咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 29 篇 会议
  • 3 册 图书
  • 2 篇 学位论文

馆藏范围

  • 64 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 40 篇 计算机科学与技术...
    • 27 篇 电气工程
    • 14 篇 软件工程
    • 13 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 生物医学工程(可授...
  • 5 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 体育学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 医学技术(可授医学...

主题

  • 64 篇 android operatin...
  • 8 篇 smart phones
  • 7 篇 smartphone
  • 6 篇 androids
  • 5 篇 humanoid robots
  • 5 篇 android
  • 4 篇 malware detectio...
  • 3 篇 data security
  • 3 篇 smartphones
  • 3 篇 software enginee...
  • 3 篇 software aging
  • 3 篇 android (operati...
  • 3 篇 software develop...
  • 3 篇 machine learning
  • 3 篇 security
  • 3 篇 mobile communica...
  • 3 篇 mobile computing
  • 3 篇 privacy
  • 3 篇 mobile applicati...
  • 3 篇 authorisation

机构

  • 1 篇 department of co...
  • 1 篇 gjovik univ coll...
  • 1 篇 sir syed univ de...
  • 1 篇 griffith univ si...
  • 1 篇 drew university
  • 1 篇 gunma coll natl ...
  • 1 篇 dnyanganga coll ...
  • 1 篇 lviv polytech na...
  • 1 篇 pg and research ...
  • 1 篇 zhongnan univ ec...
  • 1 篇 lodz univ techno...
  • 1 篇 natl univ sci & ...
  • 1 篇 maulana azad nat...
  • 1 篇 school of softwa...
  • 1 篇 leiden univ sch ...
  • 1 篇 kohat univ sci &...
  • 1 篇 inesc tec polyte...
  • 1 篇 velammal engn co...
  • 1 篇 university of ha...
  • 1 篇 natl chiao tung ...

作者

  • 2 篇 rattanathip ratt...
  • 2 篇 abbas haider
  • 2 篇 cotroneo domenic...
  • 2 篇 natella roberto
  • 2 篇 wahid abdul
  • 2 篇 ganesan r.
  • 2 篇 de simone luigi
  • 2 篇 pietrantuono rob...
  • 2 篇 russo stefano
  • 1 篇 pasha maruf
  • 1 篇 khan farrukh asl...
  • 1 篇 oswiecinska kata...
  • 1 篇 jing han
  • 1 篇 zheng yudi
  • 1 篇 cha nam ju
  • 1 篇 amalfitano domen...
  • 1 篇 shirzad mehrnous...
  • 1 篇 yu qiang
  • 1 篇 busch christoph
  • 1 篇 kurt gunes karab...

