Artículos de revistas sobre el tema "Operating systems - mac users"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Operating systems - mac users".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX". Microscopy Today 20, n.º 2 (28 de febrero de 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.
Texto completoSum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang y Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space". ISRN Communications and Networking 2011 (28 de junio de 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.
Texto completoFenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan y Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds". Proceedings on Privacy Enhancing Technologies 2021, n.º 3 (27 de abril de 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.
Texto completoShiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena y Evangelos Pallis. "Traffic-Based S-MAC". International Journal of Wireless Networks and Broadband Technologies 4, n.º 1 (enero de 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.
Texto completoRidwan y Adhi Susano. "APLIKASI EMAIL CLIENT MULTI-PLATFORM DENGAN ENKRIPSI DATA BERBASIS JAVA". Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, n.º 1 (10 de enero de 2023): 279–90. http://dx.doi.org/10.35870/jimik.v4i1.177.
Texto completoPrestridge, Eddie B. "Unix-based workstations for digital image processing and analysis". Proceedings, annual meeting, Electron Microscopy Society of America 54 (11 de agosto de 1996): 610–11. http://dx.doi.org/10.1017/s0424820100165513.
Texto completoBhurtel, Manish y Danda B. Rawat. "Unveiling the Landscape of Operating System Vulnerabilities". Future Internet 15, n.º 7 (24 de julio de 2023): 248. http://dx.doi.org/10.3390/fi15070248.
Texto completoAdekar, R. H. y A. K. Kureshi. "Performance Analysis of Heterogeneous Systems Ieee 802.11 and Ieee 802.16 Using Spectrum Sharing Mechanism". Advanced Engineering Forum 44 (17 de enero de 2022): 127–35. http://dx.doi.org/10.4028/www.scientific.net/aef.44.127.
Texto completoNasser, Hiba Imad y Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network". Bulletin of Electrical Engineering and Informatics 11, n.º 4 (1 de agosto de 2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.
Texto completoDavis, Janel L., Brian Soetikno, Ki-Hee Song, Yang Zhang, Cheng Sun y Hao F. Zhang. "RainbowSTORM: an open-source ImageJ plug-in for spectroscopic single-molecule localization microscopy (sSMLM) data analysis and image reconstruction". Bioinformatics 36, n.º 19 (14 de julio de 2020): 4972–74. http://dx.doi.org/10.1093/bioinformatics/btaa635.
Texto completoHasibuan, Ahmad Nurdin, Marsadi Aras y E. Taufik Rahmat. "MEMBERIKAN PELATIHAN MICROSOFT OFFICE POWERPOINT MELALUI APLIKASI ZOOM DITENGAH PANDEMI COVID-19 BAGI SISWA MADRASAH TSANAWIYAH". Jurnal Pengabdian Teratai 2, n.º 1 (30 de junio de 2021): 66–78. http://dx.doi.org/10.55122/teratai.v2i1.247.
Texto completoSil, Briti Sundar, Angana Borah, Shubrajyoti Deb y Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'". Journal of Urban and Environmental Engineering 10, n.º 2 (28 de abril de 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214-220.
Texto completoSil, Briti Sundar, Angana Borah, Shubrajyoti Deb y Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'". Journal of Urban and Environmental Engineering 10, n.º 2 (28 de abril de 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214220.
Texto completoVayadande, Kuldeep, Ankur Raut, Roshita Bhonsle, Vithika Pungliya, Atharva Purohit y Samruddhi Pate. "Efficient system for CPU metric visualization". 3C TIC: Cuadernos de desarrollo aplicados a las TIC 11, n.º 2 (29 de diciembre de 2022): 239–50. http://dx.doi.org/10.17993/3ctic.2022.112.239-250.
Texto completoMohammad, Marwa. "Applying Effective Software for Controlling Computers Remotely". Technium: Romanian Journal of Applied Sciences and Technology 4, n.º 10 (21 de diciembre de 2022): 188–96. http://dx.doi.org/10.47577/technium.v4i10.8023.
Texto completoHussain, Rashid, Andrew Scott Hackett, Sandra Álvarez-Carretero y Lydia Tabernero. "VSpipe-GUI, an Interactive Graphical User Interface for Virtual Screening and Hit Selection". International Journal of Molecular Sciences 25, n.º 4 (7 de febrero de 2024): 2002. http://dx.doi.org/10.3390/ijms25042002.
Texto completoPeng, Tianqi, Bei Gong y Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain". Applied Sciences 13, n.º 18 (8 de septiembre de 2023): 10151. http://dx.doi.org/10.3390/app131810151.
Texto completoAriyadi, Tamsir y M. Rizky Pohan. "Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators". Jurnal Penelitian Pendidikan IPA 9, n.º 12 (20 de diciembre de 2023): 10768–75. http://dx.doi.org/10.29303/jppipa.v9i12.5551.
Texto completoZhang, Liujing, Jin Li, Wenyang Guan y Xiaoqin Lian. "Optimization of User Service Rate with Image Compression in Edge Computing-Based Vehicular Networks". Mathematics 12, n.º 4 (12 de febrero de 2024): 558. http://dx.doi.org/10.3390/math12040558.
Texto completoRodriguez-Colina, Enrique, Ricardo Marcelín-Jiménez, Leonardo Palacios-Luengas y Michael Pascoe-Chalke. "System Design for Opportunistic Spectrum Access Using Statistical Decision-Making and Coded-MAC". Wireless Communications and Mobile Computing 2020 (22 de octubre de 2020): 1–15. http://dx.doi.org/10.1155/2020/8816760.
Texto completoHerlian, Nola Verli, Komang Oka Saputra y I. Gst A. Komang Diafari Djuni Hartawan. "Clock Skew Based Computer Identification on Different Types of Area Networks". Journal of Electrical, Electronics and Informatics 3, n.º 1 (18 de junio de 2019): 25. http://dx.doi.org/10.24843/jeei.2019.v03.i01.p05.
Texto completoKorolkov, Roman. "AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKS". Cybersecurity: Education, Science, Technique 3, n.º 11 (2021): 144–54. http://dx.doi.org/10.28925/2663-4023.2021.11.144154.
Texto completoNguyen, Duc-Thang y Taehong Kim. "An SDN-Based Connectivity Control System for Wi-Fi Devices". Wireless Communications and Mobile Computing 2018 (24 de julio de 2018): 1–10. http://dx.doi.org/10.1155/2018/9359878.
Texto completoShuai, Yin y A. S. Yuschenko. "Dialogue System of Controlling Robot Based on the Theory of Finite-State Automata". Mekhatronika, Avtomatizatsiya, Upravlenie 20, n.º 11 (7 de noviembre de 2019): 686–95. http://dx.doi.org/10.17587/mau.20.686-695.
Texto completoPatil, Rashmi y Rekha Patil. "Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks". International journal of Computer Networks & Communications 14, n.º 4 (31 de julio de 2022): 81–98. http://dx.doi.org/10.5121/ijcnc.2022.14405.
Texto completoBrito, Celene. "Evaluation of circular skills and circular mind-set of consumers with the use of it - case study in a sample of consumers in northeast Brazil compared to a sample of internal stakeholders of an industry in transition to the circular economy". International Journal of Complementary & Alternative Medicine 16, n.º 5 (26 de octubre de 2023): 285–89. http://dx.doi.org/10.15406/ijcam.2023.16.00664.
Texto completoJain, Lalit. "Computer Network: An Implementation of MAC Spoofing". International Journal of Engineering and Computer Science 12, n.º 05 (16 de mayo de 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Texto completoMa, Yue Huai, Wei Zhang, Wen Hua Wang y Yue Xuan Liu. "An Efficient Packet Scheduling and Resource Allocation Algorithm for Practical Multi-Layer Systems". Advanced Materials Research 926-930 (mayo de 2014): 2951–54. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2951.
Texto completoسامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. "Intrusion Detection System for Misbehaving WLAN Users". journal of king abdulaziz university computing and information technology sciences 1, n.º 1 (2 de enero de 2012): 55–81. http://dx.doi.org/10.4197/comp.1-1.3.
Texto completoSubramanyam, Radha, S. Rekha, P. Nagabushanam y Sai Krishna Kondoju. "Optimization Techniques in Cooperative and Distributed MAC Protocols". International Journal of Intelligent Information Technologies 20, n.º 1 (7 de enero de 2024): 1–23. http://dx.doi.org/10.4018/ijiit.335523.
Texto completoK, ARUNADEVI y PADMAKUMARI O. "Evaluation of different filter materials used in drip irrigation systems". Madras Agricultural Journal 91, March (2004): 15–18. http://dx.doi.org/10.29321/maj.10.a00058.
Texto completoMoruf Adedeji, Adeagbo, Agbaje Halimah Adebimpe y Kasali Abdulwakil Adekunle. "Data Visualization Analytic for Understanding the Dynamics of Operating System Using Programming Language Paradigm". International Journal of Data Science 3, n.º 1 (30 de junio de 2022): 19–24. http://dx.doi.org/10.18517/ijods.3.1.19-24.2022.
Texto completoMuyu, Ronaldo, Christy Poluakan y Undap E. B. Yeremia. "Understanding Usability Test of Operating Systems in University: Evidence from Indonesia". International Journal of Information Technology and Education 1, n.º 2 (24 de marzo de 2022): 1–7. http://dx.doi.org/10.62711/ijite.v1i2.29.
Texto completoSkowroński, Rafał y Jerzy Brzeziński. "UI dApps Meet Decentralized Operating Systems". Electronics 11, n.º 19 (22 de septiembre de 2022): 3004. http://dx.doi.org/10.3390/electronics11193004.
Texto completoBiswas, Abhijit y Dushyanta Dutta. "Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol". International Journal of Information Security and Privacy 16, n.º 2 (1 de abril de 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308311.
Texto completoSongzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao y Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions". Journal of Marine Science and Engineering 9, n.º 5 (27 de abril de 2021): 468. http://dx.doi.org/10.3390/jmse9050468.
Texto completoRahim, Muddasir, Riaz Hussain, Irfan Latif Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Atif Shakeel, Qadeer Ul Hasan, Byung Moo Lee y Shahzad A. Malik. "Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network". Wireless Communications and Mobile Computing 2021 (6 de agosto de 2021): 1–22. http://dx.doi.org/10.1155/2021/5552012.
Texto completoHardeep Singh Saini, Prabhjot Kaur,. "“Hybrid MAC Methodology for Improving the QOS in Fiber Wireless Network”". Journal of Electrical Systems 20, n.º 2s (4 de abril de 2024): 293–305. http://dx.doi.org/10.52783/jes.1140.
Texto completoHardeep Singh Saini, Prabhjot Kaur ,. "“Hybrid MAC Methodology for Improving the Qos in Fiber Wireless Network”". Journal of Electrical Systems 20, n.º 1s (28 de marzo de 2024): 819–32. http://dx.doi.org/10.52783/jes.824.
Texto completoPerel, Efrat y Uri Yechiali. "FINITE TWO LAYERED QUEUEING SYSTEMS". Probability in the Engineering and Informational Sciences 30, n.º 3 (18 de mayo de 2016): 492–513. http://dx.doi.org/10.1017/s0269964816000139.
Texto completoUm, Myoung-Yong. "Smartphone Users Characteristics According to Differences between Operating Systems". Journal of Digital Convergence 12, n.º 9 (28 de septiembre de 2014): 93–99. http://dx.doi.org/10.14400/jdc.2014.12.9.93.
Texto completoMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes y Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completoQuang, Khanh Nguyen, Van Duc Nguyen y Hyunseung Choo. "Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks". Journal of Computer Networks and Communications 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/962643.
Texto completoSuleesathira, Raungrong y Jansilp Aksiripipatkul. "Selective decoding schemes and wireless MAC operating in MIMO ad hoc networks". Journal of Communications and Networks 13, n.º 5 (octubre de 2011): 421–27. http://dx.doi.org/10.1109/jcn.2011.6112298.
Texto completoPerković, T., A. Dagelić, M. Bugarić y M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science". Security and Communication Networks 2020 (7 de septiembre de 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.
Texto completoPerzyński, Tomasz, Daniel Pietruszczak y Gracjan Ziółek. "Analysis of selected operating systems in mobile devices". AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, n.º 6 (30 de junio de 2018): 649–54. http://dx.doi.org/10.24136/atest.2018.150.
Texto completoTarafder, Pulok y Wooyeol Choi. "MAC Protocols for mmWave Communication: A Comparative Survey". Sensors 22, n.º 10 (19 de mayo de 2022): 3853. http://dx.doi.org/10.3390/s22103853.
Texto completoCho, Chaeho, Yeonsang Seong y Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security". Electronics 10, n.º 20 (12 de octubre de 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.
Texto completoCeballos, Henry Zárate y Jorge Eduardo Ortiz Triviño. "S.O.V.O.R.A.: A Distributed Wireless Operating System". Information 11, n.º 12 (14 de diciembre de 2020): 581. http://dx.doi.org/10.3390/info11120581.
Texto completoAdekotujo, Akinlolu, Adedoyin Odumabo, Ademola Adedokun y Olukayode Aiyeniko. "A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS". International Journal of Computer Applications 176, n.º 39 (15 de julio de 2020): 16–23. http://dx.doi.org/10.5120/ijca2020920494.
Texto completo