Micro Mobile Programs
نویسنده
چکیده
This paper describes a three-layer architecture for mobile code based on a distinction between code that is mobile versus code that is resident. We focus on code that is mobile but not resident and consider two contexts in which such code is constrained by its delivery mechanism to be small in size, resulting in micro mobile programs. The contexts we consider are programs carried in network communication packets and programs carried in two-dimensional barcodes.
منابع مشابه
Revolution in E-Learning by the Modern Educational Model in Mobile Learning
education has stepped to an ultra-place and time in 21st century. We have entered to digital and wireless communication century which mobile technologies have changed the process of education and instruction. The application of these mobile technologies for creation of knowledge, attitude and skill in learners is called Mobile Learning. The effectiveness of mobile learning programs requires new...
متن کاملM-Brochure
Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists is very effective in attracting them. On the other hand today many people use mobile phone and carry it as a necessary device. As a result to submit information to tourists we can send information to their mobile phon...
متن کاملSecured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks
خسارات وارد شده به شبکه گاز شهری در یک زلزله میتواند زیانهای زیادی از جمله خسارت ناشی از آتشسوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتشسوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارتهای مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...
متن کاملA Refinement Method for Java Programs
We present a refinement method for Java programs which is motivated by the challenge of verifying security protocol implementations. The method can be used for stepwise refinement of abstract specifications down to the level of code running in the real application. The approach is based on a calculus for the verification of Java programs for the concrete level and Abstract State Machines for th...
متن کاملSecurity Analysis of Wireless Java
This paper represents a careful study of the security aspects of Java 2 Micro-Edition (J2ME) Connected Limited Device Configuration (CLDC). This Java platform is intended for resource-constrained devices, with the purpose of expanding the range of applications available for these devices, by enabling them to run Java programs. Consequently, malicious code would pose a threat to the security and...
متن کامل