With your browser, you’ll find ideas such as :
A taxonomy and business analysis for mobile web applications
"Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications by proposing a new taxonomy for mobile web applications, and conducting a business analysis in the field of mobile web applications..."
Effects and opportunities of native code extensions for computationally demanding web applications
Smartphone software for department of computer science
"The presented document provides an overview of the Smartphone Software for Department of Computer Science project development through out several phases : analysis of the project proposal, preliminary study of the concepts involved in the project, design decisions and modeling, implementation, experiments and conclusions obtained in the end, as well as a reflection on possible future system improvements. The final version of the system, which was built after the design and implementation decisions made through out the development of the project, is a prototype mainly composed of an application for Android smartphones leaning on a distributed architecture in order to provide all its expected functionalities."
Applying Next Generation Web Technologies in the Configuration of Customer Designed Products
"This thesis investigates on the issues related to optimization of rich content rendered for browsers on mobile devices. It proposes a lightweight framework that solves issues of rendering on the server and client for the mobile browsers. The solution addresses optimization features such as minification, customized content rendering for mobile and other solutions"
Detection of Smartphone Malware
"With the increasing capabilities of such phones, more and more malicious software (malware) targeting these devices have emerged. In 2004, the
first articles about malware for smartphones [53, 169] appeared describing
mobile devices as the next generation of targets. Since then, the number of
malware increased every month, and variants for various smartphone platforms appeared, e.g. Symbian OS, Windows Mobile, and Android. Our
assumption is that the evolution of malware for mobile devices might take
a similar direction as the evolution of PC malware. Thus, similar problems
will have to be encountered, e.g. missing signatures for unknown threats
and new malware appearing at high frequency. For instance, Bulygin 
showed that a MMS worm targeting random phone book numbers can in-
fect more than 700,000 devices in about three hours. Another interesting
work was presented by Oberheide et al.  who state that the average
time required for a signature-based anti-virus engine to become capable of
detecting new threats is 48 days. These numbers request extended security
measures for smartphones as a malware can seriously damage an infected
device within seconds."
Guidelines for the digital forensic processing of smartphone
"Today Smartphone devices are widespread and they hold a number of types of information about the owner and their activities. As a result of the widespread adoption of these devices into every aspect of our lives they can be involved in almost any crime. The aim of digital forensics of Smartphone devices is to recover the digital evidence in a forensically sound manner so that the digital evidence can be presented and accepted in court. The digital forensic process consists of four phases which are preservation, acquisition, examination/analysis and finally presentation. In this paper we look at various types of crime and their associated digital evidence. The digital forensics process of the Smartphone devices is discussed and, this paper also contains recommended guidelines and procedures for how to perform the phases of the digital forensics process on Smartphone devices. Finally, a description of some challenges that may be faced in this field is given."
Your Phone, Yourself : When is tracking too much ?
A Survey of Mobile Malware in the Wild
"Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We also use this data set to evaluate the effectiveness of techniques for preventing and identifying mobile malware. After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on Android phones, we also examine the incentives that cause non-malicious smartphone tinkerers to publish root exploits
and survey the availability of root exploits."
spying people by profiling smartphone, androïd