Browsing by Subject "Android"
Now showing items 1-9 of 9
-
Covering arrays have proven to be highly effective in detecting software bugs in what is known as combinatorial testing. A t-way covering array includes all t-way combinations of variable values, up to a specified level ...
-
(2013-07-29)This thesis aims to present solutions to improve the performance of SQLite library on mobile systems. In particular, two approaches are presented to add lightweight locking mechanisms to the SQLite library and improve ...
-
(2016-04-29)Multi-selection is the act of selecting a set of elements on a graphical user interface in order to perform one or more operations on that set. Multi-selection is used, for example, to select thumbnails in an image gallery, ...
-
(2023-04-27)The widespread use of smartphones by most of the population has made smartphone data highly valuable in gaining insights into users’ behavior by capturing their daily activities. This data can be leveraged to predict user ...
-
(2014-05-22)The increase in the processing power of mobile devices has led to an explosion of available services and applications. However, the cost of mobile data is a hindrance to the adoption of data intensive applications. We ...
-
(2012-10-19)This thesis presents a method for enhancing performance of Storage Class Memory File System (SCMFS) and an implementation of SCMFS on Android platform. It focuses on analyzing performance influencing factors of memory ...
-
(2015-05-07)Since its first release, Android has been increasingly adopted by people and companies worldwide. It is currently estimated that around 1.1 billion Android devices are in use. Even though Android was built with Security ...
-
(2015-07-28)Pilot errors caused by heads-down time or misinterpretation of published instrument approach procedures have been attributed to multiple incidents of fatal controlled flight into terrain while approaching airports in ...
-
(2015-05-05)In Android systems, inter-process communication relies heavily on intent, which can be understood as a message between apps. However, (i)intents can be hijacked when they are transmitted from senders to receivers. Even if ...