Essays about: "mobile emulator"
Showing result 1 - 5 of 16 essays containing the words mobile emulator.
-
1. Approaches and Techniques to Assess the Accuracy of Network Emulators
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As the mobile communication world expands in size and complexity, the need for testing the solutions in a controlled environment before deployment is as pronounced as ever. Simultaneously, new tools and products are developed to optimize the process and reduce costs. READ MORE
-
2. Multipath Packet Scheduling for 5G Systems
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Avdelningen för datavetenskapAbstract : Modern mobile phones often have multiple network interfaces. By utilising these interfaces concurrently, the user experience can be enhanced, e.g., increased performance, stability and reliability. READ MORE
-
3. Advanced Hardened Registration Process for Mobile Crowd Sensing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Mobile Crowd Sensing (MCS) or Participatory Sensing (PS) are two emerging systems as smart mobile devices become ubiquitous. One of the advantages of such a sensing system is that almost anyone with a mobile device can become a moving "sensor". READ MORE
-
4. Development of a Multi Sensor Android Application
University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskapAbstract : There has been an enormous growth in the usage of smartphones in recent times. Smartphones are not limited to communication purposes. It has various applications designed as per the daily requirements of humans such as web-searching, online shopping, bank transactions, games, etc. READ MORE
-
5. Hardened Registration Process for Participatory Sensing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Participatory sensing systems need to gather information from a largenumber of participants. However, the openness of the system is a doubleedgedsword: by allowing practically any user to join, the system can beabused by an attacker who introduces a large number of virtual devices. READ MORE