Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
161 |
Reliability and security in mobile ad hoc networksScott, Donald J. Yasinsac, Alec. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 7, 2006). Document formatted into pages; contains ix, 34 pages. Includes bibliographical references.
|
162 |
Untersuchung des Energieeinsparungspotenzials in eingebetteten Systemen durch energieoptimierende CompilertechnikSteinke, Stefan. Unknown Date (has links) (PDF)
Techn. Hochsch., Diss., 2003--Aachen.
|
163 |
Asymmetric and adaptive conference systems for enabling computer supported mobile activitiesAlves dos Santos, Luiz Manoel. Unknown Date (has links)
Techn. University, Diss., 2003--Darmstadt.
|
164 |
Kommerzielle Nutzung mobiler Anwendungen Ergebnisse der Delphi-Studie "Mobile Business" /Kuhn, Jürgen. Unknown Date (has links) (PDF)
Universiẗat, Diss., 2003--Regensburg.
|
165 |
A service based agent system supporting mobile computingPark, Anthony Sang-Bum. Unknown Date (has links) (PDF)
Techn. Hochsch., Diss., 2004--Aachen.
|
166 |
Mobile technologies for chronic condition managementOwen, Thomas January 2015 (has links)
The management of long term chronic conditions is a complex and challenging task. The process relies on individuals engaging in regular recording of factors that affect their health. Yet currently, the mobile tools that people carry with them are not being fully utilised to assist in this process. This Thesis reports on research that has been completed to understand the role that mobile technologies can have in supporting people with chronic conditions. An individual engaging in personal monitoring is concerned with the data they collect, not the process used to capture the data. The results of the research conducted contribute to an advancement of knowledge around how mobile technologies can assist in personal reflection on health information to provide greater understanding of chronic disease management This understanding of the role of reflection in chronic condition management can then be used as a platform to improve the mobile interventions in future implementations. These findings are arrived at by conducting an initial investigation into the usage of existing health monitoring devices and an evaluation of these devices is detailed. The results of this early work suggests there exists a gap between real practice and the role that mobile technologies can play in assisting with the process. A deeper understanding of the management practices of people with diabetes is then achieved through a set of interviews with individuals with diabetes. The findings then define a model of chronic disease management, named the 'Diabetes Management Cycle.' Following the definition of the cycle, a mobile application was implemented and deployed during a four week evaluation with individuals with type 1 diabetes. This system was designed to support existing management practices and implemented simple methods of information capture. A second application was then developed to enable increased monitoring and subsequent reflection amongst individuals with cardiovascular conditions. The application was deployed in a six week in-situ evaluation and it was discovered a personalised 'tagging' mechanism allowed for the discovery of patterns affecting health. Based on the findings of the studies, the Thesis concludes by presenting definitions of ready- to-hand in the short- and long-term contexts of mobile health management. These ready-to-hand guidelines provide a platform for future research projects to build upon.
|
167 |
Security and Privacy in Mobile Computing: Challenges and SolutionsJanuary 2017 (has links)
abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing.
This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
|
168 |
User optimized design of handheld medical devices -applications and casingBrunberg, Marike January 2010 (has links)
No description available.
|
169 |
Usability with context-aware mobile applications:case studies and design guidelinesHäkkilä, J. (Jonna) 22 December 2006 (has links)
Abstract
Context-awareness, a state where the device is aware of the situation in which it is used, is a technology which has gained an increasing amount of attention in recent years. A context-aware device can infer the use condition, and adapt its behavior according to the circumstances. Mobile handheld devices, which have been highly adopted by large user groups, especially in the form of mobile phones, constitute an interesting platform for context-awareness. They are used in different kinds of situations, where the preferences of users may vary, and where different features are prioritized. While the increasing complexity and growing number of features set challenges to intuitive and easy use of devices, context-awareness may offer solutions to more efficient use of mobile applications and services.
This thesis investigates the interaction issues with context-aware mobile devices. The research has been exploratory including several separate case studies, where interaction and usability matters have been charted. These studies consider topics such as location-awareness, user-defined settings of context-aware applications, and information sharing and privacy. In addition to these case studies, the author has sough to draw a bigger picture on interaction and usability issues with context-aware mobile devices, and incorporated the findings to a more general framework.
Through presenting the case studies it is concluded that context-awareness can improve the usability of mobile devices, but careful design in the application development phase must be emphasized. The usability risks identified through case studies relate to numerous themes, such as diminished user control, increased number of interruptions, information overflow, users' subjective understanding of context attributes and privacy threat. As context-aware technology employs greater risks, e.g. due to the uncertain nature of context recognition, the user-centric design practices and testing in the authentic environment of the context-aware applications should be stressed.
The author proposes design guidelines, which have been developed based on the findings from distinct case studies. The design guidelines aim to offer tangible help to application designers, who may not be acquaint with the special characteristics of context-awareness, and intend to prevent potential usability problems identified through the individual studies. Moreover, an evaluation for the design guidelines and their iteration to the presented form is demonstrated.
|
170 |
A service-oriented approach to topology formation and resource discovery in wireless ad-hoc networksGonzalez Valenzuela, Sergio 05 1900 (has links)
The past few years have witnessed a significant evolution in mobile computing and communications, in which new trends and applications have the traditional role of computer networks into that of distributed service providers. In this thesis we explore an alternative way to form wireless ad-hoc networks whose topologies can be customized as required by the users’ software applications. In particular, we investigate the applicability of mobile codes to networks created by devices equipped with Bluetooth technology. Computer simulations results suggest that our proposed approach can achieve this task effectively, while matching the level of efficiency seen in other salient proposals in this area.
This thesis also addresses the issue of service discovery in mobile ad-hoc networks. We propose the use of a directory whose network location varies in an attempt to reduce traffic overhead driven by users’ hosts looking for service information. We refer to this scheme as the Service Directory Placement Algorithm, or SDPA. We formulate the directory relocation problem as a Markov Decision Process that is solved by using Q-learning. Performance evaluations through computer simulations reveal bandwidth overhead reductions that range between 40% and 48% when compared with a basic broadcast flooding approach for networks comprising hosts moving at pedestrian speeds. We then extend our proposed approach and introduce a multi-directory service discovery system called the Service Directory Placement Protocol, or SDPP. Our findings reveal bandwidth overhead reductions typically ranging from 15% to 75% in networks comprising slow-moving hosts with restricted memory availability.
In the fourth and final part of this work, we present the design foundations and architecture of a middleware system that called WISEMAN – WIreless Sensors Employing Mobile Agents. We employ WISEMAN for dispatching and processing mobile programs in Wireless Sensor Networks (WSNs). Our proposed system enables the dynamic creation of semantic relationships between network nodes that cooperate to provide an aggregate service. We present discussions on the advantages of our proposed approach, and in particular, how WISEMAN facilitates the realization of service-oriented tasks in WSNs. / Applied Science, Faculty of / Electrical and Computer Engineering, Department of / Graduate
|
Page generated in 0.0565 seconds