Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Salmre I. — Writing mobile code essential software engineering for building mobile applications
Salmre I. — Writing mobile code essential software engineering for building mobile applications



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Writing mobile code essential software engineering for building mobile applications

Автор: Salmre I.

Аннотация:

Mobile computing devices have evolved from fixed-purpose communications tools to compelling and extensible mass-market computing platforms. Now, they stand poised to offer truly ubiquitous and mobile computingand to revolutionize the way people work, communicate, and interact with the world around them. Writing Mobile Code is the first definitive guide to writing applications for the new generation of mobile devices. In this accessible, hands-on reference, readers will find the principles and methods of great mobile software design and real-world examples to support them. While the many examples use the .NET Compact Framework, C#, and Visual Basic .NET, the design and engineering concepts Salmre discusses apply to all mobile-computing technologies and platforms.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 792

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
.bmp files      
.gif files      
.JPG/.JPEG files      
.Net Compact Framework      
.NET Compact Framework allowing access to underlying      
.NET Compact Framework as replacement for      
.NET Framework      
.png files      
//www.m-w.com/cgi-bin/dictionary?book=Dictionary&va=stand
2.5g networks      
3g networks      
aalgorithm level memory      
absolute performance of critical      
abstraction levels      
abstraction, working at highest level of      2nd
accessing      2nd
ActiveSync      
additional threads on need only basis      
ADO      
ADO compared      
ADO.NET      
ADO.NET compared      
algorithm level memory      
algorithm metrics      
Algorithms      
algorithms, absolute performance of critical      
analysis of      2nd 3rd
API abstraction      
Apis      
APIs and      
application development      
application level memory      
applications      
Architecture      2nd
ASP.NET      2nd
automated testing      
Availability      
availibility      
avoiding      
background processing state machines      2nd 3rd 4th
background thread      
background thread pools      
background threads      
bad experience      
base class libraries      
batch computing      
batch-based approach      
batch-based approach to caching resources      
batched creation of grouped resources      
BBC      
Best practices      
Beyond 3G networks      
binary compatibility      
binary storage formats      
bitmap data      
bitmap formats      
bitmap images      
bitmap images displayed in      2nd 3rd 4th
bitmap images displayed in PictureBox      2nd 3rd 4th
bitmap objects      
bitmap sizes      
Bluetooth      2nd
browser cookie support      2nd 3rd 4th 5th
building strings efficiently      2nd 3rd
built-in performance features      2nd 3rd 4th 5th 6th
business model control as reason for      
button size      2nd
C++ development tools      
C++ support      
Caching      
caching resources      
calling from mobile device      2nd 3rd 4th
case sensitivity      
CDMA mobile technology      
CEDB (Windows CE Database)      
CEMAPI      
challenges when using      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
characteristics of mobile applications      
choosing      2nd
clarity of purpose      
class libraries      
client-side code, communications failure simulated by      2nd 3rd
closed system computing      
code design      
code for      2nd 3rd
code instrumentation      
code reviews      2nd
coding for mobile networking      
collection-based approach      
collection-based approach to caching resources      
comma-delimited file, storing data as      
communication dependent application      2nd 3rd
communication dependent applications      2nd 3rd
communications management      
communications model      
communications model and      
components      
Compression      
computation inefficiencies      
condensed view of large amount of dynamic data      2nd 3rd 4th 5th
connectionless for long periods of time, need to be      
Connectivity      
connectivity models      
connectivity models, testing with real world      
consisten click-through      
consistency of experience      
consistent click-through      
constant part of our daily lives, mobile devices as      2nd
context switch      
cooperative computing      
cooperative computing with network at large      
cooperative computing with operating system      
cooperative computing with other applications running on device      
copy and run installation      
core execution engine      
corpsales@pearsontechgroup.com      
cradle/PC cable communications      2nd
Creating      2nd
creating API      
critical functions, protection levels to guard      
cross-platform compatibility      
crowded and noisy spaces, ability to be used in      
Cryptography      
custom control implementation      2nd 3rd 4th 5th
custom controls      2nd 3rd 4th 5th 6th
custom data management      2nd 3rd 4th 5th 6th 7th
custom data model      
custom logic      
data access libraries      
data access model      
data and memory management      
data connectors      2nd
Data entry      
data entry, optimization for common      
data format      
data libraries      2nd
Data model      
data model and      
data searches on mobile device, avoiding complex      
data sizes      
data sizes, testing with real      2nd
data sizes, testing with real world      
data stored as      2nd 3rd 4th 5th
Data transfer      
data transfer rates      
data transformations on mobile device, avoiding complex      
data transmission rates and latencies, variability of      
DataAdapter classes      2nd
Datasets      
debugging information      
deferred loading, caching, and releasing      2nd
deferring work      
Defining      
Deployment      
design and debugging information factored into optional components      2nd
design and debugging information factored into optional components in .NET Compact Framework      2nd
design of      
desktop application      
desktop code, size of      
Desktop Software      
desktop subset      
desktop-driven installation      
details mode      
developer tool-based installation      
development milestones with performance-driven exit criteria, using      2nd 3rd
device applications that interact with desktop or server applications      
device-driven installation      
devices, matching controls to      
disciplined approach      
displayed in PictureBox      2nd 3rd 4th
dispose() method      2nd
Documentation      
download and run installation      
download size      
drawing/forms libraries      
dynamic creation of controls      2nd 3rd 4th 5th
dynamic data, condensed view of large amount of      2nd 3rd 4th 5th
dynamic deployment of runtime      2nd
dynamic deployment of runtimes to mobile devices      2nd
dynamic installation of needed      
dynamic installation of needed application components      
Edison, Thomas      
elements displayed in application, testing with actual number of      
embedded images      2nd 3rd 4th 5th
emulators and physical device testing      2nd
end-user responsiveness      
eVC++      
event handlers      
event-driven code      2nd 3rd
event-driven interactive computing      
example      2nd 3rd
example code showing two different layout models for same application      2nd 3rd
example comparing equivalent algorithms that do and do not throw exceptions      2nd 3rd 4th 5th
example using      2nd 3rd 4th 5th
examples      
examples showing different levels of user responsiveness      2nd 3rd
Exceptions      
excuses      2nd 3rd
excuses and performance      2nd 3rd
execution engine      
explicit state machines      
exploratory activities      2nd
external resources      
failure, expectation of      2nd 3rd 4th 5th
failures, backup measures for      
features      
features of      
Feedback      
feedback, immediate      2nd 3rd 4th 5th 6th 7th 8th
file format      
file formats      
files and streams to store and transfer data      2nd
filtered text box      2nd 3rd 4th 5th
filtered text box example      2nd 3rd 4th 5th
Filters      
First Call      2nd
first Web service call      2nd
fixed-purpose devices      
flash memory storage      2nd
floating-point mathematics      2nd
floating-point mathematics, support for      
floating-point mathematics, trigonometric, and transcendental functions      
focused activities      
focused purpose      
fonts, brushes, pens, ImageAttributes      
foreground thread user interface updates with background processing      2nd 3rd 4th 5th
FORM      
Formats      
Forms      
frameworks      
future issues      
future mobile devices      
Games      
Garbage collection      2nd 3rd 4th 5th
general purpose abstract data model      
good experience      
GPRS connections      
Graphics      2nd
graphics and      
graphics code      
graphics code and      
graphics objects      
graphics resources      
graphics resources, ways of deferred loading, caching, and releasing      2nd
GSM mobile technology      
hierarchical nature of      2nd
hierarchical nature of XML      2nd
how to embed image in application      
how to read this book      
HTML      
HTTP/HTTPS communications protocols      
identifying key      
illegal state transitions      
IMailRuleClient      
immediate feedback      2nd 3rd
implicit state machines      
in off-device SQL databases      
in SQL CE databases on device      
in XML files on device      
in-memory representation      
in-memory storage of data      
indirect functions used to update user interface      
individual creation of drawing resources      
inherent difficulties      2nd 3rd
INI file, storing data as      
Innovations      
inside games      
Installation      
instant access      
international@pearsoned.com      
Internet Explorer      
IrDA      2nd 3rd 4th 5th 6th 7th
Iteration      
JIT (just-in-time compilation)      
key features, identifying      
Keynes, John Maynard      
latch-based approach      
latch-based approach to caching resources      
layout of controls      
layout of controls on      
LISTS      
ListView control      
long duration tasks      
long-duration activities      
long-term data storage      
long-term data storage in off-device SQL databases      
long-term data storage in SQL CE databases on device      
long-term data storage in XML files on device      
long-term data storage model      
macro memory      [See application level memory]
main thread for      
main thread for user interface      
Managed code      
managed runtime approaches to      2nd
managed-code libraries      
management of      2nd
McLuhan, Marshall      
measuring performance      2nd
memory allocation inefficiencies      
memory card-based installation      
1 2
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте