Mobile App Development Insights
Mobile App Development Insights
S
COLLEGE KONNI,
PATHANAMTHITTA
(Affiliated to Mahatma Gandhi University, Kottayam)
SEMINAR REPORT
ON
NANDHANA SEKHAR
REG.NO:220021026521
1
MANNAM MEMORIAL NSS COLLEGE
KONNI, PATHANAMTHITTA
(Affiliated to Mahatma Gandhi University)
CERTIFICATE
This to certify that the seminar report entitled “MOBILE APP DEVELOPMENT”
submitted by NANDHANA SEKHAR Reg No: 220021026521 in partial fulfilment of
the requirement for the degree of B.Sc. computer science of the Mahatma Gandhi
University, Kottayam in bonafide work done by the during the year 2022-2025
……….…...………… …….…………………..
Prof. JYOTHI. R Prof. RADHIKA. R
Principal Head of the Department
………………… ………………………..
Mrs. SMITHA. RAJAN
2
3
ACKNOWLEDGEMENT
At the outset, I thank God almighty for making my endevour a success. I also express my
sincere gratitude to Prof. RADHIKAR, Head of Department of Computer Science for
providing with adequate facilities ,ways and means by which I was able to complete this
seminar.
I express my sincere gratitude to our seminar guide Mrs. SMITHA RAJAN for her constant
support and valuable suggestions for the successful completion of this seminar.
I express my immense pleasure and thankfulness to all the teachers and staff of the
Department of Computer Science, Mannam Memorial N.S.S College for their cooperation and
support. Last but not the least,
I thank all others and especially my classmates and my family members who in one way or
another helped me in the successful completion of this work.
Nandhana Sekhar
4
ABSTRACT
The term “Mobile Computing” is a recent buzzword in the IT world. Behind this fancy poetic
phrase there lies a true picture of the future of computing for both in technical perspective and
social perspective. Though the term “Mobile Computing" is recent but the idea of centralizing
computation and storage in distributed data centers maintained by third party companies is not
new but it came in way back in 1990s along with distributed computing approaches like grid
computing. Mobile computing is aimed at providing IT as a service to the cloud users
ondemand basis with greater flexibility, availability, reliability and scalability with utility
computing model. This new paradigm of computing has an immense potential in it to be used in
the field of e-governance and in rural development perspective in developing countries like
India.
5
TABLE OF CONTENT
CHAPTER
CONTENT PAGE NO:
NO:
1 ABSTRACT 4
2 INTRODUCTION 6
2.1 TRADITIONAL DISTRIBUTED SYSTEM 8
3.4. NETWORK 11
8 UPCOMING CHALLENGES 18
9 WHY WE SHOULD CARE? 21
10 ADVANTAGES 22
11 DISADVANTAGES 24
12 FUTURE OF MOBILE COMPUTING 25
13 CONCLUSION 26
14 REFERENCE 27
6
INTRODUCTION
The International Data Corporation (IDC) indicates that the most popular activities of mobile
Internet users are search engine querying, reading news information, downloading multimedia,
and using email and instant messaging clients. Over the next four years, IDC predicts the
fastest-growing activities will be purchasing, social networking, and blogging.1 In essence, most
services available through desktops will soon be accessed mainly through a large quantity (and
variety) of mobile devices. Exciting systems and networking innovation is happening on these
devices, and it is a good time to be a mobile computing researcher. At the operating system
level, we have seen the rise of the Linux-based Android platform gaining market share at the
expense of the closed-source iPhone. At the same time, the App Store launched by Apple
contains more than 200,000 applications that users can download for their phone. Google has
followed suit with an equivalent (although less controlled) store for Android phones. Regardless
of the authority model — on which the jury is still out — the application store model is here to
stay. While previous application models involved service providers and phone producers only,
now the service market is open to third-party developers who might even be the users
themselves. Clearly, this field is burgeoning and developing in many directions, driven by users’
interests in interacting and “staying connected.” With this in mind, it is worthwhile to stop and
reflect on users’ future needs and expectations as well as the challenges that this reality brings
and the opportunities offered. Advances in wireless networking have prompted a new concept
of computing, called mobile computing in which users carrying portable devices have access to
a shared infrastructure, independent of their physical location. Mobile computing has fast
become an crucial fresh prototype in nowadays world of networked computing systems. This
provides flexible communication between people and continuous access to networked services.
Mobile computing is revolutionizing the way computers are used and in the coming years this
will become even more perceptible although many of the devices themselves will become
smaller or 9 even invisible to users. This paper explicate different types of mobile system that
are used in distributed environment. It also explains mobility service architecture, technology,
application and demerits of mobile computing. Finally, this explain computing. A technology that
allows transmission of data, via a computer, without having to be connected to a fixed physical
link. Mobile computing has three aspects: mobile communication, mobile hardware, and mobile
software. The first aspect addresses communication issues in ad-hoc and infrastructure
networks as well as communication properties, protocols, data formats and concrete
technologies. The second aspect is on the hardware, e.g., mobile devices or device
components. The third aspect deals with the characteristics and requirements of mobile
applications. Mobile voice communication is widely established throughout the world and has
had a very rapid increase in the number of subscribers to the various cellular networks over the
last few years. An extension of this technology is the ability to send and receive data across
these cellular networks.
7
This is the principle of mobile computing. Mobile data communication has become a very
important and rapidly evolving technology as it allows users to transmit data from remote
locations to other remote or fixed locations. This proves to be the solution to the biggest
problem of business people on the move - mobility. Mobile computing has several
characteristics reminiscent of distributed systems. The following section is an explanation of
the different types of distributed systems ranging from the traditional type to nomadic, ad-hoc
and finally ubiquitous ones.
8
1.1 TRADITIONAL DISTRIBUTED SYSTEM
Traditional distributed systems consist of a collection of fixed hosts that are themselves
attached to a network if hosts are disconnected from the network this is considered to be
abnormal whereas in a mobile system this is quite the norm. These hosts are fixed and are
usually very powerful machines with fast processors and large amount of memory. The
bandwidth in traditional systems is very high too. In a traditional system, location rarely
changes as well and hosts are much less likely to be added or deleted from the network.
Traditional distributed systems also need to guarantee non-functional requirements such as
scalability (accommodate a higher load at some time in the future), openness (possibility to
extend and modify the system easily), heterogeneity (integration of components written using
different programming languages, running on different operating systems, executing on
different hardware platforms), fault-tolerance (recover from faults without halting the whole
system) and finally resource-sharing (some form of access control).
This kind of system is composed of a set of mobile devices and a core infrastructure with fixed
and wired nodes. Mobile devices move from location to location, while maintaining a
connection to the fixed network. The mobile host has a home IP address and thus any
packets sent to the mobile host will be delivered to the home network and not the foreign
network where the mobile host is currently located. Such problem can be solved by
forwarding packets to the foreign network with the help of Mobile IP. Nevertheless, Mobile IP
also suffers from efficiency (routing issues), QoS, security (authentication of mobile host at
foreign network and end-to-end security required) and wireless access (reduced capacity)
problems. The non-functional requirements mainly differ, compared to the traditional
distributed systems,in the heterogeneity (affected? by? the? presence? of? both? fixed? and
mobile devices across the network as well as the variations in technologies (e.g.: wireless)),
resource sharing 11 (must take into account different issues when the resources need to be
discovered) and fault tolerance of system (considered to be quite the norm).
9
1.3 AD-HOC MOBILE DISTRIBUTED SYSTEM
Ad-hoc distributed systems are possibly the only type of network that comes close to mobile
networks in the sense that every node is literally mobile. When nodes are detached from the
fixed/mobile network they may evolve independently and groups of hosts opportunistically
form clusters of mini-networks. A-hoc systems do not have any fixed infrastructure which
differs them both from traditional and nomadic distributed systems. Security threats have to be
dealt even more cautiously in ad-hoc networks. Designing secure key distribution in an ad-
hoc network might be an extremely hard task.
A Portable computer is a general-purpose computer that can be easily moved from place to
place, but cannot be used while in transit, usually because it requires some "setting- up" and
an AC power source. The most famous example is the Osborne 1. Portable computers are
also called a "transportable" or a "luggable" PC .A Tablet PC that lacks a keyboard (also
known as a non-convertible Tablet PC) is shaped like slate or a paper notebook, features a
touch-screen with a stylus and handwriting recognition software. An Internet tablet is an
Internet appliance in tablet form. Unlike a Tablet PC, an Internet tablet does not have much
computing power and its applications suite is limited, and it cannot replace a general purpose
computer. Internet tablets typically feature an MP3 and video player, a web browser, a chat
application and a picture viewer.
10
NATURE OF MOBILE COMPUTING
•Process reengineering
•Reducing operational and administrative staff
•Improving communications
•Improving customer service
•Reducing manufacturing costs
•Shortening business cycles • Many other benefits
The variety of hardware, software, and communications systems available and the many ways
they can be integrated to solve problems add to the versatility of mobile computing. The
versatility of mobile computing will continue to expand over the next few years as a predicted
proliferation of new mobile computing devices and the expanded usage of existing devices
comes to fruition.
Mobile computing devices are becoming smaller, lighter, and more powerful than their
predecessors. They also come in various types and connectivity options. Two prominent
classes of mobile computing devices today are those that use the PalmOS and the Pocket PC
operating systems. These devices are capable of simple word processing, spreadsheet
applications, web browsing, calendar notations, and address management. There are also low-
end handheld computers with monochromatic displays, low resolution, limited memory, and
somewhat bulky sizes. Higher-end devices are extremely thin, have a high-resolution, and can
include color displays.
11
2.3 TECHNOLOGY IN MOBILE COMPUTING
Recently, the free Linux operating system has been modified to run on handheld computers of
different types. Some manufacturers are also adopting Linux for their handheld computers. As
this operating system carries no licensing fee, it could further reduce the cost of handheld
computers. In developing countries like India, voice activated Linux-based computers have 13
been developed for mass usage in rural areas where the computing infrastructure is limited.
Device integration, such as the integration of cell phones and handheld computers, is also
occurring. Location aware mobile computing in which a person is able to obtain information on
local restaurants, theaters, coffee-shops, maps, driving directions, traffic, weather, news,
tourist attractions, and the like on a handheld computer is also becoming prominent.
2.4 NETWORK
Wireless connectivity for handheld computers also comes in several varieties. Most handheld
computers come with built-in infrared ports that can be used to exchange information with a
network or another computer at short range. Many of them can connect to wireless local area
networks (LANs) based on the IEEE 802.11 standard. Some cellular telephone service
providers are also making cell phone modules available for attachment to the expansion slots
of handhelds computers. Bluetooth, a new wireless standard for personal area networking ,
is also available for some handheld computers. Wireless technologies, includes 802.11b,
otherwise known as Wi-Fi, Infrared Data Association (IrDA), Ultra-Wideband Radio (UWB),
and Home RF are being applied to similar technologies that Bluetooth use with mixed results.
802.11 is the most well known technology, excluding Bluetooth, and uses the same radio
frequency, meaning that they are not compatible as they cause interference with each other.
802.11 is being implemented into universities in the US, Japan and China, as well as food
and beverage shops where they are being used to identify students and customers. Even
airports have taken up the 802.11 technology, with airports all over America, and three of
America’s most prominent airlines promoting the use of it.
Infrared Data Association is extremely inferior to that of Bluetooth. Its limitations include only
being able to communicate point-to-point, needing a line of sight, and it has a speed of fifty- six
kilobytes per second, whereas Bluetooth is one megabyte per second. The Ultra- Wideband
Radio is superior to that of Bluetooth in that it can transmit at greater lengths (up to 70 meters),
with only half of the power that Bluetooth uses. HomeRF is a technology that is not very well
known. It is used for data and voice communication and targeted for the residential market
segment and does not serve enterprise- class. WLANs, public access systems or fixed wireless
Internet access.
12
2.5 DEMERITS IN MOBILE COMPUTING
Devices such as PDAs, smart phones and wireless laptops, along with the necessary
peripherals should be easily upgraded to ensure businesses can remain current and effective.
Further adoption of mobile computing should see the initial cost of investment for businesses
fall, as the products become readily available and widely used.
Mobile computers offer many new options, however there are difficulties to consider. Generally,
wireless laptops cost 50% to 100% more than their desktop counterparts. Laptops are also
harder to upgrade most proprietary hardware components that limit future options. The cost of
setup for mobile computing varies depending on the number of employees, and the hardware
required. The initial investment in this technology remains risky, as the market is rapidly
changing and improving.
Mobile Computing:
• That Someone/something can move or be moved easily and quickly from place to place.
• Users with portable computers still have network connections while they move.
• It is when a process is moved from a normal fixed position to a more dynamic position.
• When a work process is carried out somewhere where it was not previously possible.
