نتایج جستجو برای: mobile data collector

تعداد نتایج: 2542615  

1992
Daniel R. Edelson

Our research is concerned with compiler-independent, tag-free garbage collection for the C ++ programming language. This paper presents a mark-and-sweep collector , and explains how it ameliorates shortcomings of a previous copy collector. The new collector, like the old, uses C ++ 's facilities for creating abstract data types to deene a tracked reference type, called roots, at the level of th...

2013
Yong-Joong Kim Sung-Bae Cho

Knowing user’s current or next location is very important task for context-aware services in mobile environment. Many researchers have tried to predict user location using their own methods. However, they focused mainly the performance of method, and only few were considered development of real working system on mobile devices. In this paper, we present a location prediction framework, and deve...

2010
Henning Breuer Mitsuji Matsumoto

Mobile learning has been described as learning across various contexts, but the situated potentials of different contexts for learners and resulting requirements for learnercentered system design have rarely been considered. We discuss design challenges and opportunities of portable technologies to support learning activities inside the classroom and outside across various contexts. A functiona...

2014
Jie Tang Chen Liu

Due to the thriving of the mobile devices market, there has been a great momentum in adopting Java technology in embedded mobile devices where optimizing energy consumption is extremely critical. However, since Java Virtual Machines (JVMs) are conventionally used for server side clusters, the energy and memory tradeoff on embedded devices are not well understood. In this work, we attempt to fin...

Journal: :Microelectronics Reliability 2015
Nishad Patil Diganta Das Michael G. Pecht

In this study, a Mahalanobis distance (MD)-based anomaly detection approach has been evaluated for non-punch through (NPT) and trench field stop (FS) insulated gate bipolar transistors (IGBTs). The IGBTs were subjected to electrical–thermal stress under a resistive load until their failure. Monitored on-state collector–emitter voltage and collector–emitter currents were used as input parameters...

Journal: :journal of heat and mass transfer research 0
aminreza noghrehabadi shahid chamran university of ahvaz, faculty of engineering, department of mechanical engineering ebrahim hajidavaloo shahid chamran university of ahvaz, faculty of engineering, department of mechanical engineering mojtaba moravej azad street . no#35 behbahan, iran

the shape of a solar collector is an important factor in solar-to-thermal energy conversion. conical shape is one of the stationary and symmetric shapes that can be employed as a solar water heater. flow rate of working fluid on the solar collector has an important effect on the efficiency of the collector. the present study is an experimentally investigated of the performance of the solar coni...

Journal: :Journal of Algorithms 1999

2002
DeQing Chen Alan Messer Dejan Milojicic Sandhya Dwarkadas

Our everyday life is becoming increasingly filled with computing devices. Among them, mobile and embedded devices usually have far more limited resource specifications than wired and consequently more powerful computing devices. In order to increase available software on mobile devices it is beneficial to reuse existing software platforms or applications. Conventional wisdom has been to trim do...

2006
Gustavo Alonso Christian S. Jensen Bernhard Mitschang Peter A. Boncz

From 16.10.05 to 21.10.05, the Dagstuhl Seminar 05421, Data Always and Everywhere Management of Mobile, Ubiquitous, Pervasive, and Sensor Data, was held in the International Conference and Research Center, Schloss Dagstuhl. During the seminar, all participants were given the opportunity to present their current research, and ongoing activities and open problems were discussed. This document is ...

Journal: :Bulletin of Electrical Engineering and Informatics 2022

Recently, the public has been shocked by mysterious figure of Hacker Bjorka. Bjorka hacked Indonesian officials. leaks Indonesia's General Election Commission (KPU) data. This raises a significant red flag concerning Bjorka's ability to "disrupt" circumstances that are harmful large number individuals, including his alleged action leaking personal data influential state Expert Putra Aji Adhari ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید