Journal articles on the topic 'Operating systems - mac users'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Operating systems - mac users.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX." Microscopy Today 20, no. 2 (February 28, 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.
Full textSum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang, and Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space." ISRN Communications and Networking 2011 (June 28, 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.
Full textFenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.
Full textShiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena, and Evangelos Pallis. "Traffic-Based S-MAC." International Journal of Wireless Networks and Broadband Technologies 4, no. 1 (January 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.
Full textRidwan and Adhi Susano. "APLIKASI EMAIL CLIENT MULTI-PLATFORM DENGAN ENKRIPSI DATA BERBASIS JAVA." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 1 (January 10, 2023): 279–90. http://dx.doi.org/10.35870/jimik.v4i1.177.
Full textPrestridge, Eddie B. "Unix-based workstations for digital image processing and analysis." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 610–11. http://dx.doi.org/10.1017/s0424820100165513.
Full textBhurtel, Manish, and Danda B. Rawat. "Unveiling the Landscape of Operating System Vulnerabilities." Future Internet 15, no. 7 (July 24, 2023): 248. http://dx.doi.org/10.3390/fi15070248.
Full textAdekar, R. H., and A. K. Kureshi. "Performance Analysis of Heterogeneous Systems Ieee 802.11 and Ieee 802.16 Using Spectrum Sharing Mechanism." Advanced Engineering Forum 44 (January 17, 2022): 127–35. http://dx.doi.org/10.4028/www.scientific.net/aef.44.127.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (August 1, 2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.
Full textDavis, Janel L., Brian Soetikno, Ki-Hee Song, Yang Zhang, Cheng Sun, and Hao F. Zhang. "RainbowSTORM: an open-source ImageJ plug-in for spectroscopic single-molecule localization microscopy (sSMLM) data analysis and image reconstruction." Bioinformatics 36, no. 19 (July 14, 2020): 4972–74. http://dx.doi.org/10.1093/bioinformatics/btaa635.
Full textHasibuan, Ahmad Nurdin, Marsadi Aras, and E. Taufik Rahmat. "MEMBERIKAN PELATIHAN MICROSOFT OFFICE POWERPOINT MELALUI APLIKASI ZOOM DITENGAH PANDEMI COVID-19 BAGI SISWA MADRASAH TSANAWIYAH." Jurnal Pengabdian Teratai 2, no. 1 (June 30, 2021): 66–78. http://dx.doi.org/10.55122/teratai.v2i1.247.
Full textSil, Briti Sundar, Angana Borah, Shubrajyoti Deb, and Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'." Journal of Urban and Environmental Engineering 10, no. 2 (April 28, 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214-220.
Full textSil, Briti Sundar, Angana Borah, Shubrajyoti Deb, and Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'." Journal of Urban and Environmental Engineering 10, no. 2 (April 28, 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214220.
Full textVayadande, Kuldeep, Ankur Raut, Roshita Bhonsle, Vithika Pungliya, Atharva Purohit, and Samruddhi Pate. "Efficient system for CPU metric visualization." 3C TIC: Cuadernos de desarrollo aplicados a las TIC 11, no. 2 (December 29, 2022): 239–50. http://dx.doi.org/10.17993/3ctic.2022.112.239-250.
Full textMohammad, Marwa. "Applying Effective Software for Controlling Computers Remotely." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 10 (December 21, 2022): 188–96. http://dx.doi.org/10.47577/technium.v4i10.8023.
Full textHussain, Rashid, Andrew Scott Hackett, Sandra Álvarez-Carretero, and Lydia Tabernero. "VSpipe-GUI, an Interactive Graphical User Interface for Virtual Screening and Hit Selection." International Journal of Molecular Sciences 25, no. 4 (February 7, 2024): 2002. http://dx.doi.org/10.3390/ijms25042002.
Full textPeng, Tianqi, Bei Gong, and Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain." Applied Sciences 13, no. 18 (September 8, 2023): 10151. http://dx.doi.org/10.3390/app131810151.
Full textAriyadi, Tamsir, and M. Rizky Pohan. "Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators." Jurnal Penelitian Pendidikan IPA 9, no. 12 (December 20, 2023): 10768–75. http://dx.doi.org/10.29303/jppipa.v9i12.5551.
Full textZhang, Liujing, Jin Li, Wenyang Guan, and Xiaoqin Lian. "Optimization of User Service Rate with Image Compression in Edge Computing-Based Vehicular Networks." Mathematics 12, no. 4 (February 12, 2024): 558. http://dx.doi.org/10.3390/math12040558.
Full textRodriguez-Colina, Enrique, Ricardo Marcelín-Jiménez, Leonardo Palacios-Luengas, and Michael Pascoe-Chalke. "System Design for Opportunistic Spectrum Access Using Statistical Decision-Making and Coded-MAC." Wireless Communications and Mobile Computing 2020 (October 22, 2020): 1–15. http://dx.doi.org/10.1155/2020/8816760.
Full textHerlian, Nola Verli, Komang Oka Saputra, and I. Gst A. Komang Diafari Djuni Hartawan. "Clock Skew Based Computer Identification on Different Types of Area Networks." Journal of Electrical, Electronics and Informatics 3, no. 1 (June 18, 2019): 25. http://dx.doi.org/10.24843/jeei.2019.v03.i01.p05.
Full textKorolkov, Roman. "AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKS." Cybersecurity: Education, Science, Technique 3, no. 11 (2021): 144–54. http://dx.doi.org/10.28925/2663-4023.2021.11.144154.
Full textNguyen, Duc-Thang, and Taehong Kim. "An SDN-Based Connectivity Control System for Wi-Fi Devices." Wireless Communications and Mobile Computing 2018 (July 24, 2018): 1–10. http://dx.doi.org/10.1155/2018/9359878.
Full textShuai, Yin, and A. S. Yuschenko. "Dialogue System of Controlling Robot Based on the Theory of Finite-State Automata." Mekhatronika, Avtomatizatsiya, Upravlenie 20, no. 11 (November 7, 2019): 686–95. http://dx.doi.org/10.17587/mau.20.686-695.
Full textPatil, Rashmi, and Rekha Patil. "Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks." International journal of Computer Networks & Communications 14, no. 4 (July 31, 2022): 81–98. http://dx.doi.org/10.5121/ijcnc.2022.14405.
Full textBrito, Celene. "Evaluation of circular skills and circular mind-set of consumers with the use of it - case study in a sample of consumers in northeast Brazil compared to a sample of internal stakeholders of an industry in transition to the circular economy." International Journal of Complementary & Alternative Medicine 16, no. 5 (October 26, 2023): 285–89. http://dx.doi.org/10.15406/ijcam.2023.16.00664.
Full textJain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (May 16, 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Full textMa, Yue Huai, Wei Zhang, Wen Hua Wang, and Yue Xuan Liu. "An Efficient Packet Scheduling and Resource Allocation Algorithm for Practical Multi-Layer Systems." Advanced Materials Research 926-930 (May 2014): 2951–54. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2951.
Full textسامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. "Intrusion Detection System for Misbehaving WLAN Users." journal of king abdulaziz university computing and information technology sciences 1, no. 1 (January 2, 2012): 55–81. http://dx.doi.org/10.4197/comp.1-1.3.
Full textSubramanyam, Radha, S. Rekha, P. Nagabushanam, and Sai Krishna Kondoju. "Optimization Techniques in Cooperative and Distributed MAC Protocols." International Journal of Intelligent Information Technologies 20, no. 1 (January 7, 2024): 1–23. http://dx.doi.org/10.4018/ijiit.335523.
Full textK, ARUNADEVI, and PADMAKUMARI O. "Evaluation of different filter materials used in drip irrigation systems." Madras Agricultural Journal 91, March (2004): 15–18. http://dx.doi.org/10.29321/maj.10.a00058.
Full textMoruf Adedeji, Adeagbo, Agbaje Halimah Adebimpe, and Kasali Abdulwakil Adekunle. "Data Visualization Analytic for Understanding the Dynamics of Operating System Using Programming Language Paradigm." International Journal of Data Science 3, no. 1 (June 30, 2022): 19–24. http://dx.doi.org/10.18517/ijods.3.1.19-24.2022.
Full textMuyu, Ronaldo, Christy Poluakan, and Undap E. B. Yeremia. "Understanding Usability Test of Operating Systems in University: Evidence from Indonesia." International Journal of Information Technology and Education 1, no. 2 (March 24, 2022): 1–7. http://dx.doi.org/10.62711/ijite.v1i2.29.
Full textSkowroński, Rafał, and Jerzy Brzeziński. "UI dApps Meet Decentralized Operating Systems." Electronics 11, no. 19 (September 22, 2022): 3004. http://dx.doi.org/10.3390/electronics11193004.
Full textBiswas, Abhijit, and Dushyanta Dutta. "Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308311.
Full textSongzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao, and Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions." Journal of Marine Science and Engineering 9, no. 5 (April 27, 2021): 468. http://dx.doi.org/10.3390/jmse9050468.
Full textRahim, Muddasir, Riaz Hussain, Irfan Latif Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Atif Shakeel, Qadeer Ul Hasan, Byung Moo Lee, and Shahzad A. Malik. "Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network." Wireless Communications and Mobile Computing 2021 (August 6, 2021): 1–22. http://dx.doi.org/10.1155/2021/5552012.
Full textHardeep Singh Saini, Prabhjot Kaur,. "“Hybrid MAC Methodology for Improving the QOS in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 2s (April 4, 2024): 293–305. http://dx.doi.org/10.52783/jes.1140.
Full textHardeep Singh Saini, Prabhjot Kaur ,. "“Hybrid MAC Methodology for Improving the Qos in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 819–32. http://dx.doi.org/10.52783/jes.824.
Full textPerel, Efrat, and Uri Yechiali. "FINITE TWO LAYERED QUEUEING SYSTEMS." Probability in the Engineering and Informational Sciences 30, no. 3 (May 18, 2016): 492–513. http://dx.doi.org/10.1017/s0269964816000139.
Full textUm, Myoung-Yong. "Smartphone Users Characteristics According to Differences between Operating Systems." Journal of Digital Convergence 12, no. 9 (September 28, 2014): 93–99. http://dx.doi.org/10.14400/jdc.2014.12.9.93.
Full textMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Full textQuang, Khanh Nguyen, Van Duc Nguyen, and Hyunseung Choo. "Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks." Journal of Computer Networks and Communications 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/962643.
Full textSuleesathira, Raungrong, and Jansilp Aksiripipatkul. "Selective decoding schemes and wireless MAC operating in MIMO ad hoc networks." Journal of Communications and Networks 13, no. 5 (October 2011): 421–27. http://dx.doi.org/10.1109/jcn.2011.6112298.
Full textPerković, T., A. Dagelić, M. Bugarić, and M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science." Security and Communication Networks 2020 (September 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.
Full textPerzyński, Tomasz, Daniel Pietruszczak, and Gracjan Ziółek. "Analysis of selected operating systems in mobile devices." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (June 30, 2018): 649–54. http://dx.doi.org/10.24136/atest.2018.150.
Full textTarafder, Pulok, and Wooyeol Choi. "MAC Protocols for mmWave Communication: A Comparative Survey." Sensors 22, no. 10 (May 19, 2022): 3853. http://dx.doi.org/10.3390/s22103853.
Full textCho, Chaeho, Yeonsang Seong, and Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security." Electronics 10, no. 20 (October 12, 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.
Full textCeballos, Henry Zárate, and Jorge Eduardo Ortiz Triviño. "S.O.V.O.R.A.: A Distributed Wireless Operating System." Information 11, no. 12 (December 14, 2020): 581. http://dx.doi.org/10.3390/info11120581.
Full textAdekotujo, Akinlolu, Adedoyin Odumabo, Ademola Adedokun, and Olukayode Aiyeniko. "A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS." International Journal of Computer Applications 176, no. 39 (July 15, 2020): 16–23. http://dx.doi.org/10.5120/ijca2020920494.
Full text