Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A review on cloud computing: Design challenges in architecture and security
A Review on Cloud Computing: Design Challenges in Architecture and Security Page 1
Journal of Computing and Information Technology - CIT 19, 2011, 1, 25–55 doi:10.2498/cit.1001864 …
Journal of Computing and Information Technology - CIT 19, 2011, 1, 25–55 doi:10.2498/cit.1001864 …
Comparison of different approaches for mobile advertising
R Bulander, M Decker, G Schiefer… - … Workshop on Mobile …, 2005 - ieeexplore.ieee.org
Mobile terminals, such as cellular phones and PDAs, have an enormous advertising
potential: they are extremely popular and most people carry such devices with them all day …
potential: they are extremely popular and most people carry such devices with them all day …
Mobile systems development: A literature review
JH Hosbond, PA Nielsen - … : Socio-Technical Issues and Challenges: IFIP …, 2005 - Springer
This article reviews 105 representative contributions to the literature on mobile systems
development. The contributions are categorized according to a simple conceptual …
development. The contributions are categorized according to a simple conceptual …
A privacy preserving reputation system for mobile information dissemination networks
M Voss, A Heinemann… - … Conference on Security …, 2005 - ieeexplore.ieee.org
In a mobile information dissemination network mobile users, equipped with wireless
devices, exchange information in a spontaneous manner whenever they come into …
devices, exchange information in a spontaneous manner whenever they come into …
Collaboration in opportunistic networks
A Heinemann - 2007 - tuprints.ulb.tu-darmstadt.de
Motivation. With the increasing integration of wireless short-range communication
technologies (Bluetooth, 802.11 b WiFi) into mobile devices, novel applications for …
technologies (Bluetooth, 802.11 b WiFi) into mobile devices, novel applications for …
An economic incentive model for encouraging peer collaboration in mobile-P2P networks with support for constraint queries
In mobile ad hoc peer-to-peer (M-P2P) networks, economic models become a necessity for
enticing non-cooperative mobile peers to provide service. M-P2P users may issue queries …
enticing non-cooperative mobile peers to provide service. M-P2P users may issue queries …
Advertising via mobile terminals–delivering context sensitive and personalized advertising while guaranteeing privacy
R Bulander, M Decker, G Schiefer, B Kölmel - E-business and …, 2007 - Springer
Mobile terminals like cellular phones and PDAs are a promising target platform for mobile
advertising: The devices are widely spread, are able to present interactive multimedia …
advertising: The devices are widely spread, are able to present interactive multimedia …
Incentives for electronic coupon systems
Ad hoc networks and peer-to-peer systems typically require many users to participate, in
order to leverage the full benefits of the system. In this paper we examine an electronic …
order to leverage the full benefits of the system. In this paper we examine an electronic …
m-Advertising: Werbung mit mobilen Endgeräten–ein Überblick
M Decker, R Bulander, T Högler, G Schiefer - … , Hindernisse, Einsatz. 1 …, 2006 - dl.gi.de
Die besonderen Vorzüge von mobilen Endgeräten wie Mobiltelefonen und PDAs als
Medium für Werbung wird in zahlreichen Publikationen erörtert, wobei meist ausgehend von …
Medium für Werbung wird in zahlreichen Publikationen erörtert, wobei meist ausgehend von …
[PDF][PDF] Enabling personalized and context sensitive mobile advertising while guaranteeing data protection
R Bulander, M Decker, G Schiefer… - Proceedings of EURO …, 2005 - mobility.grchina.com
Advertising on mobile terminals is a consequential advancement of traditional methods of
advertising. In this article we will discuss the special potentials and challenges of mobile …
advertising. In this article we will discuss the special potentials and challenges of mobile …