Micro Mobile Programs

نویسنده

  • Carl A. Gunter
چکیده

This paper describes a three-layer architecture for mobile code based on a distinction between code that is mobile versus code that is resident. We focus on code that is mobile but not resident and consider two contexts in which such code is constrained by its delivery mechanism to be small in size, resulting in micro mobile programs. The contexts we consider are programs carried in network communication packets and programs carried in two-dimensional barcodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revolution in E-Learning by the Modern Educational Model in Mobile Learning

education has stepped to an ultra-place and time in 21st century. We have entered to digital and wireless communication century which mobile technologies have changed the process of education and instruction. The application of these mobile technologies for creation of knowledge, attitude and skill in learners is called Mobile Learning. The effectiveness of mobile learning programs requires new...

متن کامل

M-Brochure

Tourism industry is one of the important sources of income in many countries. The appropriate and quick submission of primary information such as address of hotels to the tourists is very effective in attracting them. On the other hand today many people use mobile phone and carry it as a necessary device. As a result to submit information to tourists we can send information to their mobile phon...

متن کامل

Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks

خسارات وارد شده به شبکه گاز شهری در یک زلزله می­تواند زیان­های زیادی از جمله خسارت ناشی از آتش­سوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتش­سوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارت­های مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...

متن کامل

A Refinement Method for Java Programs

We present a refinement method for Java programs which is motivated by the challenge of verifying security protocol implementations. The method can be used for stepwise refinement of abstract specifications down to the level of code running in the real application. The approach is based on a calculus for the verification of Java programs for the concrete level and Abstract State Machines for th...

متن کامل

Security Analysis of Wireless Java

This paper represents a careful study of the security aspects of Java 2 Micro-Edition (J2ME) Connected Limited Device Configuration (CLDC). This Java platform is intended for resource-constrained devices, with the purpose of expanding the range of applications available for these devices, by enabling them to run Java programs. Consequently, malicious code would pose a threat to the security and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002