نتایج جستجو برای: j2me

تعداد نتایج: 251  

2004
Greg Schiemer Kenny Sabir Mark Havryliv

This paper describes on-going exploration of tuning systems through development of mobile instruments appropriate for tlie audition and performance of music composed in just intonatIon tunmgs. 1he project is a response to a transformation in computer music brought about through the introduction of wireless technologies and is motivated by a desire to enable performance of music based on just in...

Journal: :Sci. Comput. Program. 2004
Ulrich Kortenkamp Dirk Materlik

Interactive geometry software is established as an important tool in geometry and math education. We present our research on possible ways to use such software in wireless classroom environments. In particular, we address user interface issues on portable devices and describe how we maintain a common code base for both desktop and mobile environments, thus increasing the stability of the applic...

2004
Angelo Corsaro Corrado Santoro

This paper describes the optimizations introduced in Juice, a J2ME virtual machine for embedded systems. These optimizations are designed to make possible the determination of the WCET of the JVM bytecodes related to object and array management. The solution proposed, which is based on subdividing the heap in a set of chunks of fixed size, allows to execute those bytecodes either in a constant ...

Journal: :Softw., Pract. Exper. 2015
Alex Dvinsky Roy Friedman

This paper reports about our experience in designing and developing Chameleon, a highly portable and adaptable group communication framework for smartphones. Chameleon owes its level of portability to several design choices, including: (a) a layered architecture, where the headers of each layer have a standard XML-based format, enabling automatic, error resistant generation of efficient seriali...

Journal: :Sci. Comput. Program. 2006
Mourad Debbabi Abdelouahed Gherbi Azzam Mourad Hamdi Yahyaoui

This paper presents a new selective dynamic compilation technique targeting ARM 16/32-bit embedded system processors. This compiler is built inside the J2ME/CLDC (Java 2 Micro Edition for Connected Limited Device Configuration) platform [Sun MicroSystems, Java 2 Platform, Micro Edition, Version 1.0 Connected, Limited Device Configuration, Specification, Technical Report, Sun Microsystems, CA, U...

2003
Shwetak N. Patel Gregory D. Abowd

As mobile phone handsets attain increasing capabilities, we see many more opportunities for novel applications development. These handsets are typically characterized as constrained computing platforms, due to limitations in computing, storage and interface capabilities. Specialized development environments, such as J2ME, allow for crossplatform development that respects these limitations. Whil...

2010
Waleed Alsabhan

In the past, mobile communication devices (such as cell phones) have not been utilized in flood forecasting and warning due to limitations in technology that have limited the ability of forecasters to gather and interpret geographical data in near real-time. This paper presents a prototype that integrates a GIS (geographic information system) with a hydrological model. It is a mobile mapping ap...

2004
Patrik Mihailescu Habin Lee John W. Shepherdson

With the advent of the Java 2 Micro Edition platform, developers have the ability to develop Java based mobile applications that benefit from features such as device independence, and memory abstraction. However, applications also inherit many limitations such as slow execution, and excessive memory usage that impact on overall application performance and usability. The aim of this paper is to ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز 1387

این پایان نامه یک پروتکل پرداخت برای محیط های ناامن تجارت سیار ارائه می کند. این پروتکل با غلبه بر محدودیت های تکنولوژی و گوشی های موبایل، فرایند پرداخت سیار را بهینه کرده و با اعمال یک مکانیزم منطقی، علاوه بر آسان تر کردن مراحل پیاده سازی، مولفه های امنیتی پرداخت سیار را برآورده می کند. این مکانیزم با پروتکل 3d secure از بعد پیاده سازی و مولفه های امنیتی مقایسه و مورد تجزیه و تحلیل قرار گرفته ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید