Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
441 |
A Domain Specific Language Based Approach for Developing Complex Cloud Computing ApplicationsManjunatha, Ashwin Kumar 28 June 2011 (has links)
No description available.
|
442 |
[en] A MIDDLEWARE SERVICE FOR GENERIC AND REMOTE ACTUATION OF IOT DEVICES IN THE INTERNET OF MOBILE THINGS / [pt] UM SERVIÇO DE MIDDLEWARE PARA ATUAÇÃO GENÉRICA E REMOTA DE DISPOSITIVOS NA INTERNET DAS COISAS MÓVEISSHERITON RODRIGUES VALIM 29 June 2020 (has links)
[pt] A Internet das Coisas (do inglês, IoT) está se popularizando cada dia mais, se expandindo para aplicações em quase todos os setores de nossa socidade, impactando a economia e a vida cotidiana dos cidadãos. Com o crescimento das aplicações IoT, também ocorre uma expansão na demanda por novos dispositivos com capacidades de atuação, como lâmpadas inteligentes, fechaduras inteligentes, aparelhos de climatização (HVAC), máquinas industriais com capacidade de comunicação, robôs, drones, etc. Muitas plataformas de middleware estão sendo desenvolvidas para suportar o desenvolvimento de aplicativos de IoT distribuídos e facilitar a comunicação de sensores para a nuvem e recursos de edge processing. Mas surpreendentemente, muito pouco foi feito para fornecer mecanismos de suporte genéricos e em nível de middleware para detectar dispositivos controláveis e executar comandos de atuação, ou seja, transferi-los para o dispositivo. Este trabalho apresenta uma extensão ao middleware ContextNet que provê suporte à atuação remota e genérica sobre dispositivos inteligentes conectados pela Internet das Coisas. / [en] The Internet of Things (IoT) is becoming increasingly popular, expanding into applications in almost every sector of our society, impacting the economy and daily life of citizens. As IoT applications grow, so does
the demand for new devices with actuation capabilities, such as smart light bulbs, HVAC devices, smart locks, communication-capable industrial machines, robots, drones, and so on. Many software platforms are being developed to support the development of distributed IoT applications and to facilitate cloud sensor communication and edge processing capabilities. But surprisingly, very little has been done to provide middleware-level support and generic mechanisms for discovering devices and their interfaces,
and executing activation commands, i.e. transferring them to the device. This work presents an extension to the ContextNet Middleware to support generic and remote actuation on devices connected by the Internet of Things.
|
443 |
Smartphones and Tablets: Patterns of Usage among College Student PopulationsPhillips, Ann (Higher education researcher) 05 1900 (has links)
This study offers insight into students' use and desire to use mobile devices for educational purposes. I examined college students' mobile device usage on the basis of demographic factors including sex, age, ethnicity, class standing, mode of delivery, and socioeconomic status. This study also investigated factors that affect students' likelihood to use mobile devices for academic pursuits. I utilized data from the EDUCAUSE Center for Analysis and Research's (ECAR) 2015 Student Technology Survey. Of the 10,000 undergraduate respondents, 56% were female, 70% were between the ages of 18-24, 73% attended college full time and the breakdown of ethnicity included 59% Caucasian, 16% Hispanic, 13% African American, 8% Asian and 1% Native American. The results indicated that traditional aged students reportedly used smartphones more frequently, whereas non-traditional aged students reportedly used tablets more. Students most frequently reported using their devices in class to connect to the learning material. Institutional technology infrastructure and support were strong factors impacting students' use of smartphones. Results of this research can assist higher education faculty and administrators in devising comprehensive training and technology plans to support and encourage students' use of mobile devices for educational purposes.
|
444 |
Analyzing Secure and Attested Communication in Mobile DevicesMuhammad Ibrahim (19761798) 01 October 2024 (has links)
<p dir="ltr">To assess the security of mobile devices, I begin by identifying the key entities involved in their operation: the user, the mobile device, and the service or device being accessed. Users rely on mobile devices to interact with services and perform essential tasks. These devices act as gateways, enabling communication between the user and the back-end services. For example, a user may access their bank account via a banking app on their mobile device, which communicates with the bank’s back-end server. In such scenarios, the server must authenticate the user to ensure only authorized individuals can access sensitive information. However, beyond user authentication, it is crucial for connected services and devices to verify the integrity of the mobile device itself. A compromised mobile device can have severe consequences for both the user and the services involved.</p><p dir="ltr">My research focuses on examining the methods used by various entities to attest and verify the integrity of mobile devices. I conduct a comprehensive analysis of mobile device attestation from multiple perspectives. Specifically, I investigate how attestation is carried out by back-end servers of mobile apps, IoT devices controlled by mobile companion apps, and large language models (LLMs) accessed via mobile apps.</p><p dir="ltr">In the first case, back-end servers of mobile apps must attest to the integrity of the device to protect against tampered apps and devices, which could lead to financial loss, data breaches, or intellectual property theft. For instance, a music streaming service must implement strong security measures to verify the device’s integrity before transmitting sensitive content to prevent data leakage or unauthorized access.</p><p dir="ltr">In the second case, IoT devices must ensure they are communicating with legitimate companion apps running on attested mobile devices. Failure to enforce proper attestation for IoT companion apps can expose these devices to malicious attacks. An attacker could inject malicious code into an IoT device, potentially causing physical damage to the device or its surroundings, or even seizing control of the device, leading to critical safety risks, property damage, or harm to human lives.</p><p dir="ltr">Finally, in the third case, malicious apps can exploit prompt injection attacks against LLMs, leading to data leaks or unauthorized access to APIs and services offered by the LLM. These scenarios underscore the importance of secure and attested communication between mobile devices and the services they interact with.</p>
|
445 |
Gobuddy - Android mobile applicationNellaiappan, Kalaivani 01 January 2011 (has links)
The purpose of this application is to serve the end user of an Android Smart phone, with reliable, instantaneous and location based information on places of interest such as restaurants, gas stations, hotels, movie theaters, and the like by using the phones' built-in GPS. The basic information includes viewing the map and address of the place of interest and getting the directions to a particular place in addition to having some extra features. Contains computer source code.
|
446 |
Ein komponentenbasiertes Meta-Modell kontextabhängiger Adaptionsgraphen für mobile und ubiquitäre Anwendungen / A Component-based Meta-Model of Context-Aware Adaptation Graphs for Mobile and Ubiquitous ApplicationsSpringer, Thomas 11 October 2004 (has links) (PDF)
Gegenwärtige Infrastrukturen für verteilte Dienste und Anwendungen, insbesondere das Internet, entwickeln sich zunehmend zu mobilen verteilten Systemen. Durch die Integration drahtloser Netze, mobiler bzw. dedizierter Endgeräte und nicht zuletzt durch die Mobilität der Benutzer steigt die Heterogenität und Dynamik der Systeme hinsichtlich der eingesetzten Endgeräte, Kommunikationstechnologien sowie Benutzeranforderungen und Anwendungssituationen. Diese Eigenschaften sind mobilen Systemen inhärent und bleiben trotz der fortschreitenden Entwicklung der Technologien bestehen. Daraus resultieren spezifische Anforderungen an Anwendungen und Dienste, denen insbesondere die Softwareentwicklung Rechnung tragen muss. In der vorliegenden Arbeit wird die Adaptivität von Softwaresystemen als wesentlicher Lösungsansatz für mobile verteilte Infrastrukturen thematisiert. Dazu werden wesentliche Mechanismen zur Adaption sowie der Überschneidungsbereich von Adaptionsmechanismen, &quot;Context-Awareness&quot; und Softwareentwicklung untersucht. Ziel ist es, Erkenntnisse über Basismechanismen und Grundprinzipien der Adaption zu gewinnen und diese zur systematischen Entwicklung adaptiver Anwendungen auszunutzen. Aus der Analyse des State-of-the-Art werden als erstes wichtiges Ergebnis der Arbeit wesentliche Basismechanismen zur Adaption identifiziert, umfassend klassifiziert und hinsichtlich eines Einsatzes in mobilen verteilten Infrastrukturen bewertet. Auf dieser Grundlage wird ein Meta-Modell zur systematischen Entwicklung adaptiver Anwendungen erarbeitet. Dieses erlaubt die Beschreibung adaptiver Anwendungen durch die Komposition von Basismechanismen zur Struktur- und Parameteradaption. Die Steuerung der Adaption durch Kontext und Meta-Informationen kann explizit beschrieben werden. Das Meta-Modell kann Entwickler beim Entwurf adaptiver Anwendungen unterstützen, stellt aber auch einen Ausgangspunkt für deren Analyse und Validierung sowie zur Kodegenerierung dar. Durch die explizite Beschreibung der verwendeten Adaptionsmechanismen und deren Abhängigkeiten von Kontext können Anwendungsmodelle außerdem zur Dokumentation verwendet werden. Im Rahmen der Validierung konnte die Integrierbarkeit der Basismechanismen und die flexible Anwendbarkeit des Modells zur systematischen Entwicklung adaptiver Anwendungen nachgewiesen werden.
|
447 |
Ein komponentenbasiertes Meta-Modell kontextabhängiger Adaptionsgraphen für mobile und ubiquitäre AnwendungenSpringer, Thomas 28 June 2004 (has links)
Gegenwärtige Infrastrukturen für verteilte Dienste und Anwendungen, insbesondere das Internet, entwickeln sich zunehmend zu mobilen verteilten Systemen. Durch die Integration drahtloser Netze, mobiler bzw. dedizierter Endgeräte und nicht zuletzt durch die Mobilität der Benutzer steigt die Heterogenität und Dynamik der Systeme hinsichtlich der eingesetzten Endgeräte, Kommunikationstechnologien sowie Benutzeranforderungen und Anwendungssituationen. Diese Eigenschaften sind mobilen Systemen inhärent und bleiben trotz der fortschreitenden Entwicklung der Technologien bestehen. Daraus resultieren spezifische Anforderungen an Anwendungen und Dienste, denen insbesondere die Softwareentwicklung Rechnung tragen muss. In der vorliegenden Arbeit wird die Adaptivität von Softwaresystemen als wesentlicher Lösungsansatz für mobile verteilte Infrastrukturen thematisiert. Dazu werden wesentliche Mechanismen zur Adaption sowie der Überschneidungsbereich von Adaptionsmechanismen, &quot;Context-Awareness&quot; und Softwareentwicklung untersucht. Ziel ist es, Erkenntnisse über Basismechanismen und Grundprinzipien der Adaption zu gewinnen und diese zur systematischen Entwicklung adaptiver Anwendungen auszunutzen. Aus der Analyse des State-of-the-Art werden als erstes wichtiges Ergebnis der Arbeit wesentliche Basismechanismen zur Adaption identifiziert, umfassend klassifiziert und hinsichtlich eines Einsatzes in mobilen verteilten Infrastrukturen bewertet. Auf dieser Grundlage wird ein Meta-Modell zur systematischen Entwicklung adaptiver Anwendungen erarbeitet. Dieses erlaubt die Beschreibung adaptiver Anwendungen durch die Komposition von Basismechanismen zur Struktur- und Parameteradaption. Die Steuerung der Adaption durch Kontext und Meta-Informationen kann explizit beschrieben werden. Das Meta-Modell kann Entwickler beim Entwurf adaptiver Anwendungen unterstützen, stellt aber auch einen Ausgangspunkt für deren Analyse und Validierung sowie zur Kodegenerierung dar. Durch die explizite Beschreibung der verwendeten Adaptionsmechanismen und deren Abhängigkeiten von Kontext können Anwendungsmodelle außerdem zur Dokumentation verwendet werden. Im Rahmen der Validierung konnte die Integrierbarkeit der Basismechanismen und die flexible Anwendbarkeit des Modells zur systematischen Entwicklung adaptiver Anwendungen nachgewiesen werden.
|
448 |
Selection of mobile agent systems based on mobility, communication and security aspectsLall, Manoj 30 June 2005 (has links)
The availability of numerous mobile agent systems with its own strengths and weaknesses poses a problem when deciding on a particular mobile agent system. In this dissertation, factors based on mobility, communication and security of the mobile agent systems are presented and used as a means to address this problem. To facilitate in the process of selection, a grouping scheme of the agent system was proposed. Based on this grouping scheme, mobile agent systems with common properties are grouped together and analyzed against the above-mentioned factors. In addition, an application was developed using the Aglet Software Development Toolkit to demonstrate certain features of agent mobility, communication and security. / Theoretical Computing / M. Sc. (Computer Science)
|
449 |
Motivations of Students in the Open-Ended Use of Mobile Computing in Lecture-Based ClassroomsKimball, Jeffrey 01 January 2015 (has links)
While research supports the integration of mobile computing into instruction, there is disagreement concerning the unstructured use of mobile devices in lecture-based college classrooms. Research supports the argument that unstructured use creates distraction and decreased academic performance. Research also suggests that unstructured use actually supports lecture instruction through personalized learning situations. In either case, the motivations of students to use mobile device is often unclear. This study sought to investigate the motivations for students’ acceptance of mobile devices. The Unified Theory of Acceptance and Use of Technology (UTAUT) was utilized to identify the factors leading to college students’ adoption of mobile devices. A survey based on UTAUT was distributed to 254 college students in six distinct lecture-based general education courses. The results revealed that Performance Expectancy, Effort Expectancy, and Social Influence were positively correlated with Behavioral Intention for class-related behavior, with Performance Expectancy being the most significant. None of the constructs were significant for behavior unrelated to lecture. Analysis of the students’ intention based on the UTAUT moderators of age, gender, and experience did not produce any significant difference, nor did an analysis of the classes by subject. The study concludes that the ability of a mobile device to complete specific tasks was the strongest motivating factor leading to intention.
|
450 |
Techniques d'estimation de la bande passante disponible de réseaux sans filAmamra, Abdelaziz 17 November 2008 (has links) (PDF)
L'IEEE 802.11 (Wi-Fi) est le standard de WLAN (Wireless Local Area Network). En conséquence, le marché des produits dotés de la technologie réseau Wi-Fi est en plein essor et a provoqué une véritable révolution dans le monde de l'informatique. Cependant, la communication utilisant le Wi-Fi ne présente pas, pour autant, que des avantages. La grande différence entre le débit théorique et le débit effectif dépend de nombreux paramètres. Il est, par exemple, difficile de faire du streaming vidéo haute définition en utilisant un réseau IEEE 802.11g, alors que le débit théorique le permet parfaitement. La technologie WLAN souffre d'autres contraintes, comme la nature vulnérable du médium sans fil (interférences électromagnétiques, multi-trajet...), l'accès indéterministe au médium, la limitation de la bande passante...Les applications utilisant les réseaux Ad Hoc deviennent de plus en plus complexes et offrent de nouveaux services qui exigent des performances réseau de plus en plus élevées. De ce fait, la Qualié de Service (QdS) dans les réseaux Ad Hoc est un sujet de recherche ouvert. La bande passante est un indicateur très important pour la garantie de la QdS. Dans notre travail de thèse, nous avons étudié l'un des aspects de la QdS qui est la Bande Passante Disponible (BPD) dans les réseaux Ad Hoc basés sur la norme IEEE 802.11. Particulièrement, nous nous sommes intéressés aux différentes techniques d'estimation de la BPD et avons évalué les performances de ces techniques du point de vue temps de réponse et précision des estimations. Ces techniques peuvent être utilisées dans d'autres types de réseaux sans fil ou filaire. Nos contributions sont, essentiellement , le développement de deux nouvelles techniques d'estimation de la bande passante SLOT (SLOps-Topp) et TOPP-NET (TOPP-Non invasive Estimation Technique). Ces deux techniques sont le résultat d'améliorations successives des techniques d'estimation qui existent dans la littérature (TOPP : Trains of Packet Pairs, SLoPS : Self-Loading Periodic Streams et NIMBE : Non Invasive Manet Bandwith Estimation) en mettant l'accent sur la précision et le délai de sondage des techniques d'estimation. Notre troisième contribution est une nouvelle méthode de filtrage adaptatif des estimations nommée ZONE-FILTER ( Filtrage par Zone). Cette méthode combine les filtres EWMA et la mèthode statistique SPC (Statistical Process Control).
|
Page generated in 0.0605 seconds