1 |
N.A. Maweri, K. Samsudin and F.Z. Rokhani, "Runtime CPU Scheduler Customization Framework for a Flexible Mobile Operating System," in Proc. of the IEEE Student Conference on Research and Development, pp.85-88, 2009. Article (CrossRef Link).
|
2 |
C. Doukas and I. Maglogiannis, "Bringing IoT and Cloud Computing towards Pervasive Healthcare," in Proc. of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.922-926, 2012. Article (CrossRef Link).
|
3 |
T. Liu and D. Lu, "The Application and Development of IOT," in Proc. of the International Conference on Information Technology in Medicine and Education, pp.991-994, 2012. Article (CrossRef Link).
|
4 |
B.B.P. Rao, P. Saluia, N. Sharma, A. Mittal and S.V. Sharma, "Cloud Computing for Internet of Things & Sensing based Applications," in Proc. of the IEEE International Conference on Sensing Technology, pp.374-380, 2012. Article (CrossRef Link).
|
5 |
C. Doukas, T. Pliakas and I. Maglogiannis, "Mobile Healthcare Information Management utilizing Cloud Computing and Android OS," in Proc. of the International Conference on Engineering in Medicine and Biology Society, pp.1037-1040, 2010. Article (CrossRef Link).
|
6 |
R.S. Istepanian, S. Hu, N.Y. Philip and A. Sungoor, "The Potential of Internet of m-Health Things "m-IoT" for Non-Invasive Glucose Level Sensing," in Proc. of the IEEE International Conference on Engineering in Medicine and Biology Society, pp.5264-5266, 2011. Article (CrossRef Link).
|
7 |
K. Nagata, S. Yamaguchi and H. Ogawa, "A Power Saving Method with Consideration of Performance in Android Terminals," in Proc. of the International Conference on Ubiquitous Intelligence & Computing, pp.578-585, 2012. Article (CrossRef Link).
|
8 |
A.A. Muhsen and R.F. Babiceanu, "Systems Engineering Approach to CPU Scheduling for Mobile Multimedia Systems," in Proc. of the IEEE International Conference on Systems Conference, pp.239-243, 2011. Article (CrossRef Link).
|
9 |
H. Ma and R. Zimmermann, "Adaptive Coding with CPU Energy Conservation for Mobile Video Calls," in Proc. of the IEEE International Conference on Multimedia and Expo, pp.717-722, 2012. Article (CrossRef Link).
|
10 |
X. Jia, Q. Feng, T. Fan and Q. Lei, "RFID Technology and its Applications in Internet of Things (IoT)," in Proc. of the International Conference on Consumer Electronics, Communications and Networks, pp.1282-1285, 2012. Article (CrossRef Link).
|
11 |
H.H. Yen, "Novel visual sensor deployment algorithm in PTZ wireless visual sensor networks," in Proc. of the IEEE Asia Pacific Conference on Wireless and Mobile, pp.214-218, 2014. Article (CrossRef Link).
|
12 |
Y. Huang and G. Li, "Descriptive Models for Internet of Things," in Proc. of the IEEE International Conference on Intelligent Control and Information Processing, pp.483-486, 2010. Article (CrossRef Link).
|
13 |
K.C. Son and J.Y. Lee, "The Method of Android Application Speed Up by Using NDK," in Proc. of the International Conference on Awareness Science and Technology, pp.382-385, 2011. Article (CrossRef Link).
|
14 |
Y. Zhu and T.N. Wang, "Research on the Visualization of Equipment Support Based on the Technology of Internet of Things," in Proc. of the International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp.1352-1357, 2012. Article (CrossRef Link).
|
15 |
T.K. Kundu and K. Paul, "Improving Android Performance and Energy Efficiency," in Proc. of the International Conference on VLSI Design, pp.256-261, 2011. Article (CrossRef Link).
|
16 |
X. Zhang and H. Li, "A Self-Reconfigurable Sensor Network Construction Research in the Paradigm of Internet of Things," in Proc. of the International Conference on Computer Science & Service System, pp.311-314, 2012. Article (CrossRef Link).
|
17 |
R. Shrestha and A. Yao, "Design of Secure Location and Message Sharing System for Android Platform," in Proc. of the International Conference on Computer Science and Automation Engineering, pp.117-121, 2012. Article (CrossRef Link).
|
18 |
Y. Zhang, M. Yang, Z. Yang, G. Gu, P. Ning and B. Zang, "Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps," IEEE Transactions on Information Forensics and Security, vol.9, no.11, pp.1828-1842, 2014. Article (CrossRef Link).
DOI
|
19 |
Y.J. Kim, S.J. Cho, K.J. Kim, E.H. Hwang, S.H. Yoon and J.W. Jeon, "Benchmarking Java Application Using JNI and Native C Application on Android," in Proc. of the International Conference on Control, Automation and Systems, pp.284-288, 2012. Article (CrossRef Link).
|
20 |
S. Liang, X. Du, C.C. Tan and W. Yu, "An effective online scheme for detecting Android malware," in Proc. of the International Conference on Computer Communication and Networks, pp.1-8, 2014. Article (CrossRef Link).
|