Littérature scientifique sur le sujet « Mac users »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Mac users ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Mac users"

1

Frances Webber. « Mac users ». Socialist Lawyer, no 66 (2014) : 46. http://dx.doi.org/10.13169/socialistlawyer.66.0046a.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Shiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena et Evangelos Pallis. « Traffic-Based S-MAC ». International Journal of Wireless Networks and Broadband Technologies 4, no 1 (janvier 2015) : 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.

Texte intégral
Résumé :
Mobile Peer-to-Peer (MP2P) is a networking paradigm that will be exploited in the future to support technological advances and systems for the efficient provision of multiple services to mobile users. In a general context, the mobile community seeks to invest in on-the-fly services, by minimizing the effort and the increasing mobile users' performance. In this framework, the mobile Ad-Hoc Networks provide mobile nodes the flexibility of operating as flexible networking points, without the use of a centralized entity, where issues such as the energy consumption and the data packets transmission failure arise along with many more. Towards minimizing the factors that contribute to the increased consumption of the energy and the resources, as well as the loss of data, a Traffic-based S-MAC protocol is proposed in this paper to increase the data exchange and preserve the energy conservation, among the nodes in mobile Ad-Hoc Networks. The performance of the proposed protocol was thoroughly evaluated, by conducting multiple experimental results. The results verify the efficient performance of the protocol and indicate fields for further research and experimentation.
Styles APA, Harvard, Vancouver, ISO, etc.
3

سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. « Intrusion Detection System for Misbehaving WLAN Users ». journal of king abdulaziz university computing and information technology sciences 1, no 1 (2 janvier 2012) : 55–81. http://dx.doi.org/10.4197/comp.1-1.3.

Texte intégral
Résumé :
Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan et Erik Rye. « Three Years Later : A Study of MAC Address Randomization In Mobile Devices And When It Succeeds ». Proceedings on Privacy Enhancing Technologies 2021, no 3 (27 avril 2021) : 164–81. http://dx.doi.org/10.2478/popets-2021-0042.

Texte intégral
Résumé :
Abstract Mobile device manufacturers and operating system developers increasingly deploy MAC address randomization to protect user privacy and prevent adversaries from tracking persistent hardware identifiers. Early MAC address randomization implementations suffered from logic bugs and information leakages that defeated the privacy benefits realized by using temporary, random addresses, allowing devices and users to be tracked in the wild. Recent work either assumes these implementation flaws continue to exist in modern MAC address randomization implementations, or considers only dated software or small numbers of devices. In this work, we revisit MAC address randomization by performing a cross-sectional study of 160 models of mobile phones, including modern devices released subsequent to previous studies. We tested each of these phones in a lab setting to determine whether it uses randomization, under what conditions it randomizes its MAC address, and whether it mitigates known tracking vulnerabilities. Our results show that, although very new phones with updated operating systems generally provide a high degree of privacy to their users, there are still many phones in wide use today that do not effectively prevent tracking.
Styles APA, Harvard, Vancouver, ISO, etc.
5

M, Anusha, Srikanth Vemuru et T. Gunasekhar. « Transmission protocols in Cognitive Radio Mesh Networks ». International Journal of Electrical and Computer Engineering (IJECE) 5, no 6 (1 décembre 2015) : 1446. http://dx.doi.org/10.11591/ijece.v5i6.pp1446-1451.

Texte intégral
Résumé :
A Cognitive Radio (CR) is a radio that can adjust its transmission limit based on available spectrum in its operational surroundings. Cognitive Radio Network (CRN) is made up of both the licensed users and unlicensed users with CR enable and disabled radios. CR’S supports to access dynamic spectrum and supports secondary user to access underutilized spectrum efficiently, which was allocated to primary users. In CRN’S most of the research was done on spectrum allocation, spectrum sensing and spectrum sharing. In this literature, we present various Medium Access (MAC) protocols of CRN’S. This study would provide an excellent study of MAC strategies.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Tan, Min Sheng, Hai Tao Tan, Meng Chen et Xiang Li. « The Improvement of Preamble Mechanism and Addition of TDMA/CSMA Mechanism for B-MAC ». Applied Mechanics and Materials 48-49 (février 2011) : 1261–64. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.1261.

Texte intégral
Résumé :
B-MAC was a kind of MAC protocol which was widely used in Wireless Sensor Networks (WSNs), and some high requirements had been provided for users. However, there were always challenges due to the high energy consumption and packets loss rate. A new MAC protocol called B-MAC++ based on B-MAC was proposed in this paper. The preamble mechanism was improved and funneling effect alleviation mechanism was brought out in B-MAC++. For the combination of the strengths of TDMA and CSMA, the preamble mechanism improvement achieved better energy-efficient, and made up to the weakness of WSNs, and a kind of CSMA/TDMA mechanism was introduced to alleviate funneling effect, and the sink-node’s packet loss had been reduced. Experiments show that B-MAC++ is better than B-MAC in the performance of energy consumption and packet loss rate.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wu, Chien-Min, Yen-Chun Kao et Kai-Fu Chang. « A Multichannel MAC Protocol for IoT-enabled Cognitive Radio Ad Hoc Networks ». Advances in Technology Innovation 5, no 1 (1 janvier 2020) : 45–55. http://dx.doi.org/10.46604/aiti.2020.3946.

Texte intégral
Résumé :
Cognitive radios have the ability to dynamically sense and access the wireless spectrum, and this ability is a key factor in successfully building Internet-of-Things (IoT)-enabled mobile ad hoc networks. This paper proposes a contention-free token-based multichannel MAC protocol for IoT-enabled Cognitive Radio Ad Hoc Networks (CRAHNs). In this, secondary users of CRAHNs detect activity on the wireless spectrum and then access idle channels licensed by primary users. CRAHNs are divided into clusters, and the channel to use for transmission is determined dynamically from the probability of finding idle primary-user channels. The token-based MAC window size is adaptive, with adjustment according to actual traffic, which reduces both end-to-end MAC contention delay and energy consumption. High throughput and spatial reuse of channels can also be achieved using a dynamic control channel and dynamic schemes for contention windows. We performed extensive simulations to verify that the proposed method can achieve better performance in mobile CRAHNs than other MAC schemes can.
Styles APA, Harvard, Vancouver, ISO, etc.
8

HU, VINCENT C., D. RICHARD KUHN, TAO XIE et JEEHYUN HWANG. « MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES ». International Journal of Software Engineering and Knowledge Engineering 21, no 01 (février 2011) : 103–27. http://dx.doi.org/10.1142/s021819401100513x.

Texte intégral
Résumé :
Mandatory access control (MAC) mechanisms control which users or processes have access to which resources in a system. MAC policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of the policies is a very challenging problem. To formally and precisely capture the security properties that MAC should adhere to, MAC models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a standardized structure for MAC models, providing for both property verification and automated generation of test cases. The approach expresses MAC models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify the integrity, coverage, and confinement of these properties for the MAC models and finally generates test cases via combinatorial covering array for the system implementations of the models.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ausaf, Asfund, Mohammad Zubair Khan, Muhammad Awais Javed et Ali Kashif Bashir. « WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications ». Future Internet 12, no 1 (11 janvier 2020) : 11. http://dx.doi.org/10.3390/fi12010011.

Texte intégral
Résumé :
Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2.4 GHz and are subject to interference caused by high-powered IEEE 802.11-compliant Wireless Local Area Network (WLAN) users. This interference causes frequent packet drop and energy loss for IoT users. In this work, we propose a WLAN Aware Cognitive Medium Access Control (WAC-MAC) protocol for IoT users that uses techniques, such as energy detection based sensing, adaptive wake-up scheduling, and adaptive backoff, to reduce interference with the WSN and improve network lifetime of the IoT users. Results show that the proposed WAC-MAC achieves a higher packet reception rate and reduces the energy consumption of IoT nodes.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Hu, Xiaofeng, Xianzhong Xie et Ting Song. « Cross-Layer Performance Analysis of the Unreliable Data Transmission for Decentralized Cognitive MAC Protocol under Multiple Secondary Users Scenario ». Journal of Systems Science and Information 1, no 1 (25 février 2013) : 74–85. http://dx.doi.org/10.1515/jssi-2013-0074.

Texte intégral
Résumé :
AbstractThe effect of multiple secondary users detecting the same primary user channel during a minor period on the performance of traditional energy detection is investigated. In order to achieve the target probability of detection, the minimum sampling time (MST) for energy detection is derived under the limitation of energy detection (LED), when the random arrival of the secondary users is taken into account. Jointly considering both spectrum sensing and access, we derive the probability of unreliable data transmission for decentralized cognitive MAC (DC-MAC) protocol based on MST under LED. The numerical results show that the simulation and theoretical analysis match very well. The reliability of data transmission is significantly degraded by the secondary users’ traffic. With the target probability of detection increasing, the reliable throughput reduces.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Mac users"

1

Smith, Lesley-Ann. « 'Mad, bad and dangerous to know' : exploring the everyday spaces of older, mental health service users ». Thesis, University of Northampton, 2012. http://nectar.northampton.ac.uk/5423/.

Texte intégral
Résumé :
The area of mental health distress is one that crosses many disciplines including; psychiatry, critical psychiatry, psychology, critical psychology, history, politics, economics, philosophy, sociology, culture and human geographies (Thrift, 2006). Consequently, there are a complex set of issues to consider when discussing the experiences of being a mental health service user. Notwithstanding this diversity, such representations of mental health have a tendency to position service users as a fairly homogenous and static group of bodies – in other words, they are the stable ‘other’ (Conradson, 2005; Parr, 2000). As a way of exploring the complexity, this thesis sets out to explore the multiplex constituents and heterogeneous ways in which daily service user life is played out within everyday mental health spatial contexts. These spaces incorporate the psychiatric institution, the mental health day centre and the home. Using interviews, ethnography, poetry and visual ethnographies, service users’ experiences are analysed by exploring the relational aspects of the discursive and the non-discursive, such as receiving a diagnostic label and subsequent treatments and the ways in which these practices permeate the embodied and spatial experiences of every day service user life. This corpus of research data suggests that rather than the experiences of mental health distress operating as a stratified set of factors awaiting analysis, there were divergent accounts incorporating positivity, negativity and ambivalence in the ways which service users made meanings of their daily lives (Brown & Tucker, 2010). Consequently, this thesis is framed around the ontological realms of creativity, potentiality and of becoming within and through space (Deleuze & Guattari, 2004; Massumi, 2002). Finally, some implications of the current political changes and how these may impact upon daily service user life are discussed to highlight that mental health service users’ are always on the move.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Do, Nascimento Hugo Alexandre Dantas. « User hints for optimisation processes ». Thesis, The University of Sydney, 2003. http://hdl.handle.net/2123/591.

Texte intégral
Résumé :
Innovative improvements in the area of Human-Computer Interaction and User Interfaces have en-abled intuitive and effective applications for a variety of problems. On the other hand, there has also been the realization that several real-world optimization problems still cannot be totally auto-mated. Very often, user interaction is necessary for refining the optimization problem, managing the computational resources available, or validating or adjusting a computer-generated solution. This thesis investigates how humans can help optimization methods to solve such difficult prob-lems. It presents an interactive framework where users play a dynamic and important role by pro-viding hints. Hints are actions that help to insert domain knowledge, to escape from local minima, to reduce the space of solutions to be explored, or to avoid ambiguity when there is more than one optimal solution. Examples of user hints are adjustments of constraints and of an objective function, focusing automatic methods on a subproblem of higher importance, and manual changes of an ex-isting solution. User hints are given in an intuitive way through a graphical interface. Visualization tools are also included in order to inform about the state of the optimization process. We apply the User Hints framework to three combinatorial optimization problems: Graph Clus-tering, Graph Drawing and Map Labeling. Prototype systems are presented and evaluated for each problem. The results of the study indicate that optimization processes can benefit from human interaction. The main goal of this thesis is to list cases where human interaction is helpful, and provide an ar-chitecture for supporting interactive optimization. Our contributions include the general User Hints framework and particular implementations of it for each optimization problem. We also present a general process, with guidelines, for applying our framework to other optimization problems.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Do, Nascimento Hugo Alexandre Dantas. « User hints for optimisation processes ». University of Sydney. Information Technologies, 2003. http://hdl.handle.net/2123/591.

Texte intégral
Résumé :
Innovative improvements in the area of Human-Computer Interaction and User Interfaces have en-abled intuitive and effective applications for a variety of problems. On the other hand, there has also been the realization that several real-world optimization problems still cannot be totally auto-mated. Very often, user interaction is necessary for refining the optimization problem, managing the computational resources available, or validating or adjusting a computer-generated solution. This thesis investigates how humans can help optimization methods to solve such difficult prob-lems. It presents an interactive framework where users play a dynamic and important role by pro-viding hints. Hints are actions that help to insert domain knowledge, to escape from local minima, to reduce the space of solutions to be explored, or to avoid ambiguity when there is more than one optimal solution. Examples of user hints are adjustments of constraints and of an objective function, focusing automatic methods on a subproblem of higher importance, and manual changes of an ex-isting solution. User hints are given in an intuitive way through a graphical interface. Visualization tools are also included in order to inform about the state of the optimization process. We apply the User Hints framework to three combinatorial optimization problems: Graph Clus-tering, Graph Drawing and Map Labeling. Prototype systems are presented and evaluated for each problem. The results of the study indicate that optimization processes can benefit from human interaction. The main goal of this thesis is to list cases where human interaction is helpful, and provide an ar-chitecture for supporting interactive optimization. Our contributions include the general User Hints framework and particular implementations of it for each optimization problem. We also present a general process, with guidelines, for applying our framework to other optimization problems.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Raileanu, Petrut. « “Why you mad?” - User and media perception on game design anti-piracy measures ». Thesis, Uppsala universitet, Institutionen för speldesign, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413147.

Texte intégral
Résumé :
Video game developers have implemented multiple measures to combat piracy throughout history. One of these measures, defined in this study as in-game anti-piracy measures, prevents player progression on unauthorized copies by degrading gameplay or drastically increasing the difficulty.This study conducts a content analysis research on textual data gathered from the world wide web to assess the public perception in regards to this type of anti-piracy measures. The data gathered for this study consists of 425 statements in the form of comments and forum posts that have been coded, divided into themes and then analyzed inductively to generate findings that can be linked to Moshirnia’s (2012) previous research.Even though no clear results occurred that can confirm Moshirnia’s (2012) findings, this study has discovered a potential connection between in-game anti-piracy measures promoting piracy. The findings also suggest that the unique “broke features” might lead to the popularization of games modded to let legitimate users experience them too.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lim, Seau Sian. « Antenna array single- and multi-user DS-CDMA receivers ». Thesis, Imperial College London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.367916.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Hoff, Patrick R. « Translation of user needs to system requirements ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FHoff.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Green, John M. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Architecture, architecture framework, DoDAF, JCIDS, requirements, systems engineering Includes bibliographical references (p. 105-111). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Hopfstock, Anja. « A User-Oriented Map Design in the SDI Environment ». Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-71981.

Texte intégral
Résumé :
The ever increasing demand of our information society for reliable Geographic Information (GI) is the moving power for the development and maintenance of Spatial Data Infrastructures (SDI). Consequently, an SDI works to full benefit of its users if the SDI data collection is accessible and can be efficiently used by all users in spatial problem solving and decision-making. Current development and use of SDI focuses on handling geospatial data entirely by means of information technology. Thereby, low awareness seems to be paid to a user-friendly and understandable presentation of geospatial data. Based on the understanding that GI is the result of human geospatial information processing, it is argued that cartography is essential in the SDI context in order to achieve the objectives of SDI. Specifically, the thesis aimed at exploring the concept of user-oriented map design in relation to SDI and elaborating a methodology for creating effective cartographic representations for SDI relevant user types. First of all, the SDI concept, its objectives and principles are explored using the example of the current European SDI initiatives as to the human aspect of an SDI. Secondly, in order to determine the role and task of cartography in the SDI context, the conceptual framework of contemporary cartography is reviewed to provide the theoretical and technological framework for a user-oriented map design. Given this, the SDI environment is assessed in relation to cartography with respect to the services providing access to the SDI data collection. Further, an SDI map production framework is elaborated utilising Spiess’ concept of the graphic filter as a model for the transformation of SDI data into useful cartographic representations. Besides, the map design strategy by Grünreich provides the starting point for developing the process of map production. The main tasks are detailed and justified taking into consideration the semiotic-cognitive and action-related concepts underpinning contemporary cartography. The applied research encompasses a case study which is performed to implement and, thus, evaluate the proposed methodology. It starts from a use case scenario where an international spatial planning team requires getting familiar with the overall geographic characteristics of a European cross-border area. Following the process steps of user-oriented map design in the SDI environment, a map design specification is elaborated and implemented under real world conditions. The elaborated methodology for creating user-friendly and understandable cartographic representations of geospatial data in the SDI environment is based on theoretical and technological foundation of contemporary cartography. Map design in the SDI context, first of all, means to establish a graphic filter that determines the parameters and rules of the cartographic transformation process to be applied. As both an applied art and engineering the design of the graphic filter is a creative process developing a map design solution which enables SDI users to easily produce their map. It requires on the one hand an understanding of map use, map user and map use situation, and on the other hand insight into the data used as the source. The case study proves that the elaborated methodology is practicable and functional. Cartographic reverse engineering provides a systematic and pragmatic approach to the cartographic design task. This way, map design solutions can be built upon existing cartographic experience and common traditions as suggested by the INSPIRE recommendation for portrayal. The resulting design solution constitutes a prototype of a European Reference Map at medium scale built upon existing cartographic experience and common traditions. A user-friendly, understandable and comparable presentation of geospatial data in Europe would support the human and institutional potential for cross-border cooperation and collaboration. Besides that, the test implementation shows that tools are available which make it technically feasible and viable to produce a map from geospatial data in the SDI data collection. The research project raises awareness to the human aspect of SDI inherit in its objective to support end users to derive GI and knowledge from the geospatial data gathered in the SDI data collection. The role and task of cartography in the SDI context is to contribute to the initiation, creation, and maintenance of portrayal services to facilitate a comprehensive access to the underlying geospatial data by means of a user-friendly and understandable graphic interface. For cartography to take effect in the SDI development and use, cartographic design knowledge has to be made explicit and operational. It is the responsibility of cartographic professionals to prepare the map design. The wide range of map use contexts requires a great flexibility of design variants depending on the dimension of human-map interaction. Therefore, the design of the maps needs to be user-driven to enable an efficient map use in the user’s task. Besides their function as a graphic interface, maps facilitate a common understanding of the depicted geographic features and phenomena when sharing GI between SDI users. In other words, map design can be regarded a measure to establish interoperability of geospatial data beyond the technical level. The research work is in the scope of communication cartography, a research domain seeking to deepen the understanding of the role of cartographic expressions when understanding and communication of GI is involved
Der wachsende Bedarf unserer Wissensgesellschaft an zuverlässigen Informationen über räumliche Strukturen und Sachverhalte ist die treibende Kraft bei Aufbau und Einsatz von Geodateninfrastrukturen (GDI). Eine Geodateninfrastruktur wirkt zum vollen Nutzen der Gesellschaft, wenn die Daten in der GDI zugänglich sind und effektiv für Erkenntnis- und Entscheidungsprozesse genutzt werden können. Die gegenwärtige Entwicklung von GDI setzt auf moderne Informationstechnologien bei der Geodatenverarbeitung. Dabei, wird einer bedarfsgerechten und nutzerfreundlichen Präsentation von Geodaten in ansprechender visueller Form wenig Aufmerksamkeit zuteil. Da Geoinformation erst durch die Interaktion des Nutzers mit den Geodaten entsteht, ist es Aufgabe der Kartographie, bedarfsgerechte Kartendarstellungen zu gestalten und an der Schnittstelle zwischen einer Geodateninfrastruktur und ihren Nutzern bereitzustellen. Ziel der vorliegenden Dissertation ist es, eine Methodik für den Kartenherstellungsprozess in einer GDI-Umgebung zu entwickeln und beispielhaft zu erproben. Zunächst, werden Konzept, Ziele und Prinzipien von Geodateninfrastruktur beispielhaft anhand der Europäischen GDI-Initiativen dargestellt und hinsichtlich des Bedarfs an kartographischen Darstellungen untersucht. Danach wird, ausgehend von der Forderung nach verständlichen und gut interpretierbaren Geoinformationen, die Rolle der Kartographie im GDI-Kontext bestimmt. Dabei werden zunächst Funktion und Aufgaben der Kartographie sowie die tragenden Konzepte und Grundlagen einer nutzerorientierten Kartengestaltung dargelegt. Der Vergleich der bestehenden Geodatenzugangsdienste zur Funktion der Kartographie ergibt eine Lücke, die es zu schließen gilt, um den Nutzeranforderungen gerecht zu werden. Dazu wird der Gesamtprozess für die Herstellung von Karten im GDI-Kontext beschrieben. In diesem Prozess kommt dem Graphikfilter von Spiess (2003) besondere Bedeutung als Modell eines wissensbasierten Systems zur Aufstellung und Umsetzung von kartographischen Gestaltungsregeln zu. Den Ausgangspunkt für die Ausarbeitung der Teilprozesse bieten die von Grünreich (2008) vorgeschlagenen Teilaufgaben der Kartographie im Rahmen der GDI. Mittels eines Anwendungsfalls im Europäischen Kontext wird der vorgeschlagene Gesamtprozess erprobt. Dieses Beispiel geht davon aus, dass eine internationale Planungsgruppe im Zuge der Konzeption einer grenzüberschreitenden Verkehrsverbindung eine anschauliche Beschreibung der Landschaft in Form einer einheitlich gestalteten und flächendeckenden Karte benötigt. Durch Anwendung des kartographischen Reverse Engineering anerkannt gut gestalteter Karten werden die Vorgaben für die Kartengestaltung ermittelt. Einschließlich der Anwendung auf konkrete GDI-Daten wird der zuvor entwickelte Herstellungsprozess ausgeführt und diskutiert. Die entwickelte Methodik für den Kartenherstellungsprozess in der GDI-Umgebung basiert auf den semiotisch-kognitiven und handlungstheoretischen Konzepten der modernen Kartographie. Kartengestaltung im Kontext von Geodateninfrastrukturen bedeutet die Entwicklung eines Graphikfilters, der eine optimale bedarfsgerechte Visualisierung der Geodaten mittels nutzerspezifischer Parameter und Gestaltungsregeln ermöglicht. Wie das Fallbeispiel zeigt, ist es die durch die entwickelte Methodik möglich, brauchbare und nützliche Kartendarstellungen zu gestalten. Die Anwendung des kartographischen Reverse Engineering erlaubt es, Kartendarstellungen zu entwickeln, die - wie von INSPIRE empfohlen - bewährten kartographischen Erfahrungen und allgemeinen Traditionen entsprechen. Das Ergebnis des Anwendungsfalls ist ein Prototyp einer Europäischen Referenzkarte im Maßstab 1: 250,000. Die einheitliche und somit vergleichbare Darstellung über Grenzen hinweg unterstützt das Planungsteam in seiner Arbeit. Die praktische Umsetzung der Karte zeigt zudem, dass funktionsfähige Werkzeuge und Technologien für die regelbasierte Kartenherstellung aus GDI-Daten vorhanden sind. Die Dissertation trägt dazu bei, das Bewusstsein für den menschlichen Aspekt der Nutzung einer Geodateninfrastruktur zu schärfen. Der Beitrag der Kartographie zur Nutzung der Geodaten einer GDI besteht in der Initiierung, Gestaltung und Pflege von Darstellungsdiensten, da die Nutzbarkeit der Geodaten am besten gewährleistet ist, wenn die Gestaltungsmethoden der Kartographie angewendet werden. Dabei liegt es in der Verantwortung der Kartographen, die nutzerseitigen Aspekte dieser graphischen Schnittstelle unter Berücksichtigung der modernen kartographischen Konzepte zu betreuen. Gemäß INSPIRE-Richtlinie werden auf Karten gestützte Informationen bei zahlreichen Tätigkeiten verwendet. Für eine effektive visuelle Informationsverarbeitung durch den Nutzer ist daher eine nutzerorientierte Kartengestaltung in Abhängigkeit von der geplanten Interaktion (z.B. Kommunikation oder Analyse) unerlässlich. Neben der Funktion als Schnittstelle machen kartographische Darstellungen räumliche Strukturen verständlich. Daher ist die Kartenherstellung im GDI-Kontext eine Maßnahme, um Interoperabilität von Geodaten über die technische Ebene hinