Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Mobile computing - Computer system.

Rozprawy doktorskie na temat „Mobile computing - Computer system”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Mobile computing - Computer system”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Ceran, Onur. "A Context Aware Emergency Management System Using Mobile Computing". Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615606/index.pdf.

Pełny tekst źródła
Streszczenie:
In this thesis, an emergency management system taking advantage of mobile computing and its awareness on context is provided. The framework primarily aims to create an infrastructure for acquiring implicit and explicit data about an emergency situation by using capabilities of smart mobile devices and converting them into value-added information to be used in phases of emergency management. In addition to conceptual description of the framework, a real prototype implementation is developed and successful application of the framework is demonstrated. Sample cases are analyzed in conjunction with the prototype and an experiment for reporting an emergency situation is carried out by a group of participants in order to demonstrate the applicability and feasibility of the framework. Data collected during the experiment are examined in order to determine the advantages of the proposed system in comparison with traditional emergency reporting efforts.
Style APA, Harvard, Vancouver, ISO itp.
2

Prabhu, Nitin Kumar Vijay. "Transaction processing in Mobile Database System". Diss., UMK access, 2006.

Znajdź pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006.
"A dissertation in computer science and informatics and telecommunications and computer networking." Advisor: Vijay Kumar. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 152-157). Online version of the print edition.
Style APA, Harvard, Vancouver, ISO itp.
3

周彧 i Yuk Chow. "A light-weight mobile code system for pervasive computing". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pinkerton, Michael David. "Ubiquitous computing : extending access to mobile data". Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Huanjin. "Free roaming: A system for ubiquitous computing". CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.

Pełny tekst źródła
Streszczenie:
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
Style APA, Harvard, Vancouver, ISO itp.
6

Berrios, Moron Jonathan Glenn. "Quality of Experience Provisioning in Mobile Cloud Computing". Thesis, Luleå tekniska universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70837.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Momin, Kaleem A. "A transaction execution model for mobile computing environments". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bridle, Robert Angus. "Adaptive user interfaces for mobile computing devices /". View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081117.184430/index.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Warshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing". CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.

Pełny tekst źródła
Streszczenie:
Ubiquitous computing aims to make computing widely available, easy to use, and completely transparent to the user. Umbilical Cord is intended to be the first step in researching ubiquitous computing at CSUSB. It implements a model scalable network with a client-server architecture that features consistent user interaction and global access to user data. It is based on the Linux operating system which can be leveraged for future research due to the open nature of its source code. It also features a scalable network swap.
Style APA, Harvard, Vancouver, ISO itp.
10

Drakatos, Stylianos. "Context-aware data caching for mobile computing environments". FIU Digital Commons, 2006. http://digitalcommons.fiu.edu/etd/3082.

Pełny tekst źródła
Streszczenie:
The deployment of wireless communications coupled with the popularity of portable devices has led to significant research in the area of mobile data caching. Prior research has focused on the development of solutions that allow applications to run in wireless environments using proxy based techniques. Most of these approaches are semantic based and do not provide adequate support for representing the context of a user (i.e., the interpreted human intention.). Although the context may be treated implicitly it is still crucial to data management. In order to address this challenge this dissertation focuses on two characteristics: how to predict (i) the future location of the user and (ii) locations of the fetched data where the queried data item has valid answers. Using this approach, more complete information about the dynamics of an application environment is maintained. The contribution of this dissertation is a novel data caching mechanism for pervasive computing environments that can adapt dynamically to a mobile user's context. In this dissertation, we design and develop a conceptual model and context aware protocols for wireless data caching management. Our replacement policy uses the validity of the data fetched from the server and the neighboring locations to decide which of the cache entries is less likely to be needed in the future, and therefore a good candidate for eviction when cache space is needed. The context aware driven prefetching algorithm exploits the query context to effectively guide the prefetching process. The query context is defined using a mobile user's movement pattern and requested information context. Numerical results and simulations show that the proposed prefetching and replacement policies significantly outperform conventional ones. Anticipated applications of these solutions include biomedical engineering, telehealth, medical information systems and business.
Style APA, Harvard, Vancouver, ISO itp.
11

Ashbrook, Daniel Lee. "Enabling mobile microinteractions". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33986.

Pełny tekst źródła
Streszczenie:
While much attention has been paid to the usability of desktop computers, mobile com- puters are quickly becoming the dominant platform. Because mobile computers may be used in nearly any situation--including while the user is actually in motion, or performing other tasks--interfaces designed for stationary use may be inappropriate, and alternative interfaces should be considered. In this dissertation I consider the idea of microinteractions--interactions with a device that take less than four seconds to initiate and complete. Microinteractions are desirable because they may minimize interruption; that is, they allow for a tiny burst of interaction with a device so that the user can quickly return to the task at hand. My research concentrates on methods for applying microinteractions through wrist- based interaction. I consider two modalities for this interaction: touchscreens and motion- based gestures. In the case of touchscreens, I consider the interface implications of making touchscreen watches usable with the finger, instead of the usual stylus, and investigate users' performance with a round touchscreen. For gesture-based interaction, I present a tool, MAGIC, for designing gesture-based interactive system, and detail the evaluation of the tool.
Style APA, Harvard, Vancouver, ISO itp.
12

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /". ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Stearns, Cameron P. cstearns. "A SYSTEM FOR CELL PHONE ANTI-THEFT THROUGH GAIT RECOGNITION". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1216.

Pełny tekst źródła
Streszczenie:
Studies show that smartphone thefts are a significant problem in the United States. [30] With many upcoming proposals to decrease the theft-rate of such devices, investigating new techniques for preventing smartphone theft is an important area of research. The prevalence of new biometric identification techniques for smartphones has led some researchers to propose biometric anti-theft measures for such devices, similar to the current fingerprint authentication system for iOS. Gait identification, a relatively recent field of study, seems to be a good fit for anti-theft because of the non-intrusive nature of passive pattern recognition in walking. In this paper, we reproduce and extend a modern gait recognition technique proposed in Cell Phone-Based Biometrics by testing the technique outside of the laboratory on real users under everyday conditions. We propose how this technique can be applied to create an anti-theft system, and we discuss future developments that will be necessary before such research is ready to be implemented in a release-quality product. Because previous studies have also centered around the ability to differentiate between individual users from a group, we will examine the accuracy of identifying whether or not a specific user is currently using a system. The system proposed in this paper shows results as high as 91% for cross-fold accuracy for some users; however, the predictive accuracy for a single day’s results ranged from 0.8% accuracy to 92.9% accuracy, showing an unreliability that makes such a system unlikely to be useful under the pressure of real-world conditions.
Style APA, Harvard, Vancouver, ISO itp.
14

Azam, A. S. M. Faruque, i Markus Johnsson. "Mobile One Time Passwords and RC4 Encryption for Cloud Computing". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14661.

Pełny tekst źródła
Streszczenie:
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. Therefore removing the need of providing these services themselves. This can for example lead to cost savings, better resource utilization and removing the need of technical expertise for the customers. There is big security concerns when using cloud services. Security is very important in cloud computing since people and companies store confidential data in the cloud. It must also be easy to use the services provided, since cloud services have so many users with different technical background. Since the control of services and data needed for the everyday-run of a corporation is being handled by another company, further issues needs to be concerned. The consumer needs to trust the provider, and know that they handle their data in a correct manner, and that resources can be accessed when needed. This thesis focuses on authentication and transmission encryption in cloud services. The current solutions used today to login to cloud services have been investigated and concluded that they don't satisfy the needs for cloud services. They are either insecure, complex or costly. It can also be concluded that the best encryption algorithm to use in a cloud environment is RC4, which is secure and at the same time a fast algorithm. Compared to AES, which together with RC4, are the most common encryption methods used over the Internet today, RC4 is the better choice. This thesis have resulted in an authentication and registration method that is both secure and easy to use, therefore fulfilling the needs of cloud service authentication. The method have been implemented in a fully working finished solution, that use a regular mobile phone to generate one time passwords that is used to login to cloud services. All of the data transmissions between the client and the server have been configured to use RC4 encryption. The conclusions that can be drawn is that the security proposal implemented in this thesis work functions very well, and provide good security together with an ease of use for clients that don't have so much technical knowledge.
Style APA, Harvard, Vancouver, ISO itp.
15

Tiwari, Shivendra Prasad. "Erection of interesting geospatial regions in the context of on-the-spot learning". Thesis, IIT Delhi, 2016. http://localhost:8080/iit/handle/2074/7045.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

