Gotowa bibliografia na temat „MOBILE COMPUTING MODEL”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „MOBILE COMPUTING MODEL”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "MOBILE COMPUTING MODEL"
Jararweh, Yaser, Lo’ai Tawalbeh, Fadi Ababneh, Abdallah Khreishah i Fahd Dosari. "Scalable Cloudlet-based Mobile Computing Model". Procedia Computer Science 34 (2014): 434–41. http://dx.doi.org/10.1016/j.procs.2014.07.051.
Pełny tekst źródłaWojarnik, Grzegorz. "MODEL OF MOBILE DATA SYNCHRONIZATION WITHIN CLOUD COMPUTING SERVICES". Zeszyty Naukowe Uniwersytetu Szczecińskiego. Studia Informatica 44 (2017): 63–72. http://dx.doi.org/10.18276/si.2017.44-06.
Pełny tekst źródłaMora, Higinio, Francisco J. Mora Gimeno, María Teresa Signes-Pont i Bruno Volckaert. "Multilayer Architecture Model for Mobile Cloud Computing Paradigm". Complexity 2019 (11.02.2019): 1–13. http://dx.doi.org/10.1155/2019/3951495.
Pełny tekst źródłaAlakbarov, R. G. "Model of Optimal Placement of Cloudlets in a Wireless Metropolitan Area Network". Informacionnye Tehnologii 29, nr 4 (18.04.2023): 182–88. http://dx.doi.org/10.17587/it.29.182-188.
Pełny tekst źródłaEl-Sofany, Hosam, i Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment". International Journal of Interactive Mobile Technologies (iJIM) 13, nr 01 (29.01.2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.
Pełny tekst źródłaHan, Songyue, Dawei Ma, Chao Kang, Wei Huang, Chaoying Lin i Chunyuan Tian. "Optimization of Mobile Edge Computing Offloading Model for Distributed Wireless Sensor Devices". Journal of Sensors 2022 (28.02.2022): 1–9. http://dx.doi.org/10.1155/2022/9047737.
Pełny tekst źródłaSun, Chang Li, Chang Liu i Dan Shi. "Study on the Architecture of Mobile Campus Digital Library System". Applied Mechanics and Materials 608-609 (październik 2014): 425–29. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.425.
Pełny tekst źródłaPham, Hai Son, Hoang Son Le i The Anh Hoang. "Propose technology and management model of mobile cloud computing for the Vietnam national digital transformation program". Ministry of Science and Technology, Vietnam 65, nr 8 (25.08.2023): 35–39. http://dx.doi.org/10.31276/vjst.65(8).35-39.
Pełny tekst źródłaP., Pavithra, i Balamurugan K. "Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model". Bonfring International Journal of Software Engineering and Soft Computing 8, nr 2 (30.04.2018): 21–25. http://dx.doi.org/10.9756/bijsesc.8391.
Pełny tekst źródłaJiang, Weijin, Yang Wang, Yirong Jiang, Yuhui Xu, Jiahui Chen, Lina Tan i Guo Liang. "Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing". Computers, Materials & Continua 62, nr 1 (2020): 123–36. http://dx.doi.org/10.32604/cmc.2020.05933.
Pełny tekst źródłaRozprawy doktorskie na temat "MOBILE COMPUTING MODEL"
Brander, William. "A model for adaptive multimodal mobile notification". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/699.
Pełny tekst źródłaMomin, Kaleem A. "A transaction execution model for mobile computing environments". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.
Pełny tekst źródłaVieira, André Fonseca dos Santos Dias. "Context-aware personalization environment for mobile computing". Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8649.
Pełny tekst źródłaCurrently, we live in a world where the amount of on-line information vastly outstrips any individual’s capability to survey it. Filtering that information in order to obtain only useful and interesting information is a solution to this problem. The mobile computing area proposes to integrate computation in users’ daily activities in an unobtrusive way, in order to guarantee an improvement in their experience and quality of life. Furthermore, it is crucial to develop smaller and more intelligent devices to achieve this area’s goals, such as mobility and energy savings. This computing area reinforces the necessity to filter information towards personalization due to its humancentred paradigm. In order to attend to this personalization necessity, it is desired to have a solution that is able to learn the users preferences and needs, resulting in the generation of profiles that represent each style of interaction between a user and an application’s resources(e.g. buttons and menus). Those profiles can be obtained by using machine learning algorithms that use data derived from the user interaction with the application, combined with context data and explicit user preferences. This work proposes an environment with a generic context-aware personalization model and a machine learning module. It is provided the possibility to personalize an application, based on user profiles obtained from data, collected from implicit and explicit user interaction. Using a provided personalization API (Application Programming Interface) and other configuration modules, the environment was tested on LEY (Less energy Empowers You), a persuasive mobile-based serious game to help people understand domestic energy usage.
Frank, Christopher E. "An Egocentric Spatial Data Model for Intelligent Mobile Geographic Information Systems". Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/FrankCE2003.pdf.
Pełny tekst źródłaChen, Jiajun. "Understanding consumers' acceptance of mobile payments : a theoretical model and empirical validation". Thesis, University of Portsmouth, 2007. https://researchportal.port.ac.uk/portal/en/theses/understanding-consumers-acceptance-of-mobile-payments(5b1ab076-9225-40cb-8e48-ea620ad1d512).html.
Pełny tekst źródłaal, Nabhan Mohammad Mousa. "Adaptive, reliable, and accurate positioning model for location-based services". Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3963.
Pełny tekst źródłaTaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.
Pełny tekst źródłaAbdul, Rehman Bin Omer. "Mobile Edge Computing Clustering Algorithms for Pedestrian Mobility Scenarios". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Znajdź pełny tekst źródłaPather, Direshin. "A model for context awareness for mobile applications using multiple-input sources". Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/2969.
Pełny tekst źródłaNtawanga, Felix Fred. "A context-aware model to improve usability of information presented on mobile devices". Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020768.
Pełny tekst źródłaKsiążki na temat "MOBILE COMPUTING MODEL"
Bagchi, Susmit. Ubiquitous multimedia and mobile agents: Models and implementations. Hershey, PA: Information Science Reference, 2012.
Znajdź pełny tekst źródłaBraun, Peter. Mobile agents: Basic concepts, mobility models, and the Tracy toolkit. San Francisco, CA: Elsevier, 2005.
Znajdź pełny tekst źródłaAman, Bogdan. Mobility in Process Calculi and Natural Computing. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.
Znajdź pełny tekst źródłaMilner, R. Communicating and mobile systems: The [symbol for pi]-calculus. New York: Cambridge University Press, 1999.
Znajdź pełny tekst źródłaCOORDINATION 2010 (2010 Amsterdam, Netherlands). Coordination models and languages: 12th international conference, COORDINATION 2010, Amsterdam, The Netherlands, June 7-9, 2010 : proceedings. Berlin: Springer, 2010.
Znajdź pełny tekst źródłaMobile Cloud Computing: Foundations and Service Models. Elsevier Science & Technology Books, 2017.
Znajdź pełny tekst źródłaHuang, Dijiang, i Huijun Wu. Mobile Cloud Computing: Foundations and Service Models. Elsevier Science & Technology Books, 2017.
Znajdź pełny tekst źródłaCommunication Models in Mobile Computing Systems and Mobile Agents. Storming Media, 2000.
Znajdź pełny tekst źródłaQiu, Meikang, i Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Znajdź pełny tekst źródłaQiu, Meikang, i Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Znajdź pełny tekst źródłaCzęści książek na temat "MOBILE COMPUTING MODEL"
Liang, Hongbin, Dijiang Huang i Daiyuan Peng. "On Economic Mobile Cloud Computing Model". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 329–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29336-8_22.
Pełny tekst źródłaJiang, Weijin, Yirong Jiang, Yang Wang, Jiahui Chen, Yuhui Xu i Li’na Tan. "Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing". W Human Centered Computing, 169–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15127-0_17.
Pełny tekst źródłaYang, Cungang, i Chang N. Zhang. "A Privacy Enhanced Role-Based Access Control Model for Enterprises". W Networking and Mobile Computing, 1012–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_106.
Pełny tekst źródłaJiang, Weijin, i Yuhui Xu. "Research on Mobile User Dynamic Trust Model Based on Mobile Agent System". W Human Centered Computing, 538–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74521-3_56.
Pełny tekst źródłaPatil, Rachana Yogesh, i Manjiri Arun Ranjanikar. "A New Network Forensic Investigation Process Model". W Mobile Computing and Sustainable Informatics, 139–46. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1866-6_9.
