Browse Results

Showing 19,251 through 19,275 of 55,784 results

Mobile Solutions and Their Usefulness in Everyday Life (EAI/Springer Innovations in Communication and Computing)

by Sara Paiva

This book provides an insight into recent technological trends and innovations in solutions and platforms to improve mobility of visually impaired people. The authors’ goal is to help to contribute to the social and societal inclusion of the visually impaired. The book’s topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications tested in a real environment. Applications include city halls, municipalities, and companies that must keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discuss are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world.

Mobile & Social Game Design: Monetization Methods and Mechanics, Second Edition

by Tim Fields Brandon Cotton

Completely updated, this second edition explains how to use the interconnectedness of social networks to make stickier, more compelling games on all types of devices. Through the book's many design and marketing techniques, strategies, and examples, readers will acquire a better understanding of the design and monetization mechanics of mobile and social games as well as working knowledge of industry practices and terminology. Each chapter includes an interview with industry leaders who share their insight on designing and producing games, analyzing metrics, and much more.

Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems

by Kaikai Liu Xiaolin Li

Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.

Mobile Services for Toy Computing

by Patrick C. K. Hung

The goal of this book is to crystallize the emerging mobile computing technologies and trends by focusing on the most promising solutions in services computing. The book will provide clear proof that mobile technologies are playing an increasingly important and critical role in supporting toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is intended for researchers and students working in computer science and engineering, as well as toy industry technology providers, having particular interests in mobile services.

Mobile Service Computing (Advanced Topics in Science and Technology in China #58)

by Shuiguang Deng Hongyue Wu Jianwei Yin

This book introduces readers to the background and principles of mobile service computing. It discusses various aspects of service computing in mobile environments, including key methods and techniques for service selection, recommendation, composition, offloading, execution, deployment, and provision.

Mobile Security

by Steven Furnell

Mobile devices represent an increasingly important proportion of the technology market, with laptops, PDAs and smartphones all offering substantial opportunities to improve personal communications and business flexibility. In addition, removable storage, such as memory sticks, now enables enormous quantities of data to be carried around, making it available to use on demand in any location. However, such undoubted advantages can also bring considerable risks, with devices being physically vulnerable to loss, theft and damage, as well as potentially exposed to various forms of electronic attack. As such, there is a significant and growing need for protection, in order to enable us to get the best out of the kit in an otherwise dangerous digital world. The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.

Mobile Security: How to Secure, Privatize, and Recover Your Devices

by Darla Nykamp Joseph Anderson Mari Heiser Jaya Nampalli Tim Speed

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

Mobile Security: Schwachstellen verstehen und Angriffsszenarien nachvollziehen

by Dirk Westhoff

Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.

Mobile, Secure, and Programmable Networking

by Selma Boumerdassi Samia Bouzefrane Éric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015. The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking

by Selma Boumerdassi Éric Renault Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015. The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14482)

by Samia Bouzefrane Soumya Banerjee Fabrice Mourlin Selma Boumerdassi Éric Renault

This book constitutes the refereed post-proceedings of the 9th International Conference on Mobile, Secure, and Programmable Networking, MSPN 2023, held in Paris, France, during October 26–27, 2023.The 15 full papers included in this book were carefully reviewed and selected from 31 submissions. They were organized in topical sections as follows vertical tools on machine leaning and artificial intelligence, network programming and Cloud computing, Industrial Internet of things, Digital Twins and Security.

Mobile, Secure, and Programmable Networking

by Samia Bouzefrane Soumya Banerjee Françoise Sailhan Selma Boumerdassi Eric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015. The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 6th International Conference, MSPN 2020, Paris, France, October 28–29, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12605)

by Samia Bouzefrane Maryline Laurent Selma Boumerdassi Eric Renault

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020.The 16 full papers presented in this volume were carefully reviewed and selected from 31 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11005)

by Éric Renault Selma Boumerdassi Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018. The 27 papers presented in this volume were carefully reviewed and selected from 52 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile, Secure, and Programmable Networking: 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23–24, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11557)

by Éric Renault Selma Boumerdassi Cherkaoui Leghris Samia Bouzefrane

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.

Mobile Radio Communications and 5G Networks: Proceedings of Fourth MRCN 2023 (Lecture Notes in Networks and Systems #915)

by Dinesh Kumar Shruti Jain Nikhil Kumar Marriwala Sunil Dhingra

This book features selected high-quality papers from the Forth International Conference on Mobile Radio Communications and 5G Networks (MRCN 2023), held at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, India, during August 25–26, 2023. The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G, and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.

Mobile Radio Communications and 5G Networks: Proceedings of Third MRCN 2022 (Lecture Notes in Networks and Systems #588)

by Dinesh Kumar Shruti Jain Nikhil Marriwala C. C. Tripathi

This book features selected high-quality papers from the Third International Conference on Mobile Radio Communications and 5G Networks (MRCN 2022), held at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, India, during June 10–12, 2022. The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G, and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.

Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020 (Lecture Notes in Networks and Systems #140)

by Nikhil Marriwala C. C. Tripathi Dinesh Kumar Shruti Jain

The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.

Mobile Prototyping with Axure 7

by Will Hacker

This book is a step-by-step tutorial which includes hands-on examples and downloadable Axure files to get you started with mobile prototyping immediately. You will learn how to develop an application from scratch, and will be guided through each and every step.If you are a mobile-centric developer/designer, or someone who would like to take their Axure prototyping skills to the next level and start designing and testing mobile prototypes, this book is ideal for you. You should be familiar with prototyping and Axure specifically, before you read this book.

The Mobile Photographer

by Robert Fisher

It’s been said that, with smartphones, everyone is a photographer. There is a snide implication with that statement-that camera phones aren’t "real” cameras and that the people who use them aren’t "real” photographers. In this book, Robert Fisher proves that today’s Android devices offer cameras that are remarkably powerful and more than capable of producing images that rival those made with more "serious” equipment. In this book, Fisher guides readers through the menus of the Android operating system, helping them to understand how to choose and use out-of-the-box controls for better images. Next, he covers add-on accessories and applications designed to enhance the devices’ capabilities. While the photographic capabilities of the "base” camera are pretty terrific and will meet with rave reviews from many users, the camera really produces images that sing when suited up with DSLR functions, filters, and postproduction effects-all of which Fisher covers with prowess and technical skill.

The Mobile Photographer

by Robert Fisher

It's been said that, with smartphones, everyone is a photographer. There is a snide implication with that statement-that camera phones aren't "real" cameras and that the people who use them aren't "real" photographers. In this book, Robert Fisher proves that today's Android devices offer cameras that are remarkably powerful and more than capable of producing images that rival those made with more "serious" equipment.In this book, Fisher guides readers through the menus of the Android operating system, helping them to understand how to choose and use out-of-the-box controls for better images. Next, he covers add-on accessories and applications designed to enhance the devices' capabilities. While the photographic capabilities of the "base" camera are pretty terrific and will meet with rave reviews from many users, the camera really produces images that sing when suited up with DSLR functions, filters, and postproduction effects-all of which Fisher covers with prowess and technical skill.

Mobile Phone Security and Forensics

by I. I. Androulidakis

Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis.

Mobile Persuasion Design

by Aaron Marcus

Mobile Persuasion Design presents ten conceptual design projects (or 'Machines') for new mobile application's (smartphone or tablet with Web portals) that combine theories of persuasion and information design to change people's behaviour. Areas such as the environment, health, learning and happiness are explored, looking at ways of marrying people's wants and needs to make simple, usable and desirable mobile applications. A user-centred design approach has been used, adopting user experience (UX) methods, in-depth case studies and market analysis to see what a modern user needs from their mobile application. By applying concepts like persuasion theory and information architecture, try to find ways to satisfy these needs and positively change their user habits. In 2011, the Green, Health, and Money Machines won design awards in an international competition hosted by the International Institute for Information Design, Vienna.

Mobile Persuasion: 20 Perspectives on the Future of Behavior Change

by B. J. Fogg

The mobile phone will soon become the most powerful channel for persuasion. This book presents 20 perspectives on how mobile devices can be designed to motivate and influence people - and how this emerging trend will change the way you live, work, and play.

Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis

by Shivi Garg Niyati Baliyan

This is book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and deep learning models towards this end. Further, it presents a comprehensive analysis of software vulnerabilities based on different technical parameters such as causes, severity, techniques, and software systems’ type. Moreover, the book also presents the current state of the art in the domain of software threats and vulnerabilities. This would help analyze various threats that a system could face, and subsequently, it could guide the securityengineer to take proactive and cost-effective countermeasures. Security threats are escalating exponentially, thus posing a serious challenge to mobile platforms. Android and iOS are prominent due to their enhanced capabilities and popularity among users. Therefore, it is important to compare these two mobile platforms based on security aspects. Android proved to be more vulnerable compared to iOS. The malicious apps can cause severe repercussions such as privacy leaks, app crashes, financial losses (caused by malware triggered premium rate SMSs), arbitrary code installation, etc. Hence, Android security is a major concern amongst researchers as seen in the last few years. This book provides an exhaustive review of all the existing approaches in a structured format. The book also focuses on the detection of malicious applications that compromise users' security and privacy, the detection performance of the different program analysis approach, and the influence of different input generators during static and dynamic analysis on detection performance. This book presents a novel method using an ensemble classifier scheme for detecting malicious applications, which is less susceptible to the evolution of the Android ecosystem and malware compared to previous methods. The book also introduces an ensemble multi-class classifier scheme to classify malware into known families. Furthermore, we propose a novel framework of mapping malware to vulnerabilities exploited using Android malware’s behavior reports leveraging pre-trained language models and deep learning techniques. The mapped vulnerabilities can then be assessed on confidentiality, integrity, and availability on different Android components and sub-systems, and different layers.

Refine Search

Showing 19,251 through 19,275 of 55,784 results