Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research …

H Elazhary - Journal of network and computer applications, 2019 - Elsevier
… context (such as reducing mobile screen brightness in the sun) (Alnanih et al., 2013).
Context-aware recommender systems can process context information to predict the preferences of …

How do people type on mobile devices? Observations from a study with 37,000 volunteers

K Palin, AM Feit, S Kim, PO Kristensson… - … with Mobile Devices …, 2019 - dl.acm.org
strategies to find a suitable compromise between speed and accuracy and reliance on intelligent
text entry techniques such as the word prediction list … The data were stored on the same …

IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication

S Bansal, D Kumar - International Journal of Wireless Information …, 2020 - Springer
… and analytical operations on the stored data and using the facts and figures it process the …
, it creates a list of new concerns leading to privacy and information security breach. Security is …

Deep learning in mobile and wireless networking: A survey

C Zhang, P Patras, H Haddadi - IEEE Communications surveys …, 2019 - ieeexplore.ieee.org
… 1We list the abbreviations used throughout this paper in … ]) sometimes requires to store all
the data in memory, which is … the former data is usually collected by the edge mobile devices, …

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz - bmj, 2019 - bmj.com
… In the first strategy we used a crawling program that interacted directly with the app store’s
application … A few apps shared sensitive data such as a user’s drug list and location that could …

Intelligent mobile malware detection using permission requests and API calls

M Alazab, M Alazab, A Shalaginov, A Mesleh… - … Computer Systems, 2020 - Elsevier
… on the Google Play Store, and (iii) the device’s compatibility with … Android is an open-source
operating system for mobile devices … ’s resources; each application has a list of permissions …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
… A technology to store and maintain user's information that is mostly used … in the CC
environment, and they also provided a list of … system and a mobile device, existing attacks in …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
list of mitigations for each component and propose strategies … Further, sensitive information,
such as API keys, should be … on the mobile device and stored in an encrypted key store. …

[HTML][HTML] RADAR-base: open source mobile health platform for collecting, monitoring, and analyzing data using sensors, wearables, and mobile devices

Y Ranjan, Z Rashid, C Stewart, P Conde… - JMIR mHealth and …, 2019 - mhealth.jmir.org
information is saved in a separate eCRF system, which is isolated from the RADAR-base
platform [16]. Only the nonidentifiable data are saved in … other as pseudonymized data only via …

[图书][B] The architecture of computer hardware, systems software, and networking: An information technology approach

I Englander, W Wong - 2021 - books.google.com
… Modern operating system techniques were developed in the 1960s. The graphical … stored
on various peripheral devices. We study the methods used to implement file directory systems