Smartphones as personal profile providers: enhancing mobile app architectures
Abstract
References
Index Terms
- Smartphones as personal profile providers: enhancing mobile app architectures
Recommendations
Detecting repackaged smartphone applications in third-party android marketplaces
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and PrivacyRecent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized ...
Are smartphones really useful for scientific computing?
ADNTIIC'11: Proceedings of the Second international conference on Advances in New Technologies, Interactive Interfaces and CommunicabilitySmartphones are a new kind of mobile devices that allow users to take their office anywhere and anytime with them. The number of smartphones is rapidly growing. Most of the time their capabilities are underused, therefore several authors have studied ...
Performance Testing of Mobile Applications on Smartphones
Smartphones became the preferred means of communication among users due to the availability of thousands of applications apps. Although the hardware and software capabilities of smartphones are on the rise, the apps are primarily constrained by the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Aharon Abadi,
- Program Chairs:
- Danny Dig,
- Yael Dubinsky
Sponsors
Publisher
IEEE Press
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 70Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in