly initialized. It is possible to control the underlying random distribution in order to the reduce the saturation effect, the training time and the capacity to reach theglobal minimum. We developed an initialization procedure that enhances the results compared to the state-of-the-art. We also revisited ADAM algorithm to take into account interdependencies with regularization techniques, in particular Dropout. Last, we use anti-saturation techniques and we show that they are required tocorrectly train a neural network.An algorithm for collecting the common sequences in a sequence group.We propose a new algorithm for building the Embedding Antichain fromthe set of common subsequences. It is able to process and represent allcommon subsequences of a sequence set. It is a tool for solving the Systematic Characterization of Sequence Groups. This algorithm is a newpath of research toward the automatic creation of malware familydetection rules
Karam, Louis. "Pseu : prototype d'un système d'exploitation universel". Aix-Marseille 3, 1993. http://www.theses.fr/1993AIX32027.
Texto completoComputers are making progress so rapidly that concepts and tools primarily defined for medium or large machines are now being applied to microcomputers. It is obvious that it is the case for operating systems which can seem to be an obstacle when someone wishes to use components of a computer other than the machine language. The first objective of this thesis is to povide a proven simple and logical method of a universal operating system prototype. The second objective of this thesis is to allow administrators without an elaborate knowledge of operating systems to remain in control and independent when confronted by counsellors or computer salesmen. The third objective is to attract computer firm' attention on problems during the course of each migration by proposing solutions which can be the centre of a more complex development
Libros sobre el tema "Système des d'exploitation mobile"
Android: Développer des applications mobiles pour les Google Phones. Paris: Dunod, 2009.
Buscar texto completoMaking Win32 Applications Mobile. New York: John Wiley & Sons, Ltd., 2002.
Buscar texto completoTraduction, Djibel Dalil y Farine Arnaud Traduction, eds. Développement d'applications professionnelles avec Android 2. Paris: Pearson, 2010.
Buscar texto completoNicolaisen, Nancy. Making Win32 applications mobile: Porting to Windows CE. Indianapolis, Ind: John Wiley, 2002.
Buscar texto completoAndroid Studio development essentials. United States?]: EBookFrenzy, 2014.
Buscar texto completoGuignard, Damien. Programmation Android. Paris: Eyrolles, 2010.
Buscar texto completoSystème d'exploitation et extensions du matériel. Paris: Masson, 1987.
Buscar texto completoRohaut, Sébastien. Linux: Maîtrisez l'administration du système. 2a ed. St Herblain: Éd. ENI, 2009.
Buscar texto completoStark, Jonathan. Building Android apps with HTML, CSS, and JavaScript. Beijing: O'Reilly, 2010.
Buscar texto completoLe logiciel système. Paris: Presses universitaires de France, 1992.
Buscar texto completoCapítulos de libros sobre el tema "Système des d'exploitation mobile"
YAHYAOUI, Khadidja. "Approche hybride pour la navigation autonome des robots mobiles". En Optimisation et apprentissage, 173–209. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9071.ch7.
Texto completoActas de conferencias sobre el tema "Système des d'exploitation mobile"
Bouidghaghen, Ourdia, Lynda Tamine-Lechani y Mohand Boughanem. "Vers la définition du contexte d'un utilisateur mobile de système de recherche d'information". En the 5th French-Speaking Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1739268.1739274.
Texto completoCHAZALY, Bertrand. "Mise en œuvre d'un système de numérisation 3D mobile pour le suivi détaillé d'un linéaire de 3.5 km de falaises à Carry-le-Rouet (Bouches-du-Rhône)". En Journées Nationales Génie Côtier - Génie Civil. Editions Paralia, 2012. http://dx.doi.org/10.5150/jngcgc.2012.061-c.
Texto completoInformes sobre el tema "Système des d'exploitation mobile"
Daniellou, François. Les facteurs humains et organisationnels dans le projet de conception d'un système à risques. Fondation pour une culture de sécurité industrielle, agosto de 2013. http://dx.doi.org/10.57071/398epw.
Texto completo