Rozprawy doktorskie na temat „Mobile computing - Computer system”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Mobile computing - Computer system”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Ceran, Onur. "A Context Aware Emergency Management System Using Mobile Computing". Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615606/index.pdf.
Pełny tekst źródłaPrabhu, Nitin Kumar Vijay. "Transaction processing in Mobile Database System". Diss., UMK access, 2006.
Znajdź pełny tekst źródła"A dissertation in computer science and informatics and telecommunications and computer networking." Advisor: Vijay Kumar. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 152-157). Online version of the print edition.
周彧 i Yuk Chow. "A light-weight mobile code system for pervasive computing". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.
Pełny tekst źródłaPinkerton, Michael David. "Ubiquitous computing : extending access to mobile data". Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.
Pełny tekst źródłaLiu, Huanjin. "Free roaming: A system for ubiquitous computing". CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.
Pełny tekst źródłaBerrios, Moron Jonathan Glenn. "Quality of Experience Provisioning in Mobile Cloud Computing". Thesis, Luleå tekniska universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70837.
Pełny tekst źródłaMomin, Kaleem A. "A transaction execution model for mobile computing environments". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.
Pełny tekst źródłaBridle, Robert Angus. "Adaptive user interfaces for mobile computing devices /". View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081117.184430/index.html.
Pełny tekst źródłaWarshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing". CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.
Pełny tekst źródłaDrakatos, Stylianos. "Context-aware data caching for mobile computing environments". FIU Digital Commons, 2006. http://digitalcommons.fiu.edu/etd/3082.
Pełny tekst źródłaAshbrook, Daniel Lee. "Enabling mobile microinteractions". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33986.
Pełny tekst źródłaDelwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /". ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.
Pełny tekst źródłaStearns, Cameron P. cstearns. "A SYSTEM FOR CELL PHONE ANTI-THEFT THROUGH GAIT RECOGNITION". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1216.
Pełny tekst źródłaAzam, A. S. M. Faruque, i Markus Johnsson. "Mobile One Time Passwords and RC4 Encryption for Cloud Computing". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14661.
Pełny tekst źródłaTiwari, Shivendra Prasad. "Erection of interesting geospatial regions in the context of on-the-spot learning". Thesis, IIT Delhi, 2016. http://localhost:8080/iit/handle/2074/7045.
Pełny tekst źródła翁楚灝 i Chor-ho Yung. "A mobile object container for dynamic component composition". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31225573.
Pełny tekst źródłaYung, Chor-ho. "A mobile object container for dynamic component composition". Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23234428.
Pełny tekst źródłaSong, Xiang. "Seamless mobility in ubiquitous computing environments". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24671.
Pełny tekst źródłaCommittee Chair: Ramachandran, Umakishore; Committee Member: Ahamad, Mustaque; Committee Member: Edwards, Keith; Committee Member: Liu, Ling; Committee Member: Suh, Sang-bum
Chan, Yew Meng. "Processing mobile read-only transactions in broadcast environments with group consistency /". access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b19887504a.pdf.
Pełny tekst źródła"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 98-102)
Chen, Jianwen, University of Western Sydney, of Science Technology and Environment College i School of Computing and Information Technology. "Data and knowledge transaction in mobile environments". THESIS_CSTE_CIT_Chen_J.xml, 2004. http://handle.uws.edu.au:8081/1959.7/806.
Pełny tekst źródłaDoctor of Philosophy (PhD) (Science)
Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level". Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Pełny tekst źródłaENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
Hill, Ryan Tebbutt. "Adaptive interfaces for mobile preference-based searching". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1248.
Pełny tekst źródłaChau, Ming Kit. "Quality of service routing in mobile ad hoc networks /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20CHAU.
Pełny tekst źródłaIncludes bibliographical references (leaves 156-159). Also available in electronic version. Access restricted to campus users.
Liu, Yu. "Power-based routing schemes for mobile ad hoc networks /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20LIUY.
Pełny tekst źródłaIncludes bibliographical references (leaves 137-142). Also available in electronic version. Access restricted to campus users.
Jiang, Haotian. "WEARABLE COMPUTING TECHNOLOGIES FOR DISTRIBUTED LEARNING". Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1571072941323463.
Pełny tekst źródłaSundaram, Madhu, i Kejvan Redjamand. "Strategy of Mobile Communication System Providers in Cloud (Implementation of cloud in telecom by Ericsson)". Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2814.
Pełny tekst źródłaZhao, Xiaogeng. "A comparative analysis of Java and .NET mobile development environments for supporting mobile services". Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1003064.
Pełny tekst źródłaKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Chen, Jianwen. "Data and knowledge transaction in mobile environments". Thesis, View thesis, 2004. http://handle.uws.edu.au:8081/1959.7/806.
Pełny tekst źródłaDarling, James Campbell Charles. "The application of distributed and mobile computing techniques to advanced simulation and virtual reality systems". Thesis, University of Surrey, 1998. http://epubs.surrey.ac.uk/843917/.
Pełny tekst źródłaKarlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.
Pełny tekst źródłaCailean, Diana Andreea, i Kobra Sharifi. "Mobile ERP : A literature review on the concept of Mobile ERP systems". Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-23522.
Pełny tekst źródłaTsai, Chia-Yu. "Prescription Express System". CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2400.
Pełny tekst źródłaDey, Anind K. "Providing architectural support for building context-aware applications". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/9232.
Pełny tekst źródłaChen, Jianwen. "Data and knowledge transaction in mobile environments". View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050729.131812/index.html.
Pełny tekst źródłaA thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy (Science) - Computing and Information Technology. Includes bibliography.
Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols". Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.
Pełny tekst źródłaLe, Dantec Christopher. "Community resource messenger: a mobile system and design exploration in support of the urban homeless". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41128.
Pełny tekst źródłaHu, Cheng. "Bio-inspired visual motion sensing systems for mobile robots". Thesis, University of Lincoln, 2017. http://eprints.lincoln.ac.uk/32117/.
Pełny tekst źródłaBani, Yassein Muneer O. "On the performance of probabilistic flooding in wireless mobile ad hoc networks". Thesis, Connect to e-thesis, 2006. http://theses.gla.ac.uk/720/.
Pełny tekst źródłaPh.D. thesis submitted to the Faculty of Information and Mathematical Sciences, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
Xu, Zichen. "Energy Modeling and Management for Data Services in Multi-Tier Mobile Cloud Architectures". The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1468272637.
Pełny tekst źródłaSeshasayee, Balasubramanian. "Middleware-based services for virtual cooperative mobile platforms". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24791.
Pełny tekst źródłaCommittee Chair: Schwan, Karsten; Committee Member: Fujimoto, Richard; Committee Member: Narasimhan, Nitya; Committee Member: Pande, Santosh; Committee Member: Riley, George.
Jacobs, Gershwin. "User experience guidelines for mobile natural user interfaces: a case study of physically disabled users". Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/17547.
Pełny tekst źródłaZhou, Junyang. "Enhanced signal propagation models and algorithm selector for providing location estimation services within cellular radio networks". HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/776.
Pełny tekst źródłaKaddour, Inan. "Mobile Cloud Computing: A Comparison Study of Cuckoo and AIOLOS Offloading Frameworks". UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/785.
Pełny tekst źródłaChong, Ming Ki. "Usable Authentication for Mobile Banking". Thesis, University of Cape Town, 2009. http://pubs.cs.uct.ac.za/archive/00000520/.
Pełny tekst źródłaImsuksri, Sumit. "Mobile order entry system based on the wireless technology". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2265.
Pełny tekst źródłaKeshariya, Mayank. "Extended Policy-Based Management Framework to Provide Always Best Connected Services in Heterogeneous Mobile Environments". Thesis, University of Canterbury. Computer Science and Software Engineering, 2009. http://hdl.handle.net/10092/2549.
Pełny tekst źródłaHightower, Jeffrey. "The location stack /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6917.
Pełny tekst źródłaZhu, Manli. "On processing spatial queries in mobile client/server environments /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20ZHU.
Pełny tekst źródłaMihailescu, Patrik 1977. "MAE : a mobile agent environment for resource limited devices". Monash University, School of Network Computing, 2003. http://arrow.monash.edu.au/hdl/1959.1/5805.
Pełny tekst źródłaCheung, Kin Pong. "Performance evaluation of scheduling algorithms on Bluetooth piconet and scatternet network /". View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20CHEUNG.
Pełny tekst źródłaIncludes bibliographical references (leaves 63-66). Also available in electronic version. Access restricted to campus users.