|
|
|
Cheolhyeon Kwon and Donghyun Kang
Recently, the technologies of on-device AI have been accelerated with the development of new hardware and software platforms. Therefore, many researchers and engineers focus on how to enable ML technologies on mobile devices with limited hardware resourc...
ver más
|
|
|
|
|
|
|
Manish Bhurtel and Danda B. Rawat
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|
|
|
|
Sergey Balabaev,Sergey Lupin,Roustiam Chakirov
Pág. 86 - 93
Currently, mobile devices such as smartphones and tablets are widely used. The computing power of their processors is comparable to the characteristics of personal computers, and this makes it possible to perform complex resource-intensive calculations o...
ver más
|
|
|
|
|
|
|
Laxmisha Rai,Zhiyuan Wang,Amila Rodrigo,Zhaopeng Deng,Haiqing Liu
Pág. pp. 103 - 120
With the rapid use of Android OS in mobile devices and related products, face recognition technology is an essential feature, so that mobile devices have a strong personal identity authentication. In this paper, we propose Android based software developm...
ver más
|
|
|
|
|
|
|
Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci and Roberto Baldoni
The vast majority of today?s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analysis): an approa...
ver más
|
|
|
|
|
|
|
Hidenori Takasuka, Koichi Hirai and Kazumasa Takami
Smartphones have the ability to communicate with other terminals through ad hoc connections. A variety of applications have been developed to exploit this ability. The authors have developed an Android OS (operating system) application (called ?social DT...
ver más
|
|
|
|
|
|
|
Sergey Zhidkov, Andrey Sychev, Alexander Zhidkov and Alexander Petrov
In this paper, we provide a systematic analysis of smartphone power consumption in background audio recording scenarios. We report comprehensive measurement results for several Android smartphone models with diverse hardware specifications, running diffe...
ver más
|
|
|
|
|
|
|
Diego Baierle Sebastiany,Mirelle Daiara Vieira Freitas,Luciano Ignaczak
Pág. 66 - 75
Atualmente, é cada vez mais comum a utilização de aplicativos de mobile banking em smartphones. Tais aplicativos devem implementar o protocolo TLS para empregar criptografia para proteger a comunicação entre o cliente e o seu banco. No entanto,muitas vez...
ver más
|
|
|
|
|
|
|
Avanthika Meenakshi,Shyam Sundar,Silviya Nancy
Pág. pp. 64 - 66
Mobile phones are used in almost all aspects of life by people. But in the case of visually impaired, they are still a step behind in using smart phones for various purposes. Having interactive android OS, navigation and travel aiding apps using sensors ...
ver más
|
|
|
|