• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 321
  • 88
  • 30
  • 25
  • 15
  • 6
  • 6
  • 5
  • 5
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 597
  • 597
  • 201
  • 168
  • 111
  • 101
  • 89
  • 86
  • 74
  • 73
  • 71
  • 69
  • 66
  • 54
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

iPACE-V1: A PORTAABLE ADAPTIVE COMPUTING ENGINE

KHAN, JAWAD BASIT 11 October 2002 (has links)
No description available.
382

Supporting Heterogeneous Device Development and Communication

Chadha, Sanchit 10 January 2016 (has links)
To increase market penetration, mobile software makers support their popular applications on all major software platforms, which currently include Android, iOS, and Windows Phone. Although these platforms often offer a drastically different look and feel, cross-platform applications deliver the same core functionality to the end user. Maintaining and evolving such applications currently requires replicating all the changes across all supported variants, a laborious and intellectually taxing enterprise. The state-of-the-practice automated source translation tools fall short, as they are incapable of handling the structural and idiomatic differences of the software frameworks driving major mobile platforms. In addition, popular mobile applications increasingly make use of distributed resources. Certain domains, including social networking, productivity enhancement, and gaming, require different application instances to continuously exchange information with each other. The current state of the art in supporting communication across heterogeneous mobile devices requires the programmer to write platform-specific, low-level API calls that are hard not only to develop but also to evolve and maintain. This thesis reports on the findings of two complementary research activities, conducted with the goal of facilitating the development and communication across heterogeneous mobile devices: (1) a programming model and runtime support for heterogeneous device-to-device communication across mobile applications; (2) a source code recommendation system that synthesizes code snippets from web-based programming resources, based on the functionality written for Android or iOS and vice versa. The conceptual and practical advancements of this research have potential to benefit fellow researchers as well as mobile software developers and users. / Master of Science
383

<b>USER-CENTERED DATA ACCESS CONTROL TECHNIQUES FOR SECURE AND PRIVACY-AWARE MOBILE SYSTEMS</b>

Reham Mohamed Sa Aburas (18857674) 25 June 2024 (has links)
<p dir="ltr">The pervasive integration of mobile devices in today’s modern world, e.g., smartphones, IoT, and mixed-reality devices, has transformed various domains, enhancing user experiences, yet raising concerns about data security and privacy. Despite the implementation of various measures, such as permissions, to protect user privacy-sensitive data, vulnerabilities persist. These vulnerabilities pose significant threats to user privacy, including the risk of side-channel attacks targeting low-permission sensors. Additionally, the introduction of new permissions, such as the App Tracking Transparency framework in iOS, seeks to enhance user transparency and control over data sharing practices. However, these framework designs are accompanied by ambiguous developer guidelines, rendering them susceptible to deceptive patterns. These patterns can influence user perceptions and decisions, undermining the intended purpose of these permissions. Moreover, the emergence of new mobile technologies, e.g., mixed-reality devices, presents novel challenges in ensuring secure data sharing among multiple users in collaborative environments, while preserving usability.</p><p dir="ltr">In this dissertation, I focus on developing user-centered methods for enhancing the security and privacy of mobile system, navigating through the complexities of unsolicited data access strategies and exploring innovative approaches to secure device authentication and data sharing methodologies.</p><p dir="ltr">To achieve this, first, I introduce my work on the iStelan system, a three-stage side-channel attack. This method exploits the low-permission magnetometer sensor in smartphones to infer user sensitive touch data and application usage patterns. Through an extensive user study, I demonstrate the resilience of iStelan across different scenarios, surpassing the constraints and limitations of prior research efforts.</p><p dir="ltr">Second, I present my analysis and study on the App Tracking Transparency permission in iOS. Specifically, my work focuses on analyzing and detecting the dark patterns employed by app developers in the permission alerts to obtain user consent. I demonstrate my findings on the dark patterns observed in permission alerts on a large-scale of apps collected from Apple’s store, using both static and dynamic analysis methods. Additionally, I discuss the application of a between-subject user study to evaluate users’ perceptions and understanding when exposed to different alert patterns.</p><p dir="ltr">Lastly, I introduce StareToPair, a group pairing system that leverages multi-modal sensing technologies in mixed-reality devices to enable secure data sharing in collaborative settings. StareToPair employs a sophisticated threat model capable of addressing various real-world scenarios, all while ensuring high levels of scalability and usability.</p><p dir="ltr">Through rigorous investigation, theoretical analysis and user studies, my research endeavors enhance the field of security and privacy for mobile systems. The insights gained from these studies offer valuable guidance for future developments in mobile systems, ultimately contributing to the design of user-centered secure and privacy-aware mobile ecosystems.</p>
384

Personal Context Recognition from Sensors

Zhang, Wanyi 28 April 2022 (has links)
Machine learning has become one of the most emerging topics in a lot of research areas, such as pervasive and ubiquitous computing. Such computing applications always rely on the supervised learning approach to recognize user’s context before a suitable level of services are provided. However, since more and more users are involved in modern applications, the monitored data cannot be guaranteed to be always true due to wrong information. This may cause the mislabeling in machine learning and so affects the prediction. The goal of this Ph.D. thesis is to improve the data quality and solve the mislabeling problem caused by considering non-expert users. To achieve this goal, we propose a novel algorithm, called Skeptical Learning, aiming at interacting with the users and filtering out anomalies when an invalid input is monitored. This algorithm guarantees the machine to use the pre-known knowledge to check the availability of its own prediction as well as the label provided by the users. This thesis clarifies how we design this algorithm and makes three main contributions: (i.) we study the predictability of human behavior through the notion of personal context; (ii.)we design and develop Skeptical Learning as a paradigm to deal with the unreliability of users when providing non-confidential labels that describe their personal context; (iii.) we introduce an MCS platform where we implement Skeptical Learning on top of it to solve unreliable labels issue. Our evaluations have shown that Skeptical Learning could be widely used in pervasive and ubiquitous computing applications to better understand the quality of the data relying on the machine knowledge, and thus prevent mislabeling problem due to non-expert information.
385

An architecture for network centric operations in unconventional crisis: lessons learnt from Singapore's SARS experience

Tay, Chee Bin, Mui, Whye Kee 12 1900 (has links)
Approved for public release, distribution is unlimited / Singapore and many parts of Asia were hit with Severe Acute Respiratory Syndrome (SARS) in March 2003. The spread of SARS lead to a rapidly deteriorating and chaotic situation. Because SARS was a new infection, there was no prior knowledge that could be referenced to tackle such a complex, unknown and rapidly changing problem. Fortunately, through sound measures coupled with good leadership, quick action and inter-agency cooperation, the situation was quickly brought under control. This thesis uses the SARS incident as a case study to identify a set of network centric warfare methodologies and technologies that can be leveraged to facilitate the understanding and management of complex and rapidly changing situations. The same set of methodologies and technologies can also be selectively reused and extended to handle other situations in asymmetric and unconventional warfare. / Office of Force Transformation, DoD US Future Systems Directorate, MINDEF Singapore. / Lieutenant, Republic of Singapore Army / Civilian, Defence Science and Technology Agency, Singapore
386

Free roaming: A system for ubiquitous computing

Liu, Huanjin 01 January 2006 (has links)
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
387

Evaluating the effectiveness of mobile telecommunication services in Durban and Lagos.

Abatan, Omotayo Kayode. 11 September 2013 (has links)
Telecommunication includes voice, video and internet communication services. Thus, mobile telecommunication services involve voice communication, video streaming, graphics and television services at high speed. Technology development in mobile telecommunication has enabled users to exchange data using cell phones, laptops and other telecommunication devices. More so, understanding the concept of user experience is very important in the context of provision of mobile telecommunication services. This research will evaluate the effectiveness of mobile telecommunication services in Durban, South Africa and Lagos, Nigeria amongst first-year IT students of the University of KwaZulu-Natal and Lagos State University. The research is focused on the actual experience and perceptions of first-year IT students. The study will examine the factors that influence first-year IT students' judgment of the quality of mobile telecommunication services. It will also access the impact of quality of mobile telecommunication services on the loyalty of first-year IT students towards their network operator. However, Technology Acceptance Model (TAM) is the theory adopted for this research, which explains how attitude of users determine the intention to use technology and the intention eventually influences the overall use of such technology. The objectives of this research highlight opportunities associated with understanding first-year IT students' experiences and perceptions of mobile telecommunication services in UKZN, Durban and LASU, Lagos. Other opportunities include giving an insight into the operations of network providers, determine the quality of mobile telecommunication services and understanding the impact of mobile telecommunication services on students in UKZN and LASU. Another significance of this study allows network providers to understand students' behaviour and to respond to their preferences. / Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.
388

Effectiveness of branded mobile apps on brand loyalty among Generation Y consumers

Chalomba, Nakuze January 2016 (has links)
A dissertation submitted in full fulfillment of the requirements for the degree of the Master of Commerce, School of Economic and Business Sciences, University of the Witwatersrand, December 2016 / The increasing level of consumer engagement with smartphones and tablets or ipods, and the proliferation of mobile applications in recent years have seen a rapid growth in branded apps. Marketers are creating branded mobile apps as a brand communication channel to attract new customers and potentially increase brand loyalty among current customers. Previous research has measured initial adoption or intention to adopt branded apps rather than continuance adoption. In South Africa, few studies have explored adoption of branded apps among generation Y consumers. To fill this gap, this research aims to determine the effectiveness of branded mobile apps in driving brand loyalty among generation Y consumers. To achieve this goal, the research uses Expectation Confirmation Theory (ECT) to explore the factors influencing satisfaction, continuance adoption of branded apps and brand loyalty. Using a quantitative research approach, a total of 406 valid self-administered questionnaires were collected by survey method, and structural equation modelling was employed in the data analysis. The results indicate that confirmation of expectations–functional value, social value and satisfaction significantly influence brand loyalty. When consumers confirmed expectations of branded apps, it directly led to positive perceptions of value and satisfaction. Consumer satisfaction was a significant driver of behavioural loyalty. Results also suggested that consumer confirmation of expectations and perceptions of value impacted on continuance intention indirectly through satisfaction. Perceived functional value was found to be an important direct booster of consumer’s decisions and behaviour to continue using branded apps, while social value was found to be an inhibitor of continuance intention. The relationship between continuance intention and brand loyalty was insignificant. Continuance intention was simply an intermediate response following satisfaction with prior usage. This study therefore confirmed and extended the (ECT), that satisfaction with a product or service was a prerequisite for establishing continuance intention and brand loyalty among consumers. / XL2018
389

Enabling access for mobile devices to the web services resource framework

Unknown Date (has links)
The increasing availability of Web services and grid computing has made easier the access and reuse of different types of services. Web services provide network accessible interfaces to application functionality in a platform-independent manner. Developments in grid computing have led to the efficient distribution of computing resources and power through the use of stateful web services. At the same time, mobile devices as a platform of computing have become a ubiquitous, inexpensive, and powerful computing resource. Concepts such as cloud computing has pushed the trend towards using grid concepts in the internet domain and are ideally suited for internet-supported mobile devices. Currently, there are a few complete implementations that leverage mobile devices as a member of a grid or virtual organization. This thesis presents a framework that enables the use of mobile devices to access stateful Web services on a Globus-based grid. To illustrate the presented framework, a user-friendly mobile application has been created that utilizes the framework libraries do to demonstrate the various functionalities that are accessible from any mobile device that supports Java ME. / by Jan Christian Mangs. / Thesis (M.S.C.S.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2008. Mode of access: World Wide Web.
390

Reconhecimento de fala para navegação em aplicativos móveis para português brasileiro / Brazilian Portuguese Speech Recognition for Navigation on Mobile Device Applications

Triana Gomez, Edwin Miguel 17 June 2011 (has links)
O objetivo do presente trabalho de pesquisa é reduzir o nível de atenção requerido para o uso do sistema Borboleta por meio de reconhecimento de fala na navegação através das funcionalidades do sistema, permitindo ao profissional dar maior atenção ao paciente. A metodologia de desenvolvimento do projeto inclui uma revisão bibliográfica para definir o estado da arte da área, uma pesquisa sobre o software disponível para reconhecimento de fala, uma coleta de dados dos comandos do sistema em português brasileiro para treinar e testar o sistema, uma etapa de projeção e desenvolvimento para definir a arquitetura de integração com o Borboleta, e uma fase de testes para medir a precisão do sistema e seus níveis de usabilidade e aceitação por parte do usuário. / The current document presents research that addresses the goal of reducing the user attention level required by Borboleta operation by providing speech recognition capabilities to augment navigation through the software functions, allowing the professional to pay more attention to the patient. The project methodology is composed of a bibliography revision to establish the state-of-the-art of the field, a review of available speech recognition software, data collection of Brazilian utterances to train and test the system, a design and development stage that defined the system architecture and integration with Borboleta and a testing process to measure the system accuracy, its usability and acceptance level.

Page generated in 0.8802 seconds