scispace - formally typeset
Search or ask a question

Showing papers on "Application software published in 2013"


Patent
03 Oct 2013
TL;DR: In this paper, an improved technique for managing enterprise applications on mobile devices is described, where each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment.
Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.

646 citations


Journal ArticleDOI
TL;DR: This paper presents a middleware that addresses these characteristics supporting timely reconfiguration in distributed real-time systems based on services and Experimental results are shown to validate the middleware in an actual small-scale video prototype.
Abstract: Future networked embedded systems will be complex deployments deeply integrated in the environment that they monitor. They will have to react to both user and environmental events, and this may require modifying their structure to handle the changing situations. In a number of domains including industrial environments, this modification of the system structure will need to take place in real time. This is a hard problem that will require novel and paradigmatic solutions involving cross-domain knowledge to build a middleware for enabling real-time interaction between nodes allowing time-bounded reconfiguration. For supporting real-time, this middleware must be vertically architected in a modular way from the network and operating system levels up to the application software and the real-time policies for achieving time-bounded behavior. This paper presents a middleware that addresses these characteristics supporting timely reconfiguration in distributed real-time systems based on services. Experimental results are shown to validate the middleware in an actual small-scale video prototype.

154 citations


Patent
23 Feb 2013
TL;DR: In this paper, a method comprises conducting an analysis for anomalous behavior on application software and generating a video of a display output produced by the application software, the video is to be displayed on an electronic device contemporaneously with display of one or more events detected by the analysis being performed.
Abstract: According to one embodiment, a method comprises conducting an analysis for anomalous behavior on application software and generating a video of a display output produced by the application software. The video is to be displayed on an electronic device contemporaneously with display of one or more events detected by the analysis being performed on the application software.

141 citations


Posted Content
TL;DR: A privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part and can be separately stored.
Abstract: With increasing use of mobile devices, photo sharing services are experiencing greater popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). On the flip side, photo sharing services have raised privacy concerns such as leakage of photos to unauthorized viewers and the use of algorithmic recognition technologies by providers. To address these concerns, we propose a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part. These two components can be separately stored. This technique significantly reduces the signal-to-noise ratio and the accuracy of automated detection and recognition on the public part, while preserving the ability of the provider to perform server-side transformations to conserve download bandwidth usage. Our prototype privacy-preserving photo sharing system, P3, works with Facebook, and can be extended to other services as well. P3 requires no changes to existing services or mobile application software, and adds minimal photo storage overhead.

122 citations


Journal ArticleDOI
TL;DR: It is concluded that smartphones and their apps could replace many traditional handheld sensors, calculators, and data storage devices in ecological and evolutionary research.
Abstract: Smartphones and their apps (application software) are now used by millions of people worldwide and represent a powerful combination of sensors, information transfer, and computing power that deserves better exploitation by ecological and evolutionary researchers. We outline the development process for research apps, provide contrasting case studies for two new research apps, and scan the research horizon to suggest how apps can contribute to the rapid collection, interpretation, and dissemination of data in ecology and evolutionary biology. We emphasize that the usefulness of an app relies heavily on the development process, recommend that app developers are engaged with the process at the earliest possible stage, and commend efforts to create open-source software scaffolds on which customized apps can be built by nonexperts. We conclude that smartphones and their apps could replace many traditional handheld sensors, calculators, and data storage devices in ecological and evolutionary research. We identify their potential use in the high-throughput collection, analysis, and storage of complex ecological information.

105 citations


Patent
03 Jan 2013
TL;DR: In this paper, an illustrative mobile computing device executing weight, nutrition, health, behavior and exercise application software serves as a simulated combination personal trainer and dietician/nutritionist for the user using comprehensive databases storing personalized health, nutrition and exercise information.
Abstract: An illustrative mobile computing device executing weight, nutrition, health, behavior and exercise application software serves as a simulated combination personal trainer and dietician/nutritionist for the user using comprehensive databases storing personalized health, nutrition and exercise information. A mobile computing device, such as a smartphone, executing such software monitors, tracks and/or adjusts caloric intake, energy expenditure taking into account nutritional information and behavioral factors. The mobile computing device receives food consumption, exercise-related, behavior and other input using speech input and the device's GPS subsystem to ease data entry burden on users and to promote continued long-term usage. The system rewards user goal achievement in an automatic, seamless manner, through, for example, downloading music, books, or other media. In illustrative implementations, the system assists users to make healthy food and exercise choices by using a comprehensive color code system to identify good choices, bad choices and those in between.

98 citations


01 Jan 2013
TL;DR: Design mechanisms that not only protect sensitive data with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result.
Abstract: Cloud computing has gained a lot of publicity in the current IT world. After the internet, Cloud computing is the next big thing in the computer world. Cloud computing is the use of the Internet for the tasks performed on the computer and it is the next- generation architecture of IT Industry. Cloud computing is related to different technologies and the convergence of various technologies has emerged to be called cloud computing. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This design mechanisms that not only protect sensitive data with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result.

73 citations


Patent
28 Jun 2013
TL;DR: In this article, a method for a first mobile application and a second mobile application on a mobile device to share information includes (1) determining that a second application is present on the mobile device; (2) receiving, from a user, permission for the first mobile app to access data from the second application; (3) the first application executed by the computer processor requesting data from another application.
Abstract: Systems and methods for communication among mobile applications are disclosed. In one embodiment, a method for a first mobile application and a second mobile application on a mobile device to share information includes (1) a first mobile application executed by a computer processor on a mobile device determining that a second mobile application is present on the mobile device; (2) receiving, from a user, permission for the first mobile application to access data from the second application; (3) the first application executed by the computer processor requesting data from the second application; and (4) the first application receiving the requested data from the second application.

71 citations


Proceedings Article
02 Apr 2013
TL;DR: P3 as mentioned in this paper is a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part.
Abstract: With increasing use of mobile devices, photo sharing services are experiencing greater popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). On the flip side, photo sharing services have raised privacy concerns such as leakage of photos to unauthorized viewers and the use of algorithmic recognition technologies by providers. To address these concerns, we propose a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part. These two components can be separately stored. This technique significantly reduces the accuracy of automated detection and recognition on the public part, while preserving the ability of the provider to perform server-side transformations to conserve download bandwidth usage. Our prototype privacy-preserving photo sharing system, P3, works with Facebook, and can be extended to other services as well. P3 requires no changes to existing services or mobile application software, and adds minimal photo storage overhead.

71 citations


Book
01 Jan 2013
TL;DR: This book is an unsurpassed introduction to computer hardware, software, and communications technology for construction engineers and managers and provides additional problems, guidelines, and data for the reader to use in implementing his or her own applications on a personal computer.
Abstract: From the Publisher: For people interested in using computers in construction, this book is the perfect starting point - providing an unsurpassed introduction to computer hardware, software, and communications technology. Giving the reader a basic idea of what the pieces do and how they work together, the book's 16 in-depth chapters offer coverage of topics so important for construction engineers and managers. Through the material, readers are given the ability to analyze systematically a potential area of need - such as a function in a department - to determine whether a computer application might help to assess the costs and benefits of alternative proposals and to proceed from that analysis to a clear specification for what the proposed solution should accomplish. There is also coverage of how computer professionals evaluate hardware and design the software and systems that will implement a given application. Furthermore, readers will learn how to manage the people, resources, time, and money required in the development process for creating a given application program or for adapting a package application to the needs specified in the design. Other topics found in the book include: common tools used to develop application software for today's business computers; systems and applications available in the marketplace to perform specific functions, such as estimating, scheduling, cost control, and simulation; emergent technologies and how an individual, group, or company might plan ahead and take advantage of the trends. In addition, the book provides twenty-two construction engineering and management application examples - most developed using modern computer software - and provides additional problems, guidelines, and data for the reader to use in implementing his or her own applications on a personal computer.

58 citations


Patent
21 Aug 2013
TL;DR: In this paper, private user data may be processed in the cloud without revealing the user identity to the cloud service provider, but only the user or an authorized agent of the user and the service's hardware platform have access to certain keys.
Abstract: While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data.

Patent
Achim Enthaler1, Martin Roehder1
25 May 2013
TL;DR: In this paper, a motor vehicle has a control device that is designed to change over an operating state of an extravehicular computer system for office applications between an active state, in which the computer system executes at least one piece of office application software, and a passive state, where the system is deactivated.
Abstract: A motor vehicle has a control device that is designed to change over an operating state of an extravehicular computer system for office applications between an active state, in which the computer system executes at least one piece of office application software, and a passive state, in which the computer system is deactivated.

Journal Article
TL;DR: This research paper has designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving.
Abstract:  Abstract— Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can't access your file or data in cloud. We have designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving. In this research paper, we have used the Rijndael Encryption Algorithm along with EAP-CHAP.

Patent
03 Apr 2013
TL;DR: In this article, an enterprise information system based on cloud computing is described, where the system comprises a physical layer, a system layer, an application layer and a service layer, wherein the physical layer is used for providing infrastructural services for the system layer and the application layer, virtualizing physical hardware resources and providing a uniform physical resource pool.
Abstract: The invention relates to the technical field of information, and in particular relates to an enterprise information system based on cloud computing. The system comprises a physical layer, a system layer, an application layer and a service layer, wherein the physical layer is used for providing infrastructural services for the system layer, the application layer and the service layer, virtualizing physical hardware resources and providing a uniform physical resource pool, and the physical resource pool comprises computing resources, storage resources, network resources and security resources; the system layer is positioned above the physical layer and used for providing system environment services for the application layer and the service layer; the application layer is positioned above the system layer and used for providing a uniform application resource pool and delivering services to provide application environment services, and the application environment services comprise distribution and management of application software, management of application data and configuration of application resources; and the service layer is positioned above the system layer and the application layer and used for providing service resource services and providing a uniform service application pool for enterprise service application according to a service logic.

Journal ArticleDOI
TL;DR: The proposed QoS model consists of 6 criteria; Functionality, Reliability, Usability, Efficiency, Maintainability and Business, and a Multi Criteria Decision Making (MCDM) system that finds the best fit for the SaaS ERP in the cloud computing environment and makes recommendations to users in priority order is proposed.
Abstract: Cloud computing delivers almost all of its services including software, user's data, system resources, processes and their computation over the Internet. Cloud computing consists of three main classes; Software as a Service, Infrastructure as a Service and Platform as a Service. Using Software as a Service (SaaS), users are able to rent application software and databases which they then install onto their computer in the traditional way. In the Enterprise Resource Planning (ERP) system, the system service environment changed so as to allow the application of the SaaS in the cloud computing environment. This change was implemented in order to provide the ERP system service to users in a cheaper, more convenient and efficient form through the Internet as opposed to having to set up their own computer. Recently many SaaS ERP packages are available on the Internet. For this reason, it is very difficult for users to find the SaaS ERP package that would best suit their requirements. The QoS (Quality of Service) model can provide a solution to this problem. However, according to recent research, not only quality attributes' identification for SaaS ERP, but also a process for finding and recommending software in the cloud computing environment, has proved to be lacking. In this paper, we propose a QoS model for SaaS ERP. The proposed QoS model consists of 6 criteria; Functionality, Reliability, Usability, Efficiency, Maintainability and Business. Using this QoS model, we propose a Multi Criteria Decision Making (MCDM) system that finds the best fit for the SaaS ERP in the cloud computing environment and makes recommendations to users in priority order. In order to organize the quality clusters, we organized an expert group and got their opinion to organize the quality clusters using Social Network Group. Social Networks can be used efficiently to get opinion by various types of expert groups. In order to establish the priority, we used pairwise comparisons to calculate the priority weights of each quality attribute while accounting for their interrelation. Finally, using the quality network model and priority weights, this study evaluated three types of SaaS ERPs. Our results show how to find the most suitable SaaS ERPs according to their correlation with the criteria and to recommend a SaaS ERP package which best suits users' needs.

Patent
17 Apr 2013
TL;DR: In this paper, a software performance optimization method based on a CPU multi-core platform is presented, which is widely applicable to application occasions with multi-thread parallel processing requirements, software developers are guided to perform multithread parallel optimization improvement on prior software rapidly and efficiently with short developing periods and low developing costs.
Abstract: The invention provides a software performance optimization method based on a CPU multi-core platform. The method comprises software characteristic analysis, parallel optimization scheme formulation and parallel optimization scheme implementation and iteration tuning. Particularly, the method comprises application software characteristic analysis, serial algorithm analysis, CPU multi-in/thread parallel algorithm design, multi-buffer design, design of communication modes among threads, memory access optimization, cache optimization, processor vectorization optimization, mathematical function library optimization and the like. The method is widely applicable to application occasions with multi-thread parallel processing requirements, software developers are guided to perform multi-thread parallel optimization improvement on prior software rapidly and efficiently with short developing periods and low developing costs, the utilization of system resources by software is optimized, data reading and computing and mutual masking of write-back data are achieved, the software running time is shortened furthest, the hardware resource utilization rate is improved apparently, and the software computing efficiency and the software whole performance are enhanced.

Patent
12 Nov 2013
Abstract: A software application for monitoring the performance of other software applications on mobile devices using efficient crowd sourced data and efficient proxies for performance of the applications.

Journal ArticleDOI
TL;DR: This paper proposes a new method based on the user-level virtualization technology to decouple application software from VM to improve the deployment flexibility and test results show that this solution can be efficient in performance and storage.

Proceedings ArticleDOI
13 Oct 2013
TL;DR: An investigative approach to indicators of software aging in applications developed for Android, a Linux-based operating system primarily designed for touch screen mobile devices such as smartphones and tablets, confirmed both the effectiveness of the procedure and the existence ofSoftware aging phenomenon in the Foursquare application running on the Android OS platform.
Abstract: This paper proposes an investigative approach to indicators of software aging in applications developed for Android, a Linux-based operating system primarily designed for touch screen mobile devices such as smartphones and tablets. Software aging is a degrading factor in systems, leading to poor performance, failures, and may ultimately result in system downtime. The methodology proposed identifies memory leaking in Android applications. In order to test the approach, case studies were performed with the Monkey tool as workload generator, employing Linux utilities to monitor the environment. Communication between the computer and the smartphone was handled with the ADB tool, a toolkit included in the Android SDK package. Experimental results confirmed both the effectiveness of the procedure and the existence of software aging phenomenon in the Foursquare application running on the Android OS platform.

01 Jan 2013
TL;DR: Arvue is presented, a browser-based tool that enables simple development and publishing of web applications that can be published to the cloud and stored in a version control system provided by Arvue.
Abstract: While the popularity of web applications is growing, most of the software is still developed using desktop tools. Nevertheless, a browser-based development environment could offer a multitude of advantages. For example, only an up-to-date web browser is needed and therefore the user has no need to carry out complex tool installation and update procedures. Furthermore, publishing the applications to the web is easy to offer as a feature of IDE, and since the users are already connected via server, collaborative features are easier to implement. For beginning business, effortless publishing offers new possibilities. In this paper, we present Arvue, a browser-based tool that enables simple development and publishing of web applications. Arvue applications are created on the browser using an UI designer and an integrated code editor. The applications are stored in a version control system provided by Arvue and they can easily be published to the cloud. Publishing the user-created applications may impose resource usage and security issues, which are also addressed in this paper.

Patent
15 Mar 2013
TL;DR: In this paper, a graphical user interface (GUI) for a unified software update display center is provided, which includes a first display area for displaying a set of available security system software updates.
Abstract: A graphical user interface (GUI) for a unified software update display center is provided. The GUI includes a first display area for displaying a set of available security system software updates. The GUI includes a second display area for displaying a set of available non-security system software updates. The GUI includes a third display area for displaying a set of available application software updates. The GUI includes a single selection tool for installing all available security updates without installing any updates displayed in the second and third display areas. The GUI includes individual selection tools for installing individual updates displayed in the second and third display areas. The GUI includes a selection tool to receive further updates from a system update server and an application update server. The critical security updates are displayed with different display attributes or in different sections to distinguish them from other types of updates.

Patent
25 Feb 2013
TL;DR: In this article, an apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developers.
Abstract: An apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developer, and an integrity verification unit configured to verify whether the mobile app has the integrity by unpackaging the mobile app uploaded to an app store server in a packaged state and determine whether to write a code signature of the app store server to the mobile app based on an integrity verification result. Thus, a secure mobile ecosystem can be constructed.

Patent
13 Feb 2013
TL;DR: In this paper, a five-star hotel management system which covers each department of hole management, absorbs essence of foreign famous hotel management systems, combines with domestic management characteristics, provides various integrated information and detailed information, helps to manage, supervise and assist general operation of hotels, and not only embodies a strict control principle, but also satisfies with demands of flexible management of each hotel.
Abstract: The invention discloses a five-star hotel management system which covers each department of hole management, absorbs essence of foreign famous hotel management systems, combines with domestic management characteristics, provides various integrated information and detailed information, helps to manage, supervise and assist general operation of hotels, and not only embodies a strict control principle, but also satisfies with demands of flexible management of each hotel. The development of the system completely adopts development tools of Microsoft company, so that the five-star hotel management system is well compatible with the WINDOWS operating system of Microsoft; hardware environment adopts a client/server (C/S) system structure; a network operating system adopts WINDOWSXP; a database adopts SQLSERVER large-scale data; a client adopts a WINDOWS98/2000/XP operating system; an application system adopts a C/S three-tier architecture design idea; a front end adopts a VB (Visual Basic) development tool of Microsoft which has abundant controls and uses a plenty of WINDOWSAPI functions, so that Visual Basic of the information in the hotel management is embodied fully; through three-level user authority control of a network operating system, a database system and a front-end application system, good safety and good reliability of the system are realized; and the application software of the system is named wyq-jdglxt.

Patent
11 Jun 2013
TL;DR: In this paper, the authors describe a technique for remote application access via a web browser of a client device, where a user operating the web browser may request access to the application via a uniform resource identifier.
Abstract: Techniques for remote application access are described. Some embodiments provide access to an application executing on a host system via a Web browser of a client device. A user operating the Web browser may request access to the application via a uniform resource identifier. A service executing on the host system receives the request and facilitates access to the application. Facilitating access may include transmitting to the Web browser image data corresponding to a window or graphical user interface generated by the application and stored on the host system. Client logic executing within the Web browser receives the image data and displays a local copy of the application window on the client device. The client logic also forwards user input events made with respect to the to the local window to the remote presentation service, which in turn forwards the events to the window/application on the host system.

Patent
Erik Kay1, Aaron Boodman1, Adam Barth1
04 Jun 2013
TL;DR: In this paper, a browser application programming interface is exposed to a web application to verify an identify of a user using user-specific identity information stored by the browser, which is transmitted from the browser programming interface to the web application.
Abstract: A browser application programming interface is exposed to a web application to verify an identify of a user using user-specific identity information stored by the browser. Cryptographic information associated with the user is transmitted from the browser application programming interface to the web application. User-specific content is provided to the user through the web application if the web application verifies an identify of the user via the browser application programming interface using the cryptographic information.

Proceedings ArticleDOI
28 Jun 2013
TL;DR: A Rtisy, a platform to further simplify web application development by using pre-built communication widgets for common use cases such as phone call, conferencing, call distribution and video publish or play is presented.
Abstract: We describe a resource-based architecture to quickly and easily build communicating web applications. Resources are structured and hierarchical data stored in the server but accessed by the endpoint via the application logic running in the browser. The architecture enables deployments that are fully cloud based, fully on-premise or hybrid of the two. Unlike a single web application controlling the user's social data, this model allows any application to access the authenticated user's resources for application mash-ups, e.g., user contacts created by one application are used by another on permission from the user instead of the first application. We present a Rtisy, a platform to further simplify web application development by using pre-built communication widgets for common use cases such as phone call, conferencing, call distribution and video publish or play. The architecture extends beyond web to native applications and reduces the barrier between web and non-web applications for communication. Our resource access protocol acts as a generic signaling mechanism for the emerging WebRTC (Web Real-Time Communications). We have implemented several applications completely in HTML5 running in the browser using this resource-based architecture.

Patent
11 Sep 2013
TL;DR: In this article, a method for testing high-performance computing cluster application performance is presented, which comprises a first step of establishing a system environment, a second step of testing a system, a third step of preparing the application programs and a fourth step of test application.
Abstract: The invention provides a method for testing high-performance computing cluster application performance. The method for detecting application programs comprises a first step of establishing a system environment, a second step of testing a system, a third step of preparing the application programs and a fourth step of testing application. The step of establishing the system is to choose an appropriate hardware platform, a file system, schedule job, an applicable CPU internal storage, discs, a network and the number of nodes to be tested, and to deploy an operation system and a complier based on the hardware. The step of testing the system is to carry out system LINPACK and STREAM, to read and write the discs and to test network bandwidth. The step of preparing the application programs is mainly to determine versions of run programs and a diffset scale. The step of testing the application is to carry out basic tests, determine run time, grasp basic performance data and acquire basic data, to carry out application analysis, feature analysis and program optimization and to extract features of software. The method for testing the high-performance computing cluster application performance is simple, practical, reliable and efficient. By means of the method, the performance state of a set of HPC systems can be tested very quickly, and the features of the application software can be fast acquired.

Patent
04 Sep 2013
TL;DR: In this article, a method of entering application programs based on fingerprint identification is proposed, which includes a detection step: when a mobile terminal is detected to be connected with a computer, prompting a user to input fingerprint information to obtain user privileges, a fingerprint obtaining step; a fingerprint verification step; an application program loading step; when the verification is passed, starting an application software interface in the mobile terminal, and displaying on the computer.
Abstract: The invention relates to a method of entering application programs based on fingerprint identification. The method includes a detection step: when a mobile terminal is detected to be connected with a computer, prompting a user to input fingerprint information to obtain user privileges; a fingerprint obtaining step; a fingerprint verification step; an application program loading step; when the verification is passed, starting an application software interface in the mobile terminal, and displaying on the computer; meanwhile, reading data information in the mobile terminal to allow icons corresponding to the application programs to load in the software interface; an application starting step; and when the user selects an icon corresponding to an optional application program, taking an account number and passwords corresponding to the icon, and logging in a corresponding application program through the computer automatically. Correspondingly, the invention provides a system. By the aid of the method and the system of entering application programs based on the fingerprint identification, the account number and passwords corresponding to each application program can be stored safely for the user, the account number and passwords can be prevented from being confused in memory, forgotten, leaked or stolen, and confidentiality is high.

Patent
08 Mar 2013
TL;DR: In this paper, a system and a method are disclosed for receiving a request to create a mobile application, the request comprising providerspecific application information and provider-specific content for the mobile application.
Abstract: A system and a method are disclosed for receiving a request to create a mobile application, the request comprising provider-specific application information and provider-specific content for the mobile application, generating, by a processing device, an application description based on the provider-specific application information, wherein the application description comprises a selection of one or more application features for the mobile application, retrieving, by the processing device, a base mobile application stored in a data store, wherein the base mobile application comprises previously generated base application software code, modifying, by the processing device, the base mobile application in view of the application description; and generating, by the processing device, binary mobile application code for the mobile application in view of the modified base mobile application.

Journal ArticleDOI
TL;DR: A personalized recommendation system for mobile application software (app) to mobile user using semantic relations of apps consumed by users using Ontology, which shows the feasibility of the algorithm can be practical in the real field and useful to analyze the preference of mobile user.
Abstract: In this paper, we propose a personalized recommendation system for mobile application software (app) to mobile user using semantic relations of apps consumed by users. To do that, we define semantic relations between apps consumed by a specific member and his/her social members using Ontology. Based on the relations, we identify the most similar social members from the reasoning process. The reasoning is explored from measuring the common attributes between apps consumed by the target member and his/her social members. The more attributes shared by them, the more similar is their preference for consuming apps. We also develop a prototype of our system using OWL (Ontology Web Language) by defining ontology-based semantic relations among 50 mobile apps. Using the prototype, we showed the feasibility of our algorithm that our recommendation algorithm can be practical in the real field and useful to analyze the preference of mobile user.