Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges

B Afzal, M Umair, GA Shah, E Ahmed - Future Generation Computer …, 2019 - Elsevier
Abstract Social IoT (SIoT) is an emerging paradigm of IoT in which different IoT devices
interact and establish relationships with each other to achieve a common goal. In essence …

A comparative analysis of cross-platform development approaches for mobile applications

S Xanthopoulos, S Xinogalos - … of the 6th Balkan Conference in …, 2013 - dl.acm.org
Nowadays, native mobile applications (mobile apps) are targeted at specific mobile
platforms. This phenomenon imposes severe constraints, such as the use of different …

Techno-managerial implications towards communication in internet of things for smart cities

A Pawar, A Kolte, B Sangvikar - International Journal of Pervasive …, 2021 - emerald.com
Purpose The purpose of this paper is to explore the significance of the internet of things (IoT)
system for smart cities and deliberate on the technological aspects involved in developing …

Mobile application platform heterogeneity: Android vs Windows Phone vs iOS vs Firefox OS

TM Grønli, J Hansen, G Ghinea… - 2014 IEEE 28th …, 2014 - ieeexplore.ieee.org
Modern smartphones have a rich spectrum of increasingly sophisticated features, opening
opportunities for software-led innovation. Of the large number of platforms to develop new …

The impact of cross-platform development approaches for mobile applications from the user's perspective

IT Mercado, N Munaiah, A Meneely - Proceedings of the International …, 2016 - dl.acm.org
Mobile app developers today have a hard decision to make: to independently develop
native apps for different operating systems or to develop an app that is cross-platform …

Puzzle: a visual-based environment for end user development in touch-based mobile phones

J Danado, F Paternò - … , HCSE 2012, Toulouse, France, October 29-31 …, 2012 - Springer
Despite the widespread usage of mobile devices there is a lack of environments able to
allow end users to create applications directly in such devices. In this paper, we present the …

[PDF][PDF] Security threats on mobile devices and their effects: estimations for the future

M Yesilyurt, Y Yalman - International Journal of Security and Its …, 2016 - researchgate.net
Portable devices are today used in all areas of life thanks to their ease of use as well as their
applications with unique features. The increase in the number of users, however, also leads …

Systems and methods for enforcing security in mobile computing

CJ White, TC Clancy III, B Dougherty - US Patent 9,712,530, 2017 - Google Patents
8,225,329 8,387,048 8,490,191 8,505,029 8,516,095 8,533,860 8,584,229 8,595,832
8,613,052 8,655,307 8,874,891 8,887,308 8,898,481 9,191.382 2002/0052965 …

Systems and methods for enforcing access control policies on privileged accesses for mobile devices

TC Clancy III, CJ White - US Patent 9,787,681, 2017 - Google Patents
US9787681B2 - Systems and methods for enforcing access control policies on privileged
accesses for mobile devices - Google Patents US9787681B2 - Systems and methods for …

A secure software architecture for mobile computing

H Reza, N Mazumder - 2012 Ninth International Conference on …, 2012 - ieeexplore.ieee.org
Mobile computing is considered as low-end computing systems. It currently dominates
almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing …