Journal articles on the topic 'Mac users'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mac users.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Frances Webber. "Mac users." Socialist Lawyer, no. 66 (2014): 46. http://dx.doi.org/10.13169/socialistlawyer.66.0046a.
Full textShiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena, and Evangelos Pallis. "Traffic-Based S-MAC." International Journal of Wireless Networks and Broadband Technologies 4, no. 1 (January 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.
Full textسامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. "Intrusion Detection System for Misbehaving WLAN Users." journal of king abdulaziz university computing and information technology sciences 1, no. 1 (January 2, 2012): 55–81. http://dx.doi.org/10.4197/comp.1-1.3.
Full textFenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.
Full textM, Anusha, Srikanth Vemuru, and T. Gunasekhar. "Transmission protocols in Cognitive Radio Mesh Networks." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 6 (December 1, 2015): 1446. http://dx.doi.org/10.11591/ijece.v5i6.pp1446-1451.
Full textTan, Min Sheng, Hai Tao Tan, Meng Chen, and Xiang Li. "The Improvement of Preamble Mechanism and Addition of TDMA/CSMA Mechanism for B-MAC." Applied Mechanics and Materials 48-49 (February 2011): 1261–64. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.1261.
Full textWu, Chien-Min, Yen-Chun Kao, and Kai-Fu Chang. "A Multichannel MAC Protocol for IoT-enabled Cognitive Radio Ad Hoc Networks." Advances in Technology Innovation 5, no. 1 (January 1, 2020): 45–55. http://dx.doi.org/10.46604/aiti.2020.3946.
Full textHU, VINCENT C., D. RICHARD KUHN, TAO XIE, and JEEHYUN HWANG. "MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES." International Journal of Software Engineering and Knowledge Engineering 21, no. 01 (February 2011): 103–27. http://dx.doi.org/10.1142/s021819401100513x.
Full textAusaf, Asfund, Mohammad Zubair Khan, Muhammad Awais Javed, and Ali Kashif Bashir. "WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications." Future Internet 12, no. 1 (January 11, 2020): 11. http://dx.doi.org/10.3390/fi12010011.
Full textHu, Xiaofeng, Xianzhong Xie, and Ting Song. "Cross-Layer Performance Analysis of the Unreliable Data Transmission for Decentralized Cognitive MAC Protocol under Multiple Secondary Users Scenario." Journal of Systems Science and Information 1, no. 1 (February 25, 2013): 74–85. http://dx.doi.org/10.1515/jssi-2013-0074.
Full textMa, Yue Huai, Wei Zhang, Wen Hua Wang, and Yue Xuan Liu. "An Efficient Packet Scheduling and Resource Allocation Algorithm for Practical Multi-Layer Systems." Advanced Materials Research 926-930 (May 2014): 2951–54. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2951.
Full textHovden, Robert. "Running Digital Micrograph on Linux and Mac OSX." Microscopy Today 20, no. 2 (February 28, 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.
Full textJain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (May 16, 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Full textSun, Liu, and Paolini. "A Dynamic Access Probability Adjustment Strategy for Coded Random Access Schemes." Sensors 19, no. 19 (September 27, 2019): 4206. http://dx.doi.org/10.3390/s19194206.
Full textUllah, Niamat, M. Sanaullah Chowdhury, Mosaddique Al Ameen, and Kyung Sup Kwak. "Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 504946. http://dx.doi.org/10.1155/2012/504946.
Full textNevid, Jeffrey S., and Amy Pastva. "“I'm a Mac” versus “I'm a PC”: Personality Differences between Mac and PC Users in a College Sample." Psychology & Marketing 31, no. 1 (December 20, 2013): 31–37. http://dx.doi.org/10.1002/mar.20672.
Full textSetiawan, Adi, Gyga Putra Parsaulian Hutauruk, and Tita Aisyah. "Prototipe Kelas Pintar dengan Absensi Otomatis MAC Address Gawai Berbasis IoT." INSOLOGI: Jurnal Sains dan Teknologi 2, no. 1 (February 28, 2023): 97–108. http://dx.doi.org/10.55123/insologi.v2i1.1400.
Full textRahim, Muddasir, Riaz Hussain, Irfan Latif Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Atif Shakeel, Qadeer Ul Hasan, Byung Moo Lee, and Shahzad A. Malik. "Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network." Wireless Communications and Mobile Computing 2021 (August 6, 2021): 1–22. http://dx.doi.org/10.1155/2021/5552012.
Full textSum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang, and Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space." ISRN Communications and Networking 2011 (June 28, 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.
Full textSubramanyam, Radha, S. Rekha, P. Nagabushanam, and Sai Krishna Kondoju. "Optimization Techniques in Cooperative and Distributed MAC Protocols." International Journal of Intelligent Information Technologies 20, no. 1 (January 7, 2024): 1–23. http://dx.doi.org/10.4018/ijiit.335523.
Full textNasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (April 8, 2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.
Full textJouma Ali AlMohamad, Jouma Ali AlMohamad. "Build Encrypted Interconnection Networks by application of IP Security and Mac Address Filtering Authentication Methods: بناء شبكات ربط مشفرة من خلال تطبيق أساليب مصادقة أمان IP وتصفية عنوان Mac." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 66–56. http://dx.doi.org/10.26389/ajsrp.m280321.
Full textFirmin, Michael W., Whitney L. Muhlenkamp Wood, Ruth L. Firmin, and Jordan C. Wood. "Self‐admitted pretensions of Mac users on a predominantly PC university campus." Educational Media International 47, no. 1 (March 2010): 1–17. http://dx.doi.org/10.1080/09523981003654944.
Full textJin, Youngmi, George Kesidis, and Ju Wook Jang. "A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users." IEEE Journal on Selected Areas in Communications 30, no. 1 (January 2012): 128–37. http://dx.doi.org/10.1109/jsac.2012.120112.
Full textSinghal, Chetna, and Thanikaiselvan V. "Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network." International journal of Computer Networks & Communications 14, no. 4 (July 31, 2022): 1–17. http://dx.doi.org/10.5121/ijcnc.2022.14401.
Full textDunaytsev, R., and A. Shabanova. "On the Use of Wi-Fi in Marketing." Telecom IT 7, no. 4 (December 31, 2019): 37–42. http://dx.doi.org/10.31854/2307-1303-2019-7-4-37-42.
Full textYash, Sharma, and Pandey Neeraj Kumar. "MAC Based Security Integration using Face Recognition in Cloud Environment." Journal of Physics: Conference Series 2089, no. 1 (November 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2089/1/012005.
Full textTarafder, Pulok, and Wooyeol Choi. "MAC Protocols for mmWave Communication: A Comparative Survey." Sensors 22, no. 10 (May 19, 2022): 3853. http://dx.doi.org/10.3390/s22103853.
Full textAdami, Fardiansyah. "Throughput Analysis on LTE Network for Multicast D2D System." Jurnal Inotera 4, no. 1 (June 26, 2019): 7. http://dx.doi.org/10.31572/inotera.vol4.iss1.2019.id69.
Full textSongzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao, and Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions." Journal of Marine Science and Engineering 9, no. 5 (April 27, 2021): 468. http://dx.doi.org/10.3390/jmse9050468.
Full textDai, Bin, and Yong Tao Wang. "Discrete Memoryless Multiple-Access Wiretap Channel with Non-Cooperative Encoders." Applied Mechanics and Materials 433-435 (October 2013): 1502–6. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1502.
Full textTlouyamma, Joseph, and Mthulisi Velempini. "Channel Selection Algorithm Optimized for Improved Performance in Cognitive Radio Networks." Wireless Personal Communications 119, no. 4 (April 26, 2021): 3161–78. http://dx.doi.org/10.1007/s11277-021-08392-5.
Full textBaidari, Ishwar, S. P. Sajjan, and Ajeet Singh. "Improving WLAN Quality of Services (Qos) Using Opnet." Oriental journal of computer science and technology 9, no. 3 (September 16, 2016): 204–11. http://dx.doi.org/10.13005/ojcst/09.03.06.
Full textHardeep Singh Saini, Prabhjot Kaur,. "“Hybrid MAC Methodology for Improving the QOS in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 2s (April 4, 2024): 293–305. http://dx.doi.org/10.52783/jes.1140.
Full textHardeep Singh Saini, Prabhjot Kaur ,. "“Hybrid MAC Methodology for Improving the Qos in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 819–32. http://dx.doi.org/10.52783/jes.824.
Full textPaul, Rajib, Jiwoon Jang, and Young-June Choi. "Channel-Hopping Sequence and Rendezvous MAC for Cognitive Radio Networks." Sensors 22, no. 16 (August 9, 2022): 5949. http://dx.doi.org/10.3390/s22165949.
Full textBiswas, Abhijit, and Dushyanta Dutta. "Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308311.
Full textSiddik, Abubakar, Jakia Akter Nitu, Natasha Islam, Anju Ara Hasi, Jannatun Ferdous, Mizanur Rahman, and Nahid Sultan. "Effects of Mac Parameters on the Performance of IEEE 802.11 DCF in NS-3." International Journal of Wireless & Mobile Networks 13, no. 6 (December 31, 2021): 1–20. http://dx.doi.org/10.5121/ijwmn.2021.13601.
Full textFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Full textFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Full textKu, Jennifer, Emily Henkle, Kathleen F. Carlson, Miguel Marino, Sarah K. Brode, Theodore K. Marras, Kevin L. Winthrop, and Kevin L. Winthrop. "192. Tolerability Outcomes of Multi-drug Antibiotic Treatment for Pulmonary Nontuberculous Mycobacterial Disease due to Mycobacterium avium Complex in U.S. Medicare Beneficiaries with Bronchiectasis." Open Forum Infectious Diseases 8, Supplement_1 (November 1, 2021): S116—S117. http://dx.doi.org/10.1093/ofid/ofab466.192.
Full textPerković, T., A. Dagelić, M. Bugarić, and M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science." Security and Communication Networks 2020 (September 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.
Full textShahi, Sara, Daniela Tuninetti, and Natasha Devroye. "The Strongly Asynchronous Massive Access Channel." Entropy 25, no. 1 (December 29, 2022): 65. http://dx.doi.org/10.3390/e25010065.
Full textZhang, Wenjie, Chai Kiat Yeo, and Yifan Li. "A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary Users." IEEE Transactions on Mobile Computing 12, no. 4 (April 2013): 621–32. http://dx.doi.org/10.1109/tmc.2012.31.
Full textFebrianto, Teddy, Jiancao Hou, and Mohammad Shikh-Bahaei. "Cooperative Full-Duplex Physical and MAC Layer Design in Asynchronous Cognitive Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/8491920.
Full textMore, Kiran P., and Rajendrakumar A. Patil. "Transmission State Prediction from MAC in Cognitive Radio via Optimized Deep Learning Architecture." International Journal of Pattern Recognition and Artificial Intelligence 35, no. 09 (May 29, 2021): 2152012. http://dx.doi.org/10.1142/s0218001421520121.
Full textLatil, Céline. "Challenges in using moving images at the MAC/VAL, Vitry-sur-Seine." Art Libraries Journal 34, no. 3 (2009): 11–15. http://dx.doi.org/10.1017/s0307472200015959.
Full textGao, Zi Long, Lian Fen Huang, Jing Wang, and Yan Yao. "Available Data Packet Size Policy for Unsolicited Grant Service in the Power Saving Multi-Channel MAC Protocol." Advanced Materials Research 204-210 (February 2011): 733–38. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.733.
Full textLestari, Ayu Indah, and Hartosujono Hartosujono. "HUBUNGAN KONTROL DIRI DENGAN PERILAKU CYBERSEX REMAJA PADA PENGGUNA WARUNG INTERNET DI GLAGAH SARI YOGYAKARTA." JURNAL SPIRITS 4, no. 2 (April 25, 2017): 65. http://dx.doi.org/10.30738/spirits.v4i2.1116.
Full textMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Full text