Advancing the Next-Generation of Mobile Computing: Emerging Technologies
Title | Advancing the Next-Generation of Mobile Computing: Emerging Technologies PDF eBook |
Author | Khalil, Ismail |
Publisher | IGI Global |
Pages | 345 |
Release | 2012-02-29 |
Genre | Technology & Engineering |
ISBN | 1466601205 |
"This book offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications"--Provided by publisher.
Smart Phone and Next Generation Mobile Computing
Title | Smart Phone and Next Generation Mobile Computing PDF eBook |
Author | Pei Zheng |
Publisher | Elsevier |
Pages | 582 |
Release | 2010-07-19 |
Genre | Technology & Engineering |
ISBN | 0080458343 |
This in-depth technical guide is an essential resource for anyone involved in the development of "smart mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur. - Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side - Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs - Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux - Considers the limitations of existing terminal designs and several pressing application design issues - Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks - Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing
Contemporary Challenges and Solutions for Mobile and Multimedia Technologies
Title | Contemporary Challenges and Solutions for Mobile and Multimedia Technologies PDF eBook |
Author | Khalil, Ismail |
Publisher | IGI Global |
Pages | 399 |
Release | 2012-10-31 |
Genre | Technology & Engineering |
ISBN | 1466621648 |
Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With the increased use of mobile devices and the exchange of information over wireless networks, information systems are able to process and transmit multimedia data in various areas. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies provides comprehensive knowledge on the growth and changes in the field of multimedia and mobile technologies. This reference source highlights the advancements in mobile technology that are beneficial for developers, researchers, and designers.
Security Management in Mobile Cloud Computing
Title | Security Management in Mobile Cloud Computing PDF eBook |
Author | Munir, Kashif |
Publisher | IGI Global |
Pages | 266 |
Release | 2016-08-01 |
Genre | Computers |
ISBN | 1522506039 |
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.
Trustworthy Ubiquitous Computing
Title | Trustworthy Ubiquitous Computing PDF eBook |
Author | Ismail Khalil |
Publisher | Springer Science & Business Media |
Pages | 278 |
Release | 2012-09-08 |
Genre | Computers |
ISBN | 9491216708 |
Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to “emerged and exciting new computing paradigm of Ubiquitous Computing”, includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitous computing several houses were build, equipped with technology and used as laboratory in order to find and test appliances that are useful and could be made available in our everyday life. Within the last years industry picked up the idea of integrating ubiquitous computing and already available products like remote controls for your house were developed and brought to the market. In spite of many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas a forum to elaborate security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of a UbiComp application. The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.
Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing
Title | Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing PDF eBook |
Author | Hu, Wen-Chen |
Publisher | IGI Global |
Pages | 337 |
Release | 2013-11-30 |
Genre | Technology & Engineering |
ISBN | 1466647167 |
The development of new information and communication technologies has a considerable impact on the way humans interact with each other and their environment. The proper use of these technologies is an important consideration in the success of modern human endeavors. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing explores some of the latest advances in wireless communication technologies, making use of empirical research and analytical case studies to evaluate best practices in the discipline. This book will provide insight into the next generation of information and communication technologies for developers, engineers, students, researchers, and managers in the telecommunications field.
Securing Government Information and Data in Developing Countries
Title | Securing Government Information and Data in Developing Countries PDF eBook |
Author | Zoughbi, Saleem |
Publisher | IGI Global |
Pages | 325 |
Release | 2017-02-27 |
Genre | Computers |
ISBN | 1522517049 |
The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.