13
A SOCIAL MOBILE WORLD
One important aspect to note about the recent use of mobile computing is the increased access
to social networking services from mobile devices. In fact, mobile users spend more time on
social networking sites than desktop users. These statistics have several implications for
systems and network builders in general: the number of mobile phone users is already much
higher than desktop users, with much more dynamic connectivity patterns. This has impact,
among other things, on the load of systems handling content for social networking sites.
The combination of mobile phone technologies and online social networks leads to a very
appealing world for mobile advertisers and more generally for mobile service providers. Strategy
Analytics estimates the expenditure on mobile advertising at US$3.6 billion in 2009, and projects
US$38 billion by 2015.
Part of this forecast relies on the advantages of accessing social network services from a mobile
device: through location information gathering - sensing user activity as well as social profiling -
advertising can become more targeted and therefore better received and useful. It is not by
chance that Twitter now lets users add latitude and longitude to any tweet and that Facebook has
just launched Facebook Places.
Location-based social networks such as Foursquare and Gowalla are predicated on the use of
this technology from a mobile device. This means that, all of a sudden, the messages posted on
the social network are not only generated when the user is at his desk but also at any time
throughout his day. They also come from myriad devices dispersed and roaming all over the
world. And this is not limited to traditional messages: items of interest increasingly include video
download, music, and media streaming.
Looking at the last two years of mobile and ubiquitous/pervasive computing (as well as sensor
systems) conference programs, it is clear that the research community has developed a strong
interest in so-called participatory sensing, where users’ phones are employed as data collectors
in the environment for all sorts of sensed information (from Images to temperature to interaction
patterns). In this context, several approaches have emerged to help with energy conservation to
allow long-term data collection as well as usability.
14
WHY GO FOR MOBILE
•Laptops
•Palmtops
•PDAs
•Cell Phones
•Pagers
•Sensors
15
MOBILE OBJECTS
Mobile Objects:
A mobile object is a type of code that carries a state. And this state will lives on a host and
visits a places. Mobile Objects can to their friends but only by cooperation of the hosts.
• Deals with the mobile objects whose geometry , position changes over time.
• Traditional DBMS alone is incapable for this purpose.
• MOD is built on top of existing DBMS to support a critical set of capabilities.
• DOMINO(Databases for moving objects tracking) approach.
• System Architecture DOMINO Arc View GIS Informix DBMS
• Omnitracs
• SQL like query languages with specific predicates and operators to address temporal
issues.
16
• What is the nearest station ?
Select station.name , station.address from station in stations where
nearest(here,station);
Select t from v in trucks, c iin cities where v within(t) c and v.id=12A and
c.name=Windsor.
17
APPLICATION
• In Courts
• In companies
• Taxi/Truck Dispatch
• Electronic Mail/Paging
18
UPCOMING CHALLENGES
One interesting observable mismatch is that users expect the same level of service and
performance on their phone as they experience on their desktops. For example, low latency and
high responsiveness, ease of interaction, and always-on connectivity are the implicit user
requirements. It is also, however, true that current devices’ limitations are impacting the way
individuals use devices (skimming through email rather than reading carefully, and producing
very short answers). This, in turn, also induces new behavior in users. For instance, consumers
who bought the iPad sued Apple because the device was shutting down after overheating,
leaving users disappointed but still determined to own a device they can use to read the news
from a deck chair on the beach.
There are a number of other challenges, as well, for mobile application and network developers
that need attention. Each of these challenges must be solved before users’ expectations can be
met.
8.1 Energy
Energy seems to be a permanent issue with these devices. Screens are getting bigger and
more colorful, functionality is increasing, as is the number of network interfaces and sensors
available and used by applications. Several of the most recent smart phones last no more than
12 hours without recharging, when continuously connecting to the network. While some of
these issues will be solved at the hardware level by use of more sophisticated batteries or
energy-scavenging solutions, there is also a need for improved software that works effectively
(for example, through a smart sensor and with efficient use of network connectivity).
8.2 Bandwidth
Downloading and streaming video and audio content seem popular. Unfortunately, even today,
the current cellular network infrastructure is put under considerable pressure, and it seems
bound to become worse. Research is happening on alternative techniques for smarter content
caching or opportunistic use of local connectivity links (such as downloading interesting content
from your neighbors). Intelligent switching between interfaces, which would let users
seamlessly exploit networks with more bandwidth when available (such as Wi-Fi), is also a
promising idea.
19
8.3 System
Given the availability of multiple applications developed by different sources, there is a need to
engineer the device system in ways that allow for responsiveness and concurrent execution
while considering the limited resources and different user interfaces available. At the same
time, the high number of mobile devices and high frequency of use (because of the device’s
constant availability) imposes a load that burdens not just the network but also the back-end
servers. Hence, we need customized techniques that take advantage of the knowledge of
device location, access patterns, and user behavior.
The way people use services and devices cannot be forecast with precision. The success of
short message service (SMS) was an unpredicted event. It is apparent that the interaction
with systems happening from mobile devices is different from the one on desktop machines.
Work on voice interfaces is promising but not yet ripe, although it has the potential to
considerably change the kinds of services and ways in which services can be offered to users.
The abundance of challenges for hardware and software research in this area are therefore
appealing, and virtually all services offered now on the Internet need to consider the likelihood
that users will soon be accessing them through a mobile device.
While mobile malware hasn’t captured too many headlines yet (with a few recent exceptions),
it is clear that with more applications being deployed, more businesses placing phones at the
core of their interest, and more data being collected through these devices, the interest of
criminals is bound to increase. Moreover, mobile devices can be stolen and tampered with
while the owner is not present in easier ways than with desktops and servers.
20
8.5 Integration and Standardization
We are at a stage where various forces are at work to gain a monopoly on the mobile
services market. Although it is unclear how this will develop, as part of the academic
community. I have the hope that some sort of open market solution will dominate. However,
with open solutions come the challenges of standardization, heterogeneity, and interworking
of different technologies and hardware: Will desktop computer history be able to teach us
something?
• Disconnection
• Low Bandwidth
• High Bandwidth variability
• Low Power and resources
• Security risks
• Wide variety terminals and devices with different capabilities
• Device attributes
• Fit more functionality into single,smaller device
21
WHY WE SHOULD CARE ?
The applications and technologies I have mentioned are still quite primitive — and yet we are
just one step away from the combination of location-based social networks and participatory
(or crowd) sensing. On one hand, we have a powerful device able to capture a variety of
details about our lives, including location and co-presence. On the other, we have tools that
let us input information and messages, and link to other people explicitly. The power of this
integration will certainly need to be confined somehow by clear privacy measures, but its
implication on the scale of perceived user experience will no doubt be noted. This means,
however, for us researchers that the challenges will just become harder to tackle. For
example, who is in control of the data collected about users? Who can combine them? Can
the user constrain them? How should location information be combined with place category
information in a semantically and possibly standardized way? How are services able to
process the realm of data within responsive and energy-efficient applications? Can we utilize
user context data to fundamentally improve social network analysis measures — and
ultimately, the knowledge we have about relationships, interaction, and mobility.
It is probably clear to many that the development of current technologies is marking the end of
the Internet as we know it: the phrase “Internet of Things” is often associated with
fragmentation because of the amount of devices that are and will be internetworked. However,
the most powerful trend, and the one probably most hidden until recently, is the inherent human
social nature that this fragmentation will be following closely, which will complement the virtual
and yet real social weaving happening online. This process might, to give one example, open
the doors to applications of the quite theoretical body of research on ad hoc and opportunistic
networking: maybe with the social network trend, people and businesses are becoming
acclimatized to the idea of the exploitation of social links to obtain more efficient and per-
sonalized services (for example, by exploiting the local bandwidth available between two co-
located devices instead of using a cellular network), integrated with the overall centralized
authorization of content and parties.
22
ADVANTAGES
Increase in Productivity
Mobile devices can be used out in the field of various companies, therefore reducing the
time and cost for clients and themselves.
Portability
This would be one of the main advantages of mobile computing, you are not restricted to
one location in order for you to get jobs done or even access email on the go
Cloud Computing
This service is available for saving documents on a online server and being able to
access them anytime and anywhere when you have a connection to the internet and can
access these files on several mobile devices or even PCs at home
Location flexibility
This has enabled user to work from anywhere as long as there is a connection
established. A user can work without being in a fixed position. Their mobility ensures that
they are able to carry out numerous tasks at the same time perform their stated jobs.
Saves Time
The time consumed or wasted by travelling from different locations or to the office and
back, have been slashed. One can now access all the important documents and files
over a secure channel or portal and work as if they were on their computer. It has
enhanced telecommuting in many companies. This also reduces unnecessary expenses
that might be incurred.
23
Enhanced Productivity
Productive nature has been boosted by the fact that a worker can simply work efficiently
and effectively from which ever location they see comfortable and suitable. Users are
able to work with comfortable environments.
Ease of research
Research has been made easier, since users will go to the field and search for facts and
feed them back to the system. It has also made it easier for field officer and researchers
to collect and feed data from wherever they without making unnecessary trip to and from
the office to the field.
Entertainment
Video and audio recordings can now be streamed on the go using mobile computing. It's
easy to access a wide variety of movies, educational and informative material. With the
improvement and availability of high speed data connections at considerable costs, one
is able to get all the entertainment they want as they browser the internet for streamed
data. One can be able to watch news, movies, and documentaries among other
entertainment offers over the internet. This was not such before mobile computing
dawned on the computing world.
Business processes are now easily available through secured connections. Basing on
the factor of security, adequate measures have been put in place to ensure
authentication and authorization of the user accessing those services.
Some business functions can be run over secure links and also the sharing of information
between business partners. Also it's worth noting that lengthy travelling has been reduced,
since there is the use of voice and video conferencing.
Meetings, seminars and other informative services can be conducted using the video and voice
conferencing. This cuts down on travel time and expenditure.
24
DISADVANTAGE
Quality of connectivity
As one of the disadvantages, mobile devices will need either WiFi connectivity or mobile
network connectivity such as GPRS, 3G and in some countries even 4G connectivity that is
why this is a disadvantage because if you are not near any of these connections your access to
the internet is very limited.
Security concerns
Mobile VPNs are unsafe to connect to, and also syncing devices might also lead to security
concerns. Accessing a WiFi network can also be risky because WPA and WEP security can be
bypassed easily.
Power Consumption
Due to the use of batteries in these devices, these do not tend to last long, if in a situation
where there is no source of power for charging then that will certainly be a letdown.
25
FUTURE OF MOBILE COMPUTING
Mobile computing has a severe limitations , however it is far from impossible and technology
improves all the time.
Lots of challenges : some have good solutions , many others are still waiting to be solved
26
CONCLUSION
This is the first article in a new column on mobile computing that will discuss several issues
related to mobility and ubiquitous devices. The use of mobile devices has been soaring, with
mobile subscribers surpassing 5 billion in 2010, according to the International
Telecommunication Union (ITU), which is more than 70 percent of the world’s population. ITU
also forecasts that mobile Web access — via laptops and smart mobile devices — will overtake
fixed desktop Web access within the next five years. In countries like India and China, this is
already a reality. The next time you update your Facebook status or Tweet, review a business
report, read a magazine or make dinner reservations on a smartphone or tablet, remember how
it used to be. Would you go back? Now, remember when you decided to take the plunge and
purchase the smart mobile device. The journey from fascination to envy to necessity is led by
the freedom that comes from mobile computing remember the desktop PC, now think about
docking your laptop. In the future, you will either dock your tablet or your cell phone. Your
Personal Mobile Device (PMD) will be your primary computing device for work and for personal
pleasure. It is a gold rush all over again. Those companies that bring the most robust and
desired software will rule the new application marketplace that marries
smartphones and tablets to the Cloud. 2011 will be a year of proportionate options to connect
and create a digital impression. In some ways, it will be overwhelming and in others a
distraction. The investments companies make in the new decade to mobile computing for
employees and consumers will set the tone for who leads and who follows The Vessel head
disruptions for mobile computing provide the tipping points o free Cloud and flash storage,
digital wallet transactions, gesture computing, and the herding of developers to the water hole
that provides the most opportunity cash in on mobile apps. Wait not, and be part of the
disruption revolution..
27
REFERENCE
1.“Global Mobile Stats: All Latest Quality Research on Mobile Web and Marketing,” Aug. 2010;
http://mobi thinking.com/mobile-marketing-tools/ latest-mobile-stats.
2. “GSMA Mobile Media Metrics (MMM) Mobile World Congress Seminar,” Global Systems for
Mobile Comm. Assoc. (GSMA) and ComScore, Mobile World Congress, 2010;
www.comscore.com/Press_Events/Presentations_White
papers/2010/GSMA_Mobile_Media_Metrics _Mobile_World_Congress_Seminar
28
29