• Nenhum resultado encontrado

[PDF] Top 20 Quality of service and security in future mobile technologies

Has 10000 "Quality of service and security in future mobile technologies" found on our website. Below are the top 20 most common "Quality of service and security in future mobile technologies".

Quality of service and security in future mobile technologies

Quality of service and security in future mobile technologies

... series of locations in its ...abnormal. In order to protect vehicles privacy, nodes communicate using their dynamic locations since vehicles are assumed to be equipped with positioning systems ... See full document

124

Identifying Key Factors for Increasing Royalty of Customers in Mobile Shopping Services

Identifying Key Factors for Increasing Royalty of Customers in Mobile Shopping Services

... development of information and communication technology and the well constructed wireless network environment, mobile shopping has been one of critical consumer behaviors in ... See full document

5

Characterization of User-Perceived Quality of Service (QOS) in Mobile Devices Using Network Pairwise Comparisons

Characterization of User-Perceived Quality of Service (QOS) in Mobile Devices Using Network Pairwise Comparisons

... QoS of data services in cellular networks, analysts must follow a methodology that considers user-experiences in specific application ...competitors) in the same geographical region based on ... See full document

13

CDMA2000 Radio Measurements at 1.9GHz and Comparison of  Propagation Models in Three Built-Up Cities of South-South,  Nigeria.

CDMA2000 Radio Measurements at 1.9GHz and Comparison of Propagation Models in Three Built-Up Cities of South-South, Nigeria.

... measurements and prediction, realized by the mobile terminal or the base station, is needed to guarantee quality of service and to supervise the planned coverage ...variety ... See full document

11

Generation Z and technologies on museums – Its influence on perceptions about Quality, Arousal and E-WOM Intentions

Generation Z and technologies on museums – Its influence on perceptions about Quality, Arousal and E-WOM Intentions

... Jacobsen and Forsten (2011), in a study considering students in the first year on college, have discovered a negative relation between usage level of mobile phones and grades ... See full document

31

An assessment of e-service quality, customer satisfaction, and customer trust on customer behavior in online shopping

An assessment of e-service quality, customer satisfaction, and customer trust on customer behavior in online shopping

... e-service quality in online ...e-service quality attributes were available in Indonesian based online store using the four dimension of e-service quality ... See full document

51

Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

... Review of Threat Model of Mobile Device Usage There are so many hardware and software platforms under control of so many vendors in case of mobile devices ... See full document

8

Grounding the Innovation of Future Technologies

Grounding the Innovation of Future Technologies

... HCI in a world of ubiquitous and mobile computers is plagued by interaction problems that have only recently become known to HCI, and large areas of the territory still remain ... See full document

18

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... firstly and data packets are queued ...low in the network, no matter which route the traffic flow chose, the route chosen can provide enough data rate at most of the ...high and can be lower ... See full document

7

Assessing Cybersecurity service quality in corporate environments

Assessing Cybersecurity service quality in corporate environments

... information security policies, for whatever reason, is the weakest link in information security, and this user omissive behavior can seriously compromise the organizational information ... See full document

41

Web 2.0 Technologies and Social Networking Security Fears in Enterprises

Web 2.0 Technologies and Social Networking Security Fears in Enterprises

... majority of them follow a different ...percent of organizations restrict the use of at least one Web ...technology and controlling the use of user-owned ...better security, it is ... See full document

5

Review of Security Issues in Mobile Wireless Sensor Networks

Review of Security Issues in Mobile Wireless Sensor Networks

... operate in hostile unattended environments they are easy targets for ...Deployment of these networks in hostile environments is due to importance of data available ...Thus security ... See full document

6

The influence of perceived privacy on customer loyalty in mobile phone services-An Empirical Research in Jordan

The influence of perceived privacy on customer loyalty in mobile phone services-An Empirical Research in Jordan

... privacy of personal information and communications is the top reason many consumers have stayed out off the online services including mobile phone ...competitive in the communication ... See full document

8

Perception Analysis of Desktop and Mobile Service Website

Perception Analysis of Desktop and Mobile Service Website

... the service quality. The three main models and service quality scale developed in this study is Servqual, ServPerf, and E-Servqual ...the quality is the IS Success ... See full document

12

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... only in the network, on top of that we highlighted the special considerations for security in MANETs and provided an extensive overview of related work and the state ... See full document

12

Servitization in a Security Business: Changing the Logic of Value Creation

Servitization in a Security Business: Changing the Logic of Value Creation

... defined and packaged services are seen as a cut- ting edge in the highly competitive security market and are prerequisites for a market-oriented security service ...product ... See full document

8

Impact of mobile health technology adoption on service quality and patient satisfaction

Impact of mobile health technology adoption on service quality and patient satisfaction

... Thirdly, in view of the background of difficult medical treatment and poor medical environment in Chinese hospitals, this paper proposes to increase convenience as the dimension ... See full document

171

Buying Behavior Of Organic Vegetables Product The Effects Of Perceptions Of Quality And Risk

Buying Behavior Of Organic Vegetables Product The Effects Of Perceptions Of Quality And Risk

... quality of alternatives with regard to price within a category (Jin & Suh, ...advantages and technologies related of environmental ...Perceived quality is not the actual ... See full document

8

SERVICE AND SECURITY MONITORING IN CLOUD

SERVICE AND SECURITY MONITORING IN CLOUD

... Abstract: In the cloud computing context, Quality of Software (QoS) is defined as the extent to which user requirements are met by the providers of cloud ...power of the Central ... See full document

7

Analysis of quality and cost of FeSiMg treatment master alloy vs. cored wire in production of ductile cast iron

Analysis of quality and cost of FeSiMg treatment master alloy vs. cored wire in production of ductile cast iron

... stage in the productions of high-quality ductile iron and vermiculwar cast iron are treatment with different vermin- nodularisers, ...achieved in this respect as regards the ... See full document

4

Show all 10000 documents...