期刊文献+

《科学脱口秀》Android端的设计与实现 被引量:1

Design and Realization of “Science Talk Show” at Android End
下载PDF
导出
摘要 阐述了可基于Android、JAVA和Realm在移动端设备上运行的应用程序。这个应用程序主要实现了播客节目分类显示、播客节目在线播放、播客节目离线缓存播放、博客节目模糊查询、播客节目介绍查看、播客节目评论查看、通知栏/线控控制音乐播放、来电/短信勿扰和播客节目收听/点击热度统计等功能,满足用户对该播客节目收听的基本需求。 This paper discusses the application program running on mobile terminal equipment based on Android,JAVA and Realm,which mainly realizes the functions of i Pod+broadcasting programs such as the classification display,online play,offline cache play,fuzzy query,introduction and view,comment browsing,notification column or wire-driven control music play,disturbance for incoming telegram or short message and statistics for listening or clicking rate,etc.,satisfying users' basic requirement to listen to the iPod+broadcasting programs.
作者 谭璐 金伟阳
出处 《长春大学学报》 2017年第8期25-29,共5页 Journal of Changchun University
关键词 PODCAST ANDROID REALM MediaSession Martial DESIGN i Pod+broadcasting Android realm Media Session martial design
  • 相关文献

参考文献2

二级参考文献245

  • 1傅建明,李鹏伟,易乔,黄诗勇.Android组件间通信的安全缺陷静态检测方法[J].华中科技大学学报(自然科学版),2013,41(S2):259-264. 被引量:9
  • 2王志强,刘奇旭,张玉清.Android平台NFC应用漏洞挖掘技术研究[J].通信学报,2014,(Z2):117-123.
  • 3Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 4Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 5Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 6Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 7La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 8Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 9Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 10Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.

共引文献125

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部