语言

  • 61 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Operating System"
64 条 记 录,以下是21-30 订阅
排序:
Malware Detection: Harmony of Fuzzy and Firefly (FF-MD)
收藏 引用
JOURNAL OF MULTIPLE-VALUED LOGIC AND SOFT COMPUTING 2020年 第5-6期35卷 585-607页
作者: Kilic, Vahide Nida Esiz, Esra Sarac Adana Alparslan Turkes Sci & Technol Univ Comp Engn Adana Turkey
android operating system an (OS) is open-source, easy to use, and user-friendly mobile OS. In this way, it is very preferred. As a result, it becomes the target of malicious people. Applications installed on the Andro... 详细信息
来源: 评论
Mobile application design of geolocation to collect solid waste: A case study in Lima, Peru  26
Mobile application design of geolocation to collect solid wa...
收藏 引用
IEEE 26th International Conference on Electronics, Electrical Engineering and Computing (INTERCON)
作者: Delgado, Alexi Sosa, Jhonatan Pontificia Univ Catolica Peru PUCP Dept Engn Min Engn Sect Lima Peru Univ Ciencias & Humanidades Syst Engn Program Lima Peru
In Los Olivos district, Lima, Peru, a large amount of solid waste is produced, which is one of the main causes that contribute to environmental pollution. To help decrease pollution, the design of a mobile application... 详细信息
来源: 评论
A Configurable Software Aging Detection and Rejuvenation Agent for android  30
A Configurable Software Aging Detection and Rejuvenation Age...
收藏 引用
30th IEEE International Symposium on Software Reliability Engineering (ISSRE)
作者: Cotroneo, Domenico De Simone, Luigi Natella, Roberto Pietrantuono, Roberto Russo, Stefano Univ Napoli Federico II DIETI Via Claudio 21 I-80125 Naples Italy
This paper presents the design of ADaRTA, an aging detection and rejuvenation tool for android. The tool is a software agent which i) performs selective monitoring of system processes and of trends in system performan... 详细信息
来源: 评论
android Fingerprint Sensor: Pitfalls And Challenges  16
Android Fingerprint Sensor: Pitfalls And Challenges
收藏 引用
16th IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
作者: Apostol, Luminita Dobre, Ciprian Univ Politeh Bucharest Dept Comp Sci & Engn Bucharest Romania
In the last four years, the number of smartphones capable to read user fingerprints in order to perform authorization and authentication has tripled. Also, after the introduction of biometric payment services, fingerp... 详细信息
来源: 评论
Device-Specific Linux Kernel Optimization for android Smartphones  6
Device-Specific Linux Kernel Optimization for Android Smartp...
收藏 引用
6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud)
作者: Yuan, Pengfei Guo, Yao Chen, Xiangqun Mei, Hong Peking Univ Key Lab High Confidence Software Technol Minist Educ Sch Elect Engn & Comp Sci Beijing 100871 Peoples R China
To make smartphones more powerful, researchers have proposed many techniques to improve the performance of mobile systems and applications. As the most popular mobile operating system, android is based on the Linux ke... 详细信息
来源: 评论
Mobile Application Aware Smartphone CPU Clock Frequency Optimization  6
Mobile Application Aware Smartphone CPU Clock Frequency Opti...
收藏 引用
6th International Symposium on Computing and Networking (CANDAR) - Across Practical Development and Theoretical Research
作者: Sato, Yusuke Oguchi, Masato Yamaguchi, Saneyasu Kogakuin Univ Grad Sch Elect Engn & Elect Tokyo Japan Ochanomizu Univ Dept Informat Sci Tokyo Japan Kogakuin Univ Elect Engn & Elect Tokyo Japan
The android operating system utilizes the Linux kernel. This kernel has a function that dynamically adjusts the CPU clock frequency to control the obtained performance and the power consumed. However, because this ker... 详细信息
来源: 评论
App Store 2.0: From Crowdsourced Information to Actionable Feedback in Mobile Ecosystems (vol 34, pg 81, 2017)
收藏 引用
IEEE SOFTWARE 2017年 第3期34卷 7-7页
作者: Gomez, M. Inria Lille Polytechnique Montréal University of Hamburg University of Lille
Given the increasing competition in mobile-app ecosystems, improving the user experience has become a major goal for app vendors. App Store 2.0 will exploit crowdsourced information about apps, devices, and users to i... 详细信息
来源: 评论
Is Bigger Better When It Comes to android Graphical Pattern Unlock?
收藏 引用
IEEE INTERNET COMPUTING 2017年 第6期21卷 46-51页
作者: Aviv, Adam J. Kuber, Ravi Budzitowski, Devon US Naval Acad Comp Sci Annapolis MD 21402 USA Univ Maryland Baltimore Cty Informat Syst Baltimore MD 21228 USA
android unlock patterns are likely the most prevalent graphical password system to date. However, human-chosen authentication stimuli (such as text passwords and PINs) are easy to guess. Does increasing the grid size ... 详细信息
来源: 评论
Recording, storing and querying judo match data using an android tool and Cloud computing
收藏 引用
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART P-JOURNAL OF SPORTS ENGINEERING AND TECHNOLOGY 2017年 第4期231卷 243-252页
作者: Villapol, Maria Elena Jansen, Hernan Morales, Ana Flores, Javier Rodrigues, Humberto Huerta, Monica Auckland Univ Technol Sch Engn Comp & Math Sci Auckland 1142 New Zealand Univ Cent Venezuela Caracas DC Venezuela Univ Cent Venezuela Lab Redes Moviles Inalambr & Distribuidas Escuela Comp Caracas DC Venezuela Univ Politecn Salesiana Cuenca Ecuador
Judo is a martial art that was created as a physical, intellectual and moral education method in Japan. In competition matches, Judo is a combat sport where two athletes fight against each other. Judo matches are rule... 详细信息
来源: 评论
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2017年 第2期16卷 552-565页
作者: Zhao, Peng Bian, Kaigui Zhao, Tong Song, Xintong Park, Jung-Min Jerry Li, Xiaoming Ye, Fan Yan, Wei Peking Univ Sch Elect Engn & Comp Sci Beijing Peoples R China Virginia Tech Dept Elect & Comp Engn Blacksburg VA 24060 USA SUNY Stony Brook Dept Elect & Comp Engn Stony Brook NY 11794 USA
Many web applications provide secondary authentication methods, i. e., secret questions (or password recovery questions), to reset the account password when a user's login fails. However, the answers to many such ... 详细信息
来源: 评论