Pełny tekst źródłaLin, Wei, Yongtian Yang i Shuqin Zhang. "A Computational Reputation Model in P2P Networks Based on Trust and Distrust". W Networking and Mobile Computing, 501–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_54.
Pełny tekst źródłaMadria, Sanjay Kumar, Mukesh Mohania i John F. Roddick. "Approximate Query Processing Model for Mobile Computing". W Information Organization and Databases, 207–19. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-1379-7_15.
Pełny tekst źródłaJiang, Wei-Jin, Jia-Hui Chen, Yu-Hui Xu i Yang Wang. "Mobile Agent-Based Mobile Intelligent Business Security Transaction Model". W Computer Supported Cooperative Work and Social Computing, 50–65. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3044-5_4.
Pełny tekst źródłaLiu, Xian, i Yupo Chan. "Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model". W Networking and Mobile Computing, 314–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_35.
Pełny tekst źródłaKomiya, Takao, i Makoto Takizawa. "Mobile Agent Model for Fault-Tolerant Objects Systems". W Cooperative Internet Computing, 22–36. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0435-1_2.
Pełny tekst źródłaStreszczenia konferencji na temat "MOBILE COMPUTING MODEL"
du Toit, Jaco, i Ian Ellefsen. "A model for secure mobile computing". W 2015 Science and Information Conference (SAI). IEEE, 2015. http://dx.doi.org/10.1109/sai.2015.7237299.
Pełny tekst źródłaLin, Qing, i Yulei Huang. "A Cost-effective Mobile Edge Computing Model". W Proceedings of the 2018 2nd International Conference on Economic Development and Education Management (ICEDEM 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icedem-18.2018.77.
Pełny tekst źródłaZeroual, Abdelhakim, Mohamed Amroune, Makhlouf Derdour, Abdallah Meraoumia i Atef Bentahar. "Deep authentication model in Mobile Cloud Computing". W 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE, 2018. http://dx.doi.org/10.1109/pais.2018.8598508.
Pełny tekst źródłaEnnya, Zainab, Moulay Youssef Hadi i Amine Abouaomar. "Computing Tasks Distribution in Fog Computing: Coalition Game Model". W 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 2018. http://dx.doi.org/10.1109/wincom.2018.8629587.
Pełny tekst źródłaBondarchuk, Aleksandr P., Pavel V. Abramov, Svetlana M. Bogdanova i Denis M. Filatov. "Mobile Robot Model Predictive Control Model". W 2022 XXV International Conference on Soft Computing and Measurements (SCM). IEEE, 2022. http://dx.doi.org/10.1109/scm55405.2022.9794835.
Pełny tekst źródłaBelli, Dimitri, Stefano Chessa, Luca Foschini i Michele Girolami. "Enhancing Mobile Edge Computing Architecture with Human-Driven Edge Computing Model". W 2018 14th International Conference on Intelligent Environments (IE). IEEE, 2018. http://dx.doi.org/10.1109/ie.2018.00023.
Pełny tekst źródłaXu Wu. "A distributed trust model for mobile computing environments". W 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icicisys.2010.5658581.
Pełny tekst źródłaXiaodong Zhang, Dianhui Chu i Yongdong Xu. "Design and research on mobile computing service model". W 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0773.
Pełny tekst źródłaSuh, Wonho. "Graphical Analysis of Mobile Computing Traffic Simulation Model". W 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717839.
Pełny tekst źródłaWang, Changxu, Na Jiang i Libao Chen. "Dynamic model distributing optimization for Mobile Edge Computing". W 2021 International Conference on Computers and Automation (CompAuto). IEEE, 2021. http://dx.doi.org/10.1109/compauto54408.2021.00012.
Pełny tekst źródłaRaporty organizacyjne na temat "MOBILE COMPUTING MODEL"
Tkachuk, Viktoriia V., Vadym P. Shchokin i Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], listopad 2018. http://dx.doi.org/10.31812/123456789/2668.
Pełny tekst źródłaCorum, Zachary, Ethan Cheng, Stanford Gibson i Travis Dahl. Optimization of reach-scale gravel nourishment on the Green River below Howard Hanson Dam, King County, Washington. Engineer Research and Development Center (U.S.), kwiecień 2022. http://dx.doi.org/10.21079/11681/43887.
Pełny tekst źródła