翁楚灝 i Chor-ho Yung. "A mobile object container for dynamic component composition". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31225573.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Yung, Chor-ho. "A mobile object container for dynamic component composition". Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23234428.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Song, Xiang. "Seamless mobility in ubiquitous computing environments". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24671.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Ramachandran, Umakishore; Committee Member: Ahamad, Mustaque; Committee Member: Edwards, Keith; Committee Member: Liu, Ling; Committee Member: Suh, Sang-bum
Style APA, Harvard, Vancouver, ISO itp.
19

Chan, Yew Meng. "Processing mobile read-only transactions in broadcast environments with group consistency /". access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b19887504a.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.Phil.)--City University of Hong Kong, 2005.
"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 98-102)
Style APA, Harvard, Vancouver, ISO itp.
20

Chen, Jianwen, University of Western Sydney, of Science Technology and Environment College i School of Computing and Information Technology. "Data and knowledge transaction in mobile environments". THESIS_CSTE_CIT_Chen_J.xml, 2004. http://handle.uws.edu.au:8081/1959.7/806.

Pełny tekst źródła
Streszczenie:
Advances in wireless networking technology have engendered a new paradigm of computing, called mobile computing; in which users carrying portable devices have access to a shared infrastructure independent of their physical location. Mobile computing has matured rapidly as a field of computer science. In environments of mobile computing, the mobility and disconnection of portable computing devices introduce many new challenging problems that have never been encountered in conventional computer networks. New research issues combine different areas of computer science: networking, operating systems, data and knowledge management, and databases. This thesis studies data and knowledge transaction in mobile environments. To study transaction processing at the fundamental and theoretical level in mobile environments, a range of classical notions and protocols of transaction processing are rechecked and redefined in this thesis, and form the foundation for studying transaction processing in mobile environments. A criterion for mobile serial history is given and two new concurrency theorems are proved in mobile environments. In addition to data transaction, this thesis explores knowledge transaction in mobile environments. To study knowledge transaction in mobile environments this thesis presents and formalizes a knowledge transaction language and model for use in mobile computing environments. The thesis further formalizes a framework/model for a mobile logic programming multi-agent system which can be used to study knowledge transaction in multi-agent systems in mobile environments and is a very early effort towards a formal study of knowledge base and intelligent agents in mobile environments. This work provides a foundation for the formal specification and development of real-world mobile software systems, in the same way as traditional software systems have developed.
Doctor of Philosophy (PhD) (Science)
Style APA, Harvard, Vancouver, ISO itp.
21

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level". Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Pełny tekst źródła
Streszczenie:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
Style APA, Harvard, Vancouver, ISO itp.
22

Hill, Ryan Tebbutt. "Adaptive interfaces for mobile preference-based searching". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1248.

Pełny tekst źródła
Streszczenie:
Today's mobile computing devices provide a convenient means to search for points-of-interest (POIs) such as restaurants and accommodation. Mobile Preference-Based Search Tools (PBSTs) allow users to identify POIs such as restaurants or accommodation most suited to their needs and constraints using a mobile device. These devices however, have several design constraints including limited screen space and hardware capabilities. Adaptive User Interfaces (AUIs) have been proposed to address these issues but have not been extensively applied to mobile PBSTs such as mobile tourist guides. In addition, AUIs possess several benefits and advantages over static (traditional) interfaces, which do not take a user's preferences, skill set and experience into account. Little research, however, has been conducted into identifying the potential benefits of AUIs for mobile preference-based searching (PBS). The aim of this research was to determine the extent to which an AUI could improve the effectiveness and user satisfaction of mobile PBS. A literature study was conducted to determine the benefits and limitations of existing mobile PBSTs and determine how these could be improved. The potential benefits of AUIs for mobile PBSTs and a mobile map-based visualisation system were identified. A suitable model for incorporating an AUI into a mobile PBST was identified. The requirements for a mobile PBST were combined with the potentially adaptable objects of a Mobile Map-based Visualisation (MMV) system to provide adaptation suggestions for POInter, an existing mobile tourist guide. A field study using POInter was conducted in order to measure the extent to which participants agreed with suggestions provided for adapting the information, interaction and visualisation aspects of the system. These results were used to derive adaptation requirements for A-POInter, an adaptive version of POInter. Using a model-based design approach, an AUI was designed and implemented for A-POInter. An extensive field study was then conducted to evaluate the usability of the adaptations provided by A-POInter. The quantitative and qualitative data collected from the evaluations allowed the usability of A-POInter to be determined. The results of the field study showed that the participants were highly satisfied with the usability and the usefulness of the adaptations provided by A-POInter. Conclusions and recommendations for future work based on the results of the research were then outlined to conclude the dissertation.
Style APA, Harvard, Vancouver, ISO itp.
23

Chau, Ming Kit. "Quality of service routing in mobile ad hoc networks /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20CHAU.

Pełny tekst źródła
Streszczenie:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003.
Includes bibliographical references (leaves 156-159). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
24

Liu, Yu. "Power-based routing schemes for mobile ad hoc networks /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20LIUY.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 137-142). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
25

Jiang, Haotian. "WEARABLE COMPUTING TECHNOLOGIES FOR DISTRIBUTED LEARNING". Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1571072941323463.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Sundaram, Madhu, i Kejvan Redjamand. "Strategy of Mobile Communication System Providers in Cloud (Implementation of cloud in telecom by Ericsson)". Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2814.

Pełny tekst źródła
Streszczenie:
The telecom operators are experiencing low revenues due to reduction in voice calls and SMS in their networks mainly driven by communication services like Skype, Google talk, msn and other VOIP (voice over internet protocol) products. Instant messaging services and social networking are also taking away the operator’s customers reducing them to “dumb pipes” with the OTT (Over the Top) players like Google, Microsoft and other content providers making profits at the expense of the operator. The growth of operators’ revenue is not keeping pace with the growth of traffic in their networks creating the perception that the content providers and OTT players do not share their revenue generated using the operator’s infrastructure. The operators are therefore increasingly being reduced to act as “dumb pipes” connecting the content generated by OTT’s with the operator’s subscribers. The operator’s revenue stream in one-sided, only coming from the subscriber usually as a flat data plan. The operator’s are looking at new revenue models and the cloud computing market is a business opportunity which allows them to monetize their network resources with the possibility to earn revenue from both the subscriber and the content providers. The communication system providers who are the communication equipment vendors to the operators are indirectly affected from the shrinking operator revenue. As part of this thesis, we address how Telco’s and system vendors can differentiate in the cloud computing market against other cloud service providers and monetize the network resources which they own. We discuss the roles in the cloud value network and activities in the value chain that could be adopted and the business opportunities they could pursue. We begin by introducing the telecom operator market and the challenges faced by the industry today. The research question we are targeting is then discussed followed by the limitations of the thesis. The lecommunication industry, cloud computing technology and the relevant service delivery models are discussed. A literature review is then done to formulate our theory. Theory on strategy by Porter, Prahalad and other researchers who have contributed to the research on cloud computing are discussed. The method adopted is then proposed. Data collected is first presented and then analyzed before discussing the results of the analysis.
Style APA, Harvard, Vancouver, ISO itp.
27

Zhao, Xiaogeng. "A comparative analysis of Java and .NET mobile development environments for supporting mobile services". Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1003064.

Pełny tekst źródła
Streszczenie:
With the rapid development of wireless technologies, traditional mobile devices, such as pagers and cellular phones, have evolved from a purely communications and messaging-oriented medium to one that supports mobile data communication in general and acts as an application platform. As shown in a recent survey conducted by MDA, easy access to the present-day wireless Internet has resulted in mobile devices gaining more and more attention and popularity. The growth of and demand for mobile Web applications is expected to increase rapidly in the near future, as a range of software companies and mobile device manufacturers release increasingly accessible tools for creating mobile Web application and services. From a variety of possible development environments of this kind, the author has selected and examined two leading contenders, the J2ME and the Microsoft .NET mobile Web application development environments. This document reports the product life cycle of pilot mobile web applications, designed and implemented in each host environment in tum. A feature-by-feature investigation and comparison of the J2ME and .NET environments was carried out, covering the range of issues necessary for a complete mobile Web application development life cycle. The resulting analysis addresses features and efficiencies of the application development environment and the target deployment environment, the degree to which the resultant services are compatible on a variety of platforms, and the ease with which applications can be designed to be extensible. The thesis offers an objective evaluation of the J2ME and the .NET mobile development environments, which highlights their strengths and weaknesses, and suggests guidelines for designing, creating, and deploying high quality mobile Web applications. The research uncovers no clear winner across all categories assessed. J2ME currently favours situations in which bandwidth is limited and client side processing power is relatively sufficient, it exerts the processing power of mobile devices over distributed network environments. .NET requires a less constrained network throughput, but performs adequately on clients with more limited processing power, supports a more diverse target platform range, and offers a more efficient, in terms of development time, development environment. Both technologies are likely to receive significant user support for some time.
KMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Style APA, Harvard, Vancouver, ISO itp.
28

Chen, Jianwen. "Data and knowledge transaction in mobile environments". Thesis, View thesis, 2004. http://handle.uws.edu.au:8081/1959.7/806.

Pełny tekst źródła
Streszczenie:
Advances in wireless networking technology have engendered a new paradigm of computing, called mobile computing; in which users carrying portable devices have access to a shared infrastructure independent of their physical location. Mobile computing has matured rapidly as a field of computer science. In environments of mobile computing, the mobility and disconnection of portable computing devices introduce many new challenging problems that have never been encountered in conventional computer networks. New research issues combine different areas of computer science: networking, operating systems, data and knowledge management, and databases. This thesis studies data and knowledge transaction in mobile environments. To study transaction processing at the fundamental and theoretical level in mobile environments, a range of classical notions and protocols of transaction processing are rechecked and redefined in this thesis, and form the foundation for studying transaction processing in mobile environments. A criterion for mobile serial history is given and two new concurrency theorems are proved in mobile environments. In addition to data transaction, this thesis explores knowledge transaction in mobile environments. To study knowledge transaction in mobile environments this thesis presents and formalizes a knowledge transaction language and model for use in mobile computing environments. The thesis further formalizes a framework/model for a mobile logic programming multi-agent system which can be used to study knowledge transaction in multi-agent systems in mobile environments and is a very early effort towards a formal study of knowledge base and intelligent agents in mobile environments. This work provides a foundation for the formal specification and development of real-world mobile software systems, in the same way as traditional software systems have developed.
Style APA, Harvard, Vancouver, ISO itp.
29

Darling, James Campbell Charles. "The application of distributed and mobile computing techniques to advanced simulation and virtual reality systems". Thesis, University of Surrey, 1998. http://epubs.surrey.ac.uk/843917/.

Pełny tekst źródła
Streszczenie:
Current technologies for creating distributed simulations or virtual environments are too limited in terms of scalability and flexibility, particularly in the areas of network saturation, distribution of VR scenes, and co-ordination of large systems of active objects. This thesis proposes the use of mobile and distributed computing technology to alleviate some of these limitations. A study of contemporary technologies for distributed simulation and networked virtual environments has been made, examining the benefits and drawbacks of different techniques. The main theory that has been investigated is that processing of a global simulation space should be spread over a network of computers, the principle of locality cutting the network bandwidth required. Using a prototype language for distributed graph processing, which fully supports mobile programming, experimental systems have been developed to demonstrate the use of distributed processing in creating large-scale virtual environments. The working examples created show that the ideas proposed for distribution of interactive virtual environments are valid, and that mobile programming techniques provide a new direction of development for the field of simulation. A more detailed summary of the work is given in Appendix D. Five publications to date (shown overleaf) have resulted from my involvement in the work, and a number of others have resulted from the overall project.
Style APA, Harvard, Vancouver, ISO itp.
30

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Pełny tekst źródła
Streszczenie:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
Style APA, Harvard, Vancouver, ISO itp.
31

Cailean, Diana Andreea, i Kobra Sharifi. "Mobile ERP : A literature review on the concept of Mobile ERP systems". Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-23522.

Pełny tekst źródła
Streszczenie:
Mobile Enterprise Resource Planning (ERP) is still a very young topic which is in the pro-cess of developing in practice and research. Reviews of the topic of mobile ERP are lack-ing. The purpose of  this  thesis  is  to  investigate how the concept of “Mobile ERP” has evolved by reviewing scientific articles on the topic from 1998 until June 2013. The total amount of articles we found when using the search term “Mobile ERP” was 246 articles and we could access 129 articles. These are the articles used for the literature review. We found, based on a framework used in previous studies for ERP that there are nine topic categories in which the articles can be divided and each category has a different evolution-ary level compared to the research area of “non-mobile ERP”. Mobile ERP has a signifi-cantly smaller number of results compared to ERP which had 886 articles in Schlichter & Kraemmergaard (2010). The nine topic categories are the following: Implementation of Mobile ERP, Management and Mobile ERP issues, Mobile ERP and Supply Chain Management, Optimisation of Mo-bile ERP, Mobile ERP and education, Studying Mobile ERP, The mobile ERP Market and Industry, The Mobile ERP Tool and Other. The topic with the most articles is “The Mobile ERP tool” followed by the topic “Other”, in which we have included both articles that have no relevance and articles that are very general and which cannot be categorized in only one category clearly. In third place comes “Optimisation of Mobile ERP” followed by “Implementation of Mobile ERP”, “Manage-ment and Mobile ERP issues”, “The Mobile ERP market and industry”, “Mobile ERP and supply chain management”, “Studying Mobile ERP” and last comes “Mobile ERP and ed-ucation” which is the only topic in which we did not manage to categorize any articles.
Style APA, Harvard, Vancouver, ISO itp.
32

Tsai, Chia-Yu. "Prescription Express System". CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2400.

Pełny tekst źródła
Streszczenie:
The Prescription Express System is a software program that was developed with express service of health care in mind. The purpose was to provide easy access for doctors to check on upcoming appointments with patients and send prescriptions via wireless network directly to the pharmacy to provide faster service.
Style APA, Harvard, Vancouver, ISO itp.
33

Dey, Anind K. "Providing architectural support for building context-aware applications". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/9232.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Chen, Jianwen. "Data and knowledge transaction in mobile environments". View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050729.131812/index.html.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.) -- University of Western Sydney, 2004.
A thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy (Science) - Computing and Information Technology. Includes bibliography.
Style APA, Harvard, Vancouver, ISO itp.
35

Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols". Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
Style APA, Harvard, Vancouver, ISO itp.
36

Le, Dantec Christopher. "Community resource messenger: a mobile system and design exploration in support of the urban homeless". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41128.

Pełny tekst źródła
Streszczenie:
Access to computers, to mobile phones, and to data connectivity has opened new avenues of interaction and created expectations about the flattening of society brought about by these new modes of production. These technologies have enabled us to recognize many forms of community---from close knit social groups to individuals who merely co-habit public spaces---and to support interaction with each other in novel ways. The notion that modern digital technology holds promises of democratization by expanding access to information and broadening modes of knowledge production often fails to acknowledge that these benefits rely upon devices and infrastructure whose availability reflect socioeconomic contours; that the technologies that enable information access can also reinforce rather than obviate marginality due to barriers to access and suitability. This assessment points to opportunities for better understanding and better designing technologies for the marginalized or dispossessed. The research presented in this dissertation discusses the findings from empirical, theoretical, and design based investigations of technology use with the urban homeless. The empirical work provides a foundation for understanding current technology practices among the homeless and their care providers. The theoretical investigation develops Deweyan publics as a novel frame for participatory design. The design-based investigation presents findings from the design and deployment of the Community Resource Messenger at a shelter for homeless mothers. The results of this research shed light on impact of social computing platforms on social service provision and on the ways the staff and residents used the Community Resource Messenger as a resource for identifying common issues and taking action to contend with those issues.
Style APA, Harvard, Vancouver, ISO itp.
37

Hu, Cheng. "Bio-inspired visual motion sensing systems for mobile robots". Thesis, University of Lincoln, 2017. http://eprints.lincoln.ac.uk/32117/.

Pełny tekst źródła
Streszczenie:
Many animals, especially flying insects are experts on reacting to approaching predators. For robots, the ability to avoiding collisions is also crucial. In locusts, a visual neuron called the Lobula Giant Movement Detector (LGMD) has been identified to be responsible for evoking collision avoidance behaviours. It has been modelled for collision avoidance on large robots or vehicles whose computational power are abundant. For micro robots, however, the limited computational capabilities on-board prevent the LGMD model to be accomplished on the robot by its own. Therefore in earlier researches, those micro robots serve only as image grabbers and motion actuators, leaving majority of the model processed on a host device connected. The unavoidable communication and consequent latency have become the bottlenecks that restrains the employment of this promising collision avoidance model in multi-agent research fields such as swarm robotics. This research focuses on the embedded modelling and realization of this bio-inspired collision sensitive model ELGMD. By carefully considering the required on-board resource, a novel micro robot Colias IV is designed to meet the requirements. Featured with the sufficient computing power, various of sensing modalities including a tiny camera, the modularized design and other specialities, this robot has become an advantageous platform to perform embedded vision tasks. The bio-inspired neural model Embedded-LGMD (ELGMD) is realized on the micro robot that can run autonomously without any off-board guidance. Optimization on the structure and timing has guaranteed its computational efficiency. The performance of the ELGMD and the effectiveness on triggering the robot's collision avoidance behaviour are tested via systematic experiments. To achieve more precise interactive behaviours with other kinds of moving obstacles, a compound motion detection system is realized within the robot to detect various of motion patterns by integrating several neural models at a higher level, in which those LGMD-like neural models are accomplished by an unified ELGMD model with minimum reconfiguration. Experiments have been conducted to validate the improved ELGMD model and the compound motion detection system. Results of this research have demonstrated the design goals of all the proposed modules, including the hardware platform, the bio-inspired model and the compound motion detection system, indicating the practicability of implementing these bio-inspired visual motion sensing systems for further robotic studies.
Style APA, Harvard, Vancouver, ISO itp.
38

Bani, Yassein Muneer O. "On the performance of probabilistic flooding in wireless mobile ad hoc networks". Thesis, Connect to e-thesis, 2006. http://theses.gla.ac.uk/720/.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.) - University of Glasgow, 2006.
Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
Style APA, Harvard, Vancouver, ISO itp.
39

Xu, Zichen. "Energy Modeling and Management for Data Services in Multi-Tier Mobile Cloud Architectures". The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1468272637.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Seshasayee, Balasubramanian. "Middleware-based services for virtual cooperative mobile platforms". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24791.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2008.
Committee Chair: Schwan, Karsten; Committee Member: Fujimoto, Richard; Committee Member: Narasimhan, Nitya; Committee Member: Pande, Santosh; Committee Member: Riley, George.
Style APA, Harvard, Vancouver, ISO itp.
41

Jacobs, Gershwin. "User experience guidelines for mobile natural user interfaces: a case study of physically disabled users". Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/17547.

Pełny tekst źródła
Streszczenie:
Motor impaired people are faced with many challenges, one being the of lack integration into certain spheres of society. Access to information is seen as a major issue for the motor impaired since most forms of interaction or interactive devices are not suited to the needs of motor impaired people. People with motor impairments, like the rest of the population, are increasingly using mobile phones. As a result of the current devices and methods used for interaction with content on mobile phones, various factors prohibit a pleasant experience for users with motor impairments. To counter these factors, this study recognizes the need to implement better suited methods of interaction and navigation to improve accessibility, usability and user experience for motor impaired users. The objective of the study was to gain an understanding of the nature of motor impairments and the challenges that this group of people face when using mobile phones. Once this was determined, a solution to address this problem was found in the form of natural user interfaces. In order to gain a better understanding of this technology, various forms of NUIs and the benefits thereof were studied by the researcher in order to determine how this technology can be implemented to meet the needs of motor impaired people. To test theory, the Samsung Galaxy s5 was selected as the NUI device for the study. It must be noted that this study started in the year 2013 and the Galaxy S5 was the latest device claiming to improve interaction for disabled people at the time. This device was used in a case study that made use of various data collection methods, including participant interviews. Various motor impaired participants were requested to perform predefined tasks on the device, along with the completion of a set of user experience questionnaires. Based on the results of the study, it was found that interaction with mobile phones is an issue for people with motor impairments and that alternative methods of interaction need to be implemented. These results contributed to the final output of this study, namely a set of user experience guidelines for the design of mobile human computer interaction for motor impaired users.
Style APA, Harvard, Vancouver, ISO itp.
42

Zhou, Junyang. "Enhanced signal propagation models and algorithm selector for providing location estimation services within cellular radio networks". HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/776.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Kaddour, Inan. "Mobile Cloud Computing: A Comparison Study of Cuckoo and AIOLOS Offloading Frameworks". UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/785.

Pełny tekst źródła
Streszczenie:
Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow smart mobile devices to take full advantage of cloud computing. Code offloading is one of the techniques employed in cloud computing with mobile devices. This research compares two dynamic offloading frameworks to determine which one is better in terms of execution time and battery life improvement.
Style APA, Harvard, Vancouver, ISO itp.
44

Chong, Ming Ki. "Usable Authentication for Mobile Banking". Thesis, University of Cape Town, 2009. http://pubs.cs.uct.ac.za/archive/00000520/.

Pełny tekst źródła
Streszczenie:
Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the requirements of performing a mobile banking transaction is that users are required to login before use. The current mobile banking login method is PIN authentication; however, results from other research studies have found that there are usability concerns of using PINs. To overcome some of the concerns, researchers have suggested the use graphical passwords. In this research, we argue that another alternative input technique can be utilized. We explore a novel password input approach, called gesture passwords, of using 3-dimensional discrete gesture motions as password elements. As a result, three systems (PINs, graphical passwords and gesture passwords) were compared. This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN authenticator were evaluated with users. User experience and password retention were evaluated to determine the usability and users’ acceptance of each system. Experiments were conducted to evaluate the above. Results from the experiments show that users were able to use all of the testing systems; however, the results reveal that users are more proficient and preferred to use PINs for mobile banking authentication than the other two systems.
Style APA, Harvard, Vancouver, ISO itp.
45

Imsuksri, Sumit. "Mobile order entry system based on the wireless technology". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2265.

Pełny tekst źródła
Streszczenie:
The sales representatives primary duties are to attract wholesale and retail buyers and purchasing agents to their merchandise, and to address any of their client's questions or concerns. Aided by a laptop computer connected to the Internet, they can access the customer information and sell products to their customer immediately. This project, a Mobile Order Entry System using cellphones, will give sales representatives as state-of-the-art alternative in accessing anf selling products to their customers through cell phones instead of using laptop computers.
Style APA, Harvard, Vancouver, ISO itp.
46

Keshariya, Mayank. "Extended Policy-Based Management Framework to Provide Always Best Connected Services in Heterogeneous Mobile Environments". Thesis, University of Canterbury. Computer Science and Software Engineering, 2009. http://hdl.handle.net/10092/2549.

Pełny tekst źródła
Streszczenie:
The growth in the popularity of Internet services, increasing demands of mobile users together with a wide range of access technologies and mobile-networked devices, introduces the notion of integration and inter-working of heterogeneous access networks. Sometimes referred to as 4th generation (4G) networks, the overall objective of this research is to provide a managed Always Best Connected (ABC) service over underlying heterogeneous wireless and mobile platforms while maintaining negotiated security and Quality of Service in a scalable and modular environment. This research proposes a new model and its architecture for policy-based management (PBM) to provide a framework for the centralised management of networks based on business-level policies. This work extends existing IETF Policy-based Network Management (PBNM) model by introducing a new layered-approach which facilitates the negotiation of management services over interconnected heterogeneous mobile platforms, thus achieving an ABC scenario. The proposed layered-approach provides flexibility to the organisations so that they can choose favourable semantic and syntactic approaches and facilitates the separation of management policies from their implementation in a distributed and heterogeneous environment. The extended Policy Information Model and a new policy conflict detection technique are also introduced. Further, we have proposed and implemented a new model of a policy-managed mobile client and its architecture to support seamless handoff across multiple access networks. The proposed mobile client supports multi-domain authentication and security along with downloadable user profiles. We have also proposed and implemented a network selection algorithm and introduced a new Infrastructure parameter, which assists in selecting an optimum time and the best available access network to handoff. We present performance analysis to validate our architectural approach.
Style APA, Harvard, Vancouver, ISO itp.
47

Hightower, Jeffrey. "The location stack /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6917.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Zhu, Manli. "On processing spatial queries in mobile client/server environments /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20ZHU.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Mihailescu, Patrik 1977. "MAE : a mobile agent environment for resource limited devices". Monash University, School of Network Computing, 2003. http://arrow.monash.edu.au/hdl/1959.1/5805.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Cheung, Kin Pong. "Performance evaluation of scheduling algorithms on Bluetooth piconet and scatternet network /". View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20CHEUNG.

Pełny tekst źródła
Streszczenie:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.
Includes bibliographical references (leaves 63-66). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii