Academic literature on the topic 'Home office computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Home office computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Home office computing"

1

Ibbs, William, Benjamin Baker, and Fiona Burckhardt. "Process Model for Identifying and Computing Allowable Home Office Overhead Cost Claims." Journal of Legal Affairs and Dispute Resolution in Engineering and Construction 7, no. 3 (August 2015): 04514007. http://dx.doi.org/10.1061/(asce)la.1943-4170.0000164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cameron, David, Vincent Garonne, Paul Millar, Shaojun Sun, and Wenjing Wu. "Adapting ATLAS@Home to trusted and semi-trusted resources." EPJ Web of Conferences 245 (2020): 03027. http://dx.doi.org/10.1051/epjconf/202024503027.

Full text
Abstract:
ATLAS@Home is a volunteer computing project which enables members of the public to contribute computing power to run simulations of the ATLAS experiment at CERN’s Large Hadron Collider. The computing resources provided to ATLAS@Home increasingly come not only from traditional volunteers, but also from data centres or office computers at institutes associated to ATLAS. The design of ATLAS@Home was built around not giving out sensitive credentials to volunteers, which means that a sandbox is needed to bridge data transfers between trusted and untrusted domains. As the scale of ATLAS@Home increases, this sandbox becomes a potential data management bottleneck. This paper explores solutions to this problem based on relaxing the constraints of sending credentials to trusted volunteers, allowing direct data transfer to grid storage and avoiding the intermediate sandbox. Fully trusted resources such as grid worker nodes can run with full access to grid storage, whereas semi-trusted resources such as student desktops can be provided with “macaroons”: time-limited access tokens which can only be used for specific files. The steps towards implementing these solutions as well as initial results with real ATLAS simulation tasks are discussed along with the experience gained so far and the next steps in the project.
APA, Harvard, Vancouver, ISO, and other styles
3

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Full text
Abstract:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can be made use to secure application built on the Ubiquitous Computing Environment (UCE) such as health care, smart office, smart ubiquitous home, etc.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Shobhita. "IoT: A Mainstay Towards Intelligent Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3192–96. http://dx.doi.org/10.17762/turcomat.v12i3.1561.

Full text
Abstract:
After the .com boom, the next big thing in the 21st century is the “Internet of Things”. The “Internet of Things” is exploding and infusing intelligence globally. From infinitesimal chips to mammoth machineries, billions of smart gadgets communicate with each other with the aid of wireless devices. The day is not far when every physical item will no longer remain disconnected from the virtual world. Presently, your coffee kettle starts automatically when you wake up in the morning and lights go off when you leave home for your office where all devices are controlled/activated through your voice. Dream becomes reality, when the whole world will be running automatically and virtually with the initiation of a command. Connecting ‘Internet of Things’ with ‘Artificial Intelligence’, high-tech and scientific technologies will transform the world into a completely digital world. These two powerful pillars will build super-intelligent e-devices that are ready for new challenges. It will be made possible by evolving IP strategies, Radio Frequency Identification (RFID), embedded sensors, actuators that are intelligently connected in machines and other physical objects. This paper aims to provide an insight into how the third wave of information technology i.e. Internet of Things (IoT) will interconnect the physical world using artificial intelligence. The paper will further discuss the building blocks of the IoT and the perspective areas where it can be implemented smartly.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhardwaj, Akashdeep, and Sam Goundar. "Designing a Framework for Cloud Service Agreement for Cloud Environments." International Journal of Cloud Applications and Computing 6, no. 4 (October 2016): 83–96. http://dx.doi.org/10.4018/ijcac.2016100105.

Full text
Abstract:
Cloud Computing has emerged as the prime IT computing model for an on-demand access using a pool of shared resources with least IT support. Cloud computing is starting to replace the legacy office IT infrastructure and helpdesk support system. Corporate and home users alike are turning into cloud service consumers in a huge way and moving their data and work to the cloud. Therefore, the CSA between the cloud service consumers and cloud service providers has critical significance that can guarantee the highest-level service quality and delivery. The current CSA fall short on the service delivery commitments with no common terminology or standard followed industry wide by the cloud service providers. Comparing agreements from multiple cloud service providers continues to be an issue. This paper provides a pragmatic approach for Cloud Service Agreements, comparing the current process with the proposed parameters and the new framework for CSA to determine the role of various elements and terms in the decision-making process for cloud service agreements for SaaS, PaaS, IaaS and STaaS.
APA, Harvard, Vancouver, ISO, and other styles
6

Tanishka and Prof. Shikha Gupta. "Designing Smart Home (IOT) Using Cisco Packet Tracer 7.2 Simulator." International Journal for Modern Trends in Science and Technology 6, no. 12 (December 13, 2020): 208–16. http://dx.doi.org/10.46501/ijmtst061240.

Full text
Abstract:
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Internet of Things (IoT) is rapidly gaining momentum in the scenario of telecommunications. Conventional networks allow for interactivity and data exchange, but these networks have not been designed for the new features and functions of IoT devices. In this paper, an algorithm is proposed to share common recourse among Things, that is, between different types of smart appliances. . Purpose is to analyze deeper the cases separating the network and IoT layout, giving a deeper explanation of the purpose of the simulations, presenting all the information needed to utilize the exercises but also giving suggestion how to expand the exercises further. This implementation can be implemented effectively using package tracking software that includes IoT functions to control and simulate a smart home. IoT technology can be applied to many real life issues, such as: homework, treatment, campus, office, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Lakehal, Abderrahim, Adel Alti, and Philippe Roose. "Context-Aware Multi-layered Ontology for Composite Situation Model in Pervasive Computing." Ingénierie des systèmes d information 25, no. 5 (November 10, 2020): 543–58. http://dx.doi.org/10.18280/isi.250501.

Full text
Abstract:
With the rapid advancement of technologies and analysis tools in the smart systems, enabling real-time context monitoring of user's living conditions and quality services delivery is increasing. Current studies in this area are focused on developing mobile applications with specific services, based on toolkit that allow developers to obtain context information from sensors. However, there exists a notable lack of ontology able to represent all the necessary context information starting from distributed users, and constantly changing environment. The modeling of user’s domains to represent diverse mobile and IoT devices, and finalizing with the description of user’s composite situations in smart-*(health, home, cities, car, office, etc.) domains. Considering interoperability, reusability, and flexibility, a new context composite situation ontology for smart systems is proposed with better representation of heterogeneous context. The ontology enables to sense, reason, and infer composite situations in various smart domains, prioritizes critical situations and facilitates the delivery of smart mobile service. Proposed ontology is formalized and validated on different smart environments with different user’s situations. Several experiments were carried out with a real-life motivating scenario. Experimental results showed that the proposed approach has reduced queries times and improved flexibility.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiaoliang, Ke Xu, and Ziwei Li. "SmartFix: Indoor Locating Optimization Algorithm for Energy-Constrained Wearable Devices." Wireless Communications and Mobile Computing 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/8959356.

Full text
Abstract:
Indoor localization technology based on Wi-Fi has long been a hot research topic in the past decade. Despite numerous solutions, new challenges have arisen along with the trend of smart home and wearable computing. For example, power efficiency needs to be significantly improved for resource-constrained wearable devices, such as smart watch and wristband. For a Wi-Fi-based locating system, most of the energy consumption can be attributed to real-time radio scan; however, simply reducing radio data collection will cause a serious loss of locating accuracy because of unstable Wi-Fi signals. In this paper, we present SmartFix, an optimization algorithm for indoor locating based on Wi-Fi RSS. SmartFix utilizes user motion features, extracts characteristic value from history trajectory, and corrects deviation caused by unstable Wi-Fi signals. We implemented a prototype of SmartFix both on Moto 360 2nd-generation Smartwatch and on HTC One Smartphone. We conducted experiments both in a large open area and in an office hall. Experiment results demonstrate that average locating error is less than 2 meters for more than 80% cases, and energy consumption is only 30% of Wi-Fi fingerprinting method under the same experiment circumstances.
APA, Harvard, Vancouver, ISO, and other styles
9

Novo, Deyse Neves, Gabriela Felizardo, João Filipe Lavorini Dos Santos, Leticia Guedes Capelletti Michelassi, and Jaime Cazuhiro Ossada. "PROCESSO DE GESTÃO E DESENVOLVIMENTO PARA MIGRAÇÃO EM SERVIÇO DE NUVEM." RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218 2, no. 8 (September 23, 2021): e28636. http://dx.doi.org/10.47820/recima21.v2i8.636.

Full text
Abstract:
Em decorrência da pandemia causada pelo vírus Sars-Cov-2, com foco na segurança da vida humana muitas organizações iniciaram a migração do fluxo de trabalho do presencial para o home office, assim, para encontrar soluções práticas, o gestor deve aplicar seu conhecimento em estratégias que visam atender as mudanças e os objetivos da empresa. Para muitas organizações, migrar o modelo de armazenamento local de seus softwares e converter um software estático para um modelo que se adaptasse à necessidade de não estar em instalações físicas foi a solução encontrada para alcançar inúmeras funcionalidades propiciando maior cuidado com o meio ambiente, amparado a práticas sustentáveis. Assim, este estudo observa o desenvolvimento e a mudança do software tradicional para o serviço em nuvem - Cloud Computing - que uma empresa desenvolvedora de programas começou a implantar em seu leque. Precedeu-se à observação da maneira como a empresa transformaria o software que comercializa para atender as novas exigências do mercado e da globalização. O estudo aponta para a importância da observação e cuidado do gestor em realizar uma análise tanto das necessidades dos clientes como da organização desenvolvedora. Prover informações condizentes com o novo desafio, clarificar o caminho de implementação de metodologias de processos e análise de riscos, facilita e fomenta a perspectiva de conquistar novas fatias do mercado que está em constante evolução.
APA, Harvard, Vancouver, ISO, and other styles
10

Zadeh, L. A. "Foreword." International Journal of Computers Communications & Control 6, no. 3 (September 1, 2011): 385. http://dx.doi.org/10.15837/ijccc.2011.3.2123.

Full text
Abstract:
<p>I feel honored by the dedication of the Special Issue of IJCCC to me. I should like to express my deep appreciation to the distinguished Co-Editors and my good friends, Professors Balas, Dzitac and Teodorescu, and to distinguished contributors, for honoring me. The subjects which are addressed in the Special Issue are on the frontiers of fuzzy logic.<br /> <br /> The Foreword gives me an opportunity to share with the readers of the Journal my recent thoughts regarding a subject which I have been pondering about for many years - fuzzy logic and natural languages. The first step toward linking fuzzy logic and natural languages was my 1973 paper," Outline of a New Approach to the Analysis of Complex Systems and Decision Processes." Two key concepts were introduced in that paper. First, the concept of a linguistic variable - a variable which takes words as values; and second, the concept of a fuzzy if- then rule - a rule in which the antecedent and consequent involve linguistic variables. Today, close to forty years later, these concepts are widely used in most applications of fuzzy logic.<br /> <br /> The second step was my 1978 paper, "PRUF - a Meaning Representation Language for Natural Languages." This paper laid the foundation for a series of papers in the eighties in which a fairly complete theory of fuzzy - logic-based semantics of natural languages was developed. My theory did not attract many followers either within the fuzzy logic community or within the linguistics and philosophy of languages communities. There is a reason. The fuzzy logic community is largely a community of engineers, computer scientists and mathematicians - a community which has always shied away from semantics of natural languages. Symmetrically, the linguistics and philosophy of languages communities have shied away from fuzzy logic.<br /> <br /> In the early nineties, a thought that began to crystallize in my mind was that in most of the applications of fuzzy logic linguistic concepts play an important, if not very visible role. It is this thought that motivated the concept of Computing with Words (CW or CWW), introduced in my 1996 paper "Fuzzy Logic = Computing with Words." In essence, Computing with Words is a system of computation in which the objects of computation are words, phrases and propositions drawn from a natural language. The same can be said about Natural Language Processing (NLP.) In fact, CW and NLP have little in common and have altogether different agendas.<br /> <br /> In large measure, CW is concerned with solution of computational problems which are stated in a natural language. Simple example. Given: Probably John is tall. What is the probability that John is short? What is the probability that John is very short? What is the probability that John is not very tall? A less simple example. Given: Usually Robert leaves office at about 5 pm. Typically it takes Robert about an hour to get home from work. What is the probability that Robert is home at 6:l5 pm.? What should be noted is that CW is the only system of computation which has the capability to deal with problems of this kind. The problem-solving capability of CW rests on two key ideas. First, employment of so-called restriction-based semantics (RS) for translation of a natural language into a mathematical language in which the concept of a restriction plays a pivotal role; and second, employment of a calculus of restrictions - a calculus which is centered on the Extension Principle of fuzzy logic.<br /> <br /> What is thought-provoking is that neither traditional mathematics nor standard probability theory has the capability to deal with computational problems which are stated in a natural language. Not having this capability, it is traditional to dismiss such problems as ill-posed. In this perspective, perhaps the most remarkable contribution of CW is that it opens the door to empowering of mathematics with a fascinating capability - the capability to construct mathematical solutions of computational problems which are stated in a natural language. The basic importance of this capability derives from the fact that much of human knowledge, and especially world knowledge, is described in natural language.<br /> <br /> In conclusion, only recently did I begin to realize that the formalism of CW suggests a new and challenging direction in mathematics - mathematical solution of computational problems which are stated in a natural language. For mathematics, this is an unexplored territory.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Home office computing"

1

Morgenstern, Steve. No-sweat desktop publishing: A guide from Home office computing magazine. New York: American Management Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer power for your small business: A guide from Home office computing magazine. New York, NY: American Management Association, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

TechRepublic. Home Office Computing Survival Guide. TechRepublic, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The Home office computing handbook. New York: Windcrest/McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

TechRepublic. Home Office Computing Survival Guide. TechRepublic, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sullivan, Nick. Computer Power for Your Small Business: A Guide from Home Office Computing Magazine. Amacom Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Magazine, Home Office Computing. Win New Clients and Grow Your Business With Desktop Marketing (Home Office Computing Magazine Library). Random House Electronic Pub, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1968-, Frye Curtis, and Online Training Solutions (Firm), eds. Microsoft Office system step by step. 2nd ed. Redmond, WA: Microsoft Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1968-, Frye Curtis, Crupi Kristen, Perspection Inc, Online Training Solutions (Firm), and Microsoft Corporation, eds. Microsoft Office XP step by step. Redmond, Wash: Microsoft Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frye, Curtis, Perspection Inc, Online Training Solutions Inc, and Kristen Crupi. Microsoft Office XP Step-By-Step (With CD-ROM). Microsoft Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Home office computing"

1

Sadler, Charles R. "Orthopedic Computing: Bone and Joint Computer Connection." In Buying Equipment and Programs for Home or Office, 167–76. New York, NY: Springer New York, 1987. http://dx.doi.org/10.1007/978-1-4612-4708-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mocanu, Andrei. "An Argumentative Approach to Smart Home Office Ambient Lighting." In Intelligent Distributed Computing XI, 225–34. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66379-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Honda, Shinkuro, Ken-ichi Okada, and Yutaka Matsushita. "A home office system based on a virtual shared room: An environment corresponding to degree of concentration." In Worldwide Computing and Its Applications — WWCA'98, 364–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-64216-1_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Calmant, Thomas, João Claudio Américo, Didier Donsez, and Olivier Gattaz. "A Dynamic SCA-Based System for Smart Homes and Offices." In Service-Oriented Computing - ICSOC 2012 Workshops, 435–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37804-1_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Von ›Family Computing‹ zu ›Home Office Computing‹." In Wie Computer heimisch wurden, 179–92. transcript-Verlag, 2019. http://dx.doi.org/10.14361/9783839445310-011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clark, C. "End User Computing Ergonomics." In End-User Computing, 2274–83. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch131.

Full text
Abstract:
Until recent years, the end user computing ergonomic focus has primarily been on stationary computer use. A new trend for the end user is mobile computing. An increasing number of end users are working outside of the traditional office. Mobile computing devices allow for these workers to perform job functions while in the field, at home, or while traveling. The organizational and end user benefits abound for the use of such enabling technology. However, the mobile computing environment introduces a new area of ergonomic concerns. Are businesses and end users monitoring the use of these devices from an ergonomic perspective? The good news is the outcome can be influenced and/or determined with intentional efforts on the part of both end users and managers. This paper includes an in depth review of the current and emerging issues, especially the mobile end user environment, that is important to the end user, manager, and organization as a whole. It also provides end user ergonomic suggestions and resources and addresses the management challenges rising from ergonomic issues.
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Eric T. T., and Carrison K. S. Tong. "3G Mobile Medical Image Viewing." In Mobile Computing, 1261–71. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch105.

Full text
Abstract:
Teleradiology is the technology of remote medical consultation using X-ray, Computed Tomographic or Magnetic Resonance images. It was commonly accepted by clinicians for its effectiveness of making diagnosis for patients at critical situations. Since the huge size of data volume involved in teleradiology [American College of Radiology et al., 2003], clinicians are not satisfied with the relatively slow data transfer rate. It limits the technology to fixed-line communication between the doctor’s home and his office. In this project, a mobile high speed wireless medical image viewing system using 3G Wireless Network [Collins et al., 2001], Virtual Private Network and One-Time Two-Factor Authentication (OTTFA) technologies is presented. Using this system, teleradiology can be achieved by using a 3G PDA phone to query, retrieve and review the patient’s record at anytime and anywhere in a secure environment. Using this technology, the patient-data availability can be improved significantly, which is crucial to timely diagnosis of patients at critical situations.
APA, Harvard, Vancouver, ISO, and other styles
8

Lehmann, Hans, Ulrich Remus, and Stefan Berger. "Mobile Portals for Knowledge Management." In Mobile Computing, 188–96. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch017.

Full text
Abstract:
More and more people leave their fixed working environment in order to perform their knowledgeintensive tasks at changing locations or while they are on the move. Mobile knowledge workers are often separated from their colleagues, and they have no access to up-to-date knowledge they would have in their offices. Instead, they rely on faxes and messenger services to receive materials from their home bases (Schulte, 1999). In case of time-critical data, this way of communication with their home office is insufficient. Mobile knowledge management (KM) has been introduced to overcome some of the problems knowledge workers are faced when handling knowledge in a mobile work environment (e.g., Berger, 2004; Grimm, Tazari, & Balfanz, 2002,). The main goal of mKM is to provide mobile access to knowledge management systems (KMS) and other information resources, to generate awareness between mobile and stationary workers by linking them to each other, and to realize mobile KM services that support knowledge workers in dealing with their tasks (see chapter, “A Mobile Portal for Academe: The Example of a German University” in the same book). So far, most of the off-the-shelf KMS are intended for the use on stationary desktop PCs or laptops with stable network access, and provide just simple access from mobile devices. As KMS are generally handling a huge amount of information (e.g., documents in various formats, multimedia content, etc.) the limitations of (mobile) information and communication technologies (ICTs), like mobile devices such as PDAs and mobile phones, becomes even more crucial (Hansmann, Merk, Niklous, & Stober, 2001). Mobile devices are usually not equipped with the amount of memory and computational power found in desktop computers; they often provide small displays and limited input capabilities, in comparison to wired networks, wireless networks generally have a lower bandwidth restricting the transfer of large data volumes and due to fading, lost radio coverage, or deficient capacity, wireless networks are often inaccessible for periods of time. Today, many KMS are implemented as knowledge portals, providing a single point of access to many different information and knowledge sources on the desktop together with a bundle of KM services. In order to realize mobile access to knowledge portals, portal components have to be implemented as mobile portlets. That means that they have to be adapted according to technical restrictions of mobile devices and the user’s context. This contribution identifies requirements for mobile knowledge portals. In particular, it reviews the main characteristics of mobile knowledge portals, which are considered to be the main ICT to support mobile KM. In addition, it outlines an important future issue in mobile knowledge portals: The consideration of location-based information in mobile knowledge portals.
APA, Harvard, Vancouver, ISO, and other styles
9

Maamar, Zakaria, and Qusay H. Mahmoud. "Design Methodology for Mobile Information Systems." In Mobile Computing, 451–58. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch038.

Full text
Abstract:
Mobile information systems (MISs) are having a major impact on businesses and individuals. No longer confined to the office or home, people can use devices that they carry with them, along with wireless communication networks, to access the systems and data that they need. In many cases MISs do not just replace traditional wired information systems or even provide similar functionality. Instead, they are planned, designed, and implemented with the unique characteristics of wireless communication and mobile client use in mind. These unique characteristics feature the need for specific design and development methodologies for MISs. Design methods allow considering systems independently of the existing information technologies, and thus enable the development of lasting solutions. Among the characteristics that a MIS design method needs to consider, we cite: unrestricted mobility of persons, scarcity of mobile devices’ power-source, and frequent disconnections of these devices. The field of MISs is the result of the convergence of high-speed wireless networks and personal mobile devices. The aim of MISs is to provide the ability to compute, communicate, and collaborate anywhere, anytime. Wireless technologies for communication are the link between mobile clients and other system components. Mobile client devices include various types, for example, mobile phones, personal digital assistants, and laptops. Samples of MIS applications are mobile commerce (Andreou et al., 2002), inventory systems in which stock clerks use special-purpose mobile devices to check inventory, police systems that allow officers to access criminal databases from laptops in their patrol cars, and tracking information systems with which truck drivers can check information on their loads, destinations, and revenues using mobile phones. MISs can be used in different domains and target different categories of people. In this article, we report on the rationale of having a method for designing and developing mobile information systems. This method includes a conceptual model, a set of requirements, and different steps for developing the system. The development of a method for MISs is an appropriate response to the need of professionals in the field of MISs. Indeed, this need is motivated by the increased demand that is emerging from multiple bodies: wireless service providers, wireless equipment manufacturers, companies developing applications over wireless systems, and businesses for which MISs are offered. Besides all these bodies, high-speed wireless data services are emerging (e.g., GPRS, UMTS), requiring some sort of new expertise. A design and development method for MISs should support professionals in their work.
APA, Harvard, Vancouver, ISO, and other styles
10

Michael, Arnold. "Appropriations." In Digital Domesticity, 86–126. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190905781.003.0004.

Full text
Abstract:
This chapter considers how media landscapes in the home have shifted over this century and examines how devices relate to each other and to householders to create dynamic and evolving media ecologies. At the turn of this century, a typical domestic media ecology comprised a cathode-ray television in the living room, perhaps connected to a videocassette recorder; a desktop computer in a home office, perhaps connected to a dial-up modem; and a landline telephone, often located in a communal area in the home. More recently, the home has become a place for high-definition “smart” televisions, intelligent multifunction set-top boxes, game consoles, digital radio, high-speed broadband, cabled and wireless home networks, mobile computing, cloud connections, online government service provision, gesture-controlled games, and much more. How and why have these technologies been appropriated? How has this ongoing appropriation reconfigured the domestic media ecology and the life that is lived within this ecology?
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Home office computing"

1

Tsipenyuk, Gregory, and Jon Crowcroft. "My home is my post-office." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3018918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dogru, Nejdet, Emir Salihagic, Mehrija Hasicic, Jasmin Kevric, and Jasna Hivziefendic. "Nonintrusive Real Time Classification of Home and Office Appliances from Smart Meter by Using Machine Learning Techniques." In 2019 8th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2019. http://dx.doi.org/10.1109/meco.2019.8760094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Abhishek, Palvadi Srinivas Kumar, and Rashmi Agarwal. "A Face Recognition Method in the IoT for Security Appliances in Smart Homes, offices and Cities." In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2019. http://dx.doi.org/10.1109/iccmc.2019.8819790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography