To see the other types of publications on this topic, follow the link: Symbian OS (Computer file).

Journal articles on the topic 'Symbian OS (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Symbian OS (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sun, Hairong. "Symbian OS Communications Programming." Computer Communications 27, no. 13 (August 2004): 1354. http://dx.doi.org/10.1016/j.comcom.2004.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pooters, Ivo. "Full user data acquisition from Symbian smart phones." Digital Investigation 6, no. 3-4 (May 2010): 125–35. http://dx.doi.org/10.1016/j.diin.2010.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cassinda Quissanga, Fernando. "Characterization of cellular mobile operating systems: Android, Symbian, iphone and Windows phone." Project, Design and Management 1, no. 2 (November 18, 2019): 75–88. http://dx.doi.org/10.35992/pdm.v1i2.200.

Full text
Abstract:
The present theme refers to the characterization of cellular mobile operating systems: Android, Symbian, iPhone, Windows Phone. To present which of the cellular mobile operating systems, is the most secure and the most susceptible to computer viruses, the qualitative methodology based on the bibliographic reference, data collected in books, technical manuals, manufacturer information and on internet sites; to the analysis of the documentary data, done in tables. However, it is concluded that not all types of computer viruses infect cell phones, it depends on the kernel of the operating system. It was possible to know that Symbian is the operating system most prone to contamination of computer viruses, this operating system is made of a C ++ programming language coming from the C language one of the most popular and has many developers. Android is a mobile operating system, not so secure, based on the kernel of Linux, being free software allows more number of developers of the technology. Windows phone is the least susceptible to virtual pests. And Microsoft has invested heavily in their security system, restricted access to the app store to prevent the user from downloading programs out of the market, since every day are placed numerous applications. Bluetooth technology represents a major form of virus transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

ZHANG, Lin, Yin-zhuo LUO, Meng-long YUAN, and Ming-shan LUO. "Design and implementation of a streaming media system for symbian based smartphone." Journal of China Universities of Posts and Telecommunications 17 (December 2010): 26–31. http://dx.doi.org/10.1016/s1005-8885(09)60587-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thrasher, T. S. "Computer File Format Standards." SPE Computer Applications 3, no. 01 (January 1, 1991): 15–18. http://dx.doi.org/10.2118/20596-pa.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Crampon, Jean E. "Multiple File Computer Searching." Reference Librarian 8, no. 19 (May 5, 1987): 195–207. http://dx.doi.org/10.1300/j120v08n19_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cornali, M., and A. P. Battaglia. "Computer-based teaching file." British Journal of Radiology 65, no. 770 (February 1992): 187. http://dx.doi.org/10.1259/0007-1285-65-770-187-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Penel, Simon, Hugo Menet, Théo Tricou, Vincent Daubin, and Eric Tannier. "Thirdkind: displaying phylogenetic encounters beyond 2-level reconciliation." Bioinformatics 38, no. 8 (February 9, 2022): 2350–52. http://dx.doi.org/10.1093/bioinformatics/btac062.

Full text
Abstract:
Abstract Motivation Reconciliation between a host and its symbiont phylogenies or between a species and a gene phylogenies is a prevalent approach in evolution, however no simple generic tool (i.e. virtually usable by all reconciliation software, from host/symbiont to species/gene comparisons) is available to visualize reconciliation results. Moreover there is no tool to visualize 3-levels reconciliations, i.e. to visualize 2 nested reconciliations as for example in a host/symbiont/gene complex. Results Thirdkind is a light and easy to install command line software producing svg files displaying reconciliations, including 3-levels reconciliations. It takes a standard format recPhyloXML as input, and is thus usable with most reconciliation software. Availability and implementation https://github.com/simonpenel/thirdkind/wiki. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
9

Vajk, Tamas, Paul Coulton, Will Bamford, and Reuben Edwards. "Using a Mobile Phone as a “Wii-like” Controller for Playing Games on a Large Public Display." International Journal of Computer Games Technology 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/539078.

Full text
Abstract:
Undoubtedly the biggest success amongst the recent games console releases has been the launch of the Nintendo Wii. This is arguably due to its most innovative attribute—the wireless controller or “Wiimote.” The Wiimote can be used as a versatile game controller, able to detect motion and rotation in three dimensions which allows for very innovative game play. Prior to the Wii, and with much less furor, Nokia launched its 5500 model phone which contains 3D motion sensors. Using the Sensor API library available for the Symbian OS, this sensor data can be used by developers to create interesting new control schemes for mobile games. Whilst 3D motion can be utilized for ondevice games, in this paper we present a novel system that connects these phones to large public game screens via Bluetooth where it becomes a game controller for a multiplayer game. We illustrate the potential of this system through a multiplayer driving game using the Microsoft XNA framework and present preliminary feedback on the user experience from a public trial which highlights that these controls can be both intuitive and fun.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaneko, Yutaka. "Image File Format on Computer." Journal of the Institute of Image Information and Television Engineers 54, no. 5 (2000): 672–73. http://dx.doi.org/10.3169/itej.54.672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hoffmann, Christoph. "Der Literarische Nachlass [computer file]." MLN 110, no. 3 (1995): 663–70. http://dx.doi.org/10.1353/mln.1995.0041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Harter, Stephen P. "PFS: Professional File: Easy file management." Electronic Library 5, no. 6 (June 1987): 324. http://dx.doi.org/10.1108/eb044772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gemayel, Nader. "Analyzing Google File System and Hadoop Distributed File System." Research Journal of Information Technology 8, no. 3 (March 1, 2016): 66–74. http://dx.doi.org/10.3923/rjit.2016.66.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Polotai, O., O. Belej, and N. Maltseva. "PHYSICAL CONTENT OF COMPUTER STEGANOGRAPHY." Bulletin of Lviv State University of Life Safety 23 (June 30, 2021): 27–32. http://dx.doi.org/10.32447/20784643.23.2021.04.

Full text
Abstract:
Introduction. The development of computer technology has given a new impetus to the use of computer steganography. However, it is important to understand the physical content of this type of steganography.Purpose. The work aims to describe the practical use and physical content of the phenomenon of computer steganography, the results of the study on the hiding of files in the stegocontainer.Results. Describes the main ns currently computer steganography methods are actively used to solve the following tasks: Protection of confidential information from unauthorized access, overcoming monitoring and management of net-work resources, software camouflage, copyright protection, which is manifested in the use of digital watermarks, is one of the most promising areas of computer steganography. Among the methods of hiding information in images, the most common is the category of algorithms using the lower bits of the image data. They are considered in this paper. These algorithms are based on the fact that in some file formats, the lower bits of the values, although present in the file, but do not affect a person's perception of sound or image. The steganographic software S-Tools was chosen for the study. We created two test monotonous images with the size of 50 × 50 pixels in 24-bit bmp format to analyze the peculiarities of the placement of stego-data in container files. We chose black and white images for the study. A text file was hidden in each of the images, after which the reverse action was performed - extracting the file. As a result of hiding, two stego files were obtained. The paper compared the binary content of the original images and files containing private data. For comparison, the binary content of the black square image and the contents of the stegocontainer with a latent text file are given. Note that the contents of the container and the stego file are only partially listed, but the addresses of the memory cells have selected accordingly. The right column shows the contents of the memory cells in hexadecimal format. The bytes that display the colour of the square are set to "00" because the original image contains only black. We noted that the contents of the cells responsible for the image changed after hiding additional data (this reflected by cells with values of "01"). The paper also describes the procedure for hiding a group of different types of files. During the study, we found that the image file (1920 × 1080 pixels) with a volume of 6,220,854 bytes can hide 777,584 bytes of information.Conclusion. When using steganography, the program uses some algorithms that hide confidential data among the contents of the container: bits of the hidden file replace the bits of the original file at random positions. Thus, the size of the source file and the container file (containing the attached information) is the same, even if you hide a different number of files or different amounts of data.
APA, Harvard, Vancouver, ISO, and other styles
15

Neville-Neil, George V. "File-system litter." Communications of the ACM 54, no. 10 (October 2011): 25–26. http://dx.doi.org/10.1145/2001269.2001282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Neville-Neil, George. "File-system Litter." Queue 9, no. 7 (July 2011): 20–22. http://dx.doi.org/10.1145/2001562.2003323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kelly-Bootle, Stan. "File under "Unknowable!"." Queue 3, no. 3 (April 2005): 64–65. http://dx.doi.org/10.1145/1059791.1059814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Weller, John M. "The computer and the reprint file." Immunology Today 7, no. 3 (March 1986): 92–94. http://dx.doi.org/10.1016/0167-5699(86)90092-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yang, Lei, Qin Quan Gao, De Lin Luo, and Shun Xiang Wu. "Analysis and Implementation of UFS File System Based on Computer Forensics." Applied Mechanics and Materials 39 (November 2010): 186–91. http://dx.doi.org/10.4028/www.scientific.net/amm.39.186.

Full text
Abstract:
UFS is the most important file system of the Unix OS and has been widely applied. Adequate understanding of its working principle and organization structure is the key that the computer forensics been successfully applied to this file system. Based on deep analysis of the system architecture and file access flow, this paper has proposed and realized a technology to analyse UFS file system and explored the data recovery thought. It provides forceful support for computer forensics technology applying to UFS .
APA, Harvard, Vancouver, ISO, and other styles
20

da Silveira Serafim, Vinı́cius, and Raul Fernando Weber. "Restraining and repairing file system damage through file integrity control." Computers & Security 23, no. 1 (February 2004): 52–62. http://dx.doi.org/10.1016/s0167-4048(04)00066-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jermey, Jonathan. "Locating files on computer disks." Indexer: The International Journal of Indexing 22, no. 3 (April 1, 2001): 130–32. http://dx.doi.org/10.3828/indexer.2001.22.3.7.

Full text
Abstract:
Over the last 20 years file storage capacity on personal computer systems has grown from the equivalent of a desk drawer to that of a medium-sized public library, and the trend is continuing. File retrieval methods have been developed on an ad hoc basis which has generally failed to keep up with this growth, but there are some encouraging and interesting developments in this area.
APA, Harvard, Vancouver, ISO, and other styles
22

Long, Saiqin, Yuelong Zhao, Wei Chen, and Yuanbin Tang. "A prediction-based dynamic file assignment strategy for parallel file systems." Parallel Computing 41 (January 2015): 1–13. http://dx.doi.org/10.1016/j.parco.2014.10.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Meek, Brian. "The static semantics file." ACM SIGPLAN Notices 25, no. 4 (April 1990): 33–42. http://dx.doi.org/10.1145/987481.987483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Karpovich, John F., Andrew S. Grimshaw, and James C. French. "Extensible file system (ELFS)." ACM SIGPLAN Notices 29, no. 10 (October 1994): 191–204. http://dx.doi.org/10.1145/191081.191112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Peter M., Wee Teck Ng, Subhachandra Chandra, Christopher Aycock, Gurushankar Rajamani, and David Lowell. "The Rio file cache." ACM SIGPLAN Notices 31, no. 9 (September 1996): 74–83. http://dx.doi.org/10.1145/248209.237154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Coffman, Jr., E. G., M. R. Garey, D. S. Johnson, and A. S. LaPaugh. "Scheduling File Transfers." SIAM Journal on Computing 14, no. 3 (August 1985): 744–80. http://dx.doi.org/10.1137/0214054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wygant, Robert M. "Data file management." Computers & Industrial Engineering 11, no. 1-4 (January 1986): 367–71. http://dx.doi.org/10.1016/0360-8352(86)90113-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jia, Dongmei, Wai Gen Yee, Linh Thai Nguyen, and Ophir Frieder. "Distributed, automatic file descriptor tuning in P2P file-sharing systems." Peer-to-Peer Networking and Applications 1, no. 2 (July 30, 2008): 148–61. http://dx.doi.org/10.1007/s12083-008-0012-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Guanyu, Yan Liu, and Yue Mao. "Understanding the log file data from educational and psychological computer-based testing: A scoping review protocol." PLOS ONE 19, no. 5 (May 23, 2024): e0304109. http://dx.doi.org/10.1371/journal.pone.0304109.

Full text
Abstract:
With the advancement of computer-based testing, log file data has drawn considerable attention from researchers. Although emerging studies have begun to explore log file data, there is a gap in the exploitation of log file data for capturing and understanding participants’ cognitive processes. The debate on how to maximize insights from log file data has not yet reached a consensus. Therefore, we present this protocol for a scoping review that aims to characterize the application of log file data in current publications, including the data pre-processing techniques, analytical methodologies, and theoretical frameworks used by researchers. This review will also aim to illuminate how log file data can enhance psychological and educational assessments. Our findings will highlight the opportunities and challenges presented by log file data as an emerging and essential source of evidence for future advancements in psychological and educational assessment.
APA, Harvard, Vancouver, ISO, and other styles
30

Calderón, A., F. García-Carballeira, L. M. Sánchez, J. D. García, and J. Fernandez. "Fault tolerant file models for parallel file systems: introducing distribution patterns for every file." Journal of Supercomputing 47, no. 3 (April 22, 2008): 312–34. http://dx.doi.org/10.1007/s11227-008-0199-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Gifford, David K., Roger M. Needham, and Michael D. Schroeder. "The Cedar file system." Communications of the ACM 31, no. 3 (March 1988): 288–98. http://dx.doi.org/10.1145/42392.42398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mahmood, A., H. U. Khan, and H. A. Fatmi. "Adaptive file allocation in distributed computer systems." Distributed Systems Engineering 1, no. 6 (December 1994): 354–61. http://dx.doi.org/10.1088/0967-1846/1/6/004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, C. T., Man-Keung Siu, K. Lam, and C. H. Chen. "Adaptive File Allocation in Star Computer Network." IEEE Transactions on Software Engineering SE-11, no. 9 (September 1985): 959–65. http://dx.doi.org/10.1109/tse.1985.232830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Caraway, Beatrice L. "Notes for Remote Access Computer File Serials." Serials Librarian 41, no. 3-4 (June 10, 2002): 147–68. http://dx.doi.org/10.1300/j123v41n03_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Gavish, Bezalel, and Olivia R. Liu Sheng. "Dynamic file migration in distributed computer systems." Communications of the ACM 33, no. 2 (February 1990): 177–89. http://dx.doi.org/10.1145/75577.75583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

SHEPPARD, BRIAN. "Lessons from an Archaeological Site Computer File." New Zealand Geographer 46, no. 1 (April 1990): 40–42. http://dx.doi.org/10.1111/j.1745-7939.1990.tb01947.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wolman, Yecheskel. "Computer Software Reviews. STN Personal File System." Journal of Chemical Information and Modeling 32, no. 5 (September 1, 1992): 572–73. http://dx.doi.org/10.1021/ci00009a604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Weiler, John M. "The computer and the reprint file (3)." Immunology Today 7, no. 5 (May 1986): 149–51. http://dx.doi.org/10.1016/0167-5699(86)90082-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ginsberg, Barry H. "The computer and the reprint file (4)." Immunology Today 7, no. 7-8 (July 1986): 247–48. http://dx.doi.org/10.1016/0167-5699(86)90115-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hesselink, Wim H., and M. I. Lali. "Formalizing a Hierarchical File System." Electronic Notes in Theoretical Computer Science 259 (December 2009): 67–85. http://dx.doi.org/10.1016/j.entcs.2009.12.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Brown, I. D., and B. McMahon. "The Crystallographic Information File (CIF)." Data Science Journal 5 (2006): 174–77. http://dx.doi.org/10.2481/dsj.5.174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Albadri, Nehad, and Stijn Dekeyser. "A novel file system supporting rich file classification." Computers and Electrical Engineering 103 (October 2022): 108081. http://dx.doi.org/10.1016/j.compeleceng.2022.108081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Meyer, Helen. "Free file encryption offered." Computers & Security 18, no. 3 (January 1999): 231. http://dx.doi.org/10.1016/s0167-4048(99)90931-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cohen, Fred, and Stephen Bruhns. "Two secure file servers." Computers & Security 7, no. 4 (August 1988): 409–14. http://dx.doi.org/10.1016/0167-4048(88)90581-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Conway, FJ, SF Boc, and JB Dacus. "Diagnosis of a computer-simulated podiatric patient." Journal of the American Podiatric Medical Association 81, no. 4 (April 1, 1991): 181–86. http://dx.doi.org/10.7547/87507315-81-4-181.

Full text
Abstract:
The authors discuss the use of computers in medicine. A patient presenting with a condition requiring surgery is represented by a data file in a computer program. The user obtains data from the file by selecting items from a menu. Data are presented on the screen in pop-up windows. By examining the data and making judgments, the user may determine the pathology and make first a provisional and then a definitive diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
46

Susanto, Heru, Mohammad Nabil Almunawar, Fang-Yie Leu, and Chin Kang Chen. "Android vs iOS or Others? SMD-OS Security Issues." International Journal of Technology Diffusion 7, no. 2 (April 2016): 1–18. http://dx.doi.org/10.4018/ijtd.2016040101.

Full text
Abstract:
A smart mobile device (SMD for short) has become indispensable for individuals nowadays. The most common SMD-OS (operating system) used such as Google's Android, Apple's iOS, Microsoft's Windows Phone, Nokia's Symbian, RIM's BlackBerry OS. Such OS can be installed on different brands of SMD, like Nokia, Samsung and Sony Ericsson, except for Apple's iOS, which is only available on Apple products. The authors' research is an attempt to provide a picture of preferences over the SMD-OS function and security, Generation Y perception, Brunei perspective, and compare with the actual circumstances of SMD (OS) security aspects and breaches in the world. The results are interesting. Generation Y, prefer SMD as their personal assistance, such as browsing, e-book, social network and online transaction. This can be easily understood since they are computer literate, technologically savvy and heavily involved in various online activities. In operating system point of view, the big two and most popular SMD-OS, android and iOS as major player, particularly in the function and security issues.
APA, Harvard, Vancouver, ISO, and other styles
47

Falk, Howard. "Document file searching." Electronic Library 16, no. 3 (March 1998): 199–209. http://dx.doi.org/10.1108/eb045639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Tao, Wang Hao Lee, Mingyuan Gao, and Jianying Zhou. "File Guard: automatic format-based media file sanitization." International Journal of Information Security 18, no. 6 (June 6, 2019): 701–13. http://dx.doi.org/10.1007/s10207-019-00440-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Su, Long Jiang, Shun Xiang Wu, and Da Cao. "Windows-Based Analysis for HFS+ File System." Advanced Materials Research 179-180 (January 2011): 538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.179-180.538.

Full text
Abstract:
HFS+ file system is a file system of the Mac OS. In order to achieve data manipulation of the file system based on the Windows OS for further computer forensics, not only do we introduce the principle and structure of HFS+ file system, but also propose a efficient method to analyze the file system. Research contains the exploration of the file system and program implementation to analyze the file system.
APA, Harvard, Vancouver, ISO, and other styles
50

Bang, Jewan, Byeongyeong Yoo, and Sangjin Lee. "Analysis of changes in file time attributes with file manipulation." Digital Investigation 7, no. 3-4 (April 2011): 135–44. http://dx.doi.org/10.1016/j.diin.2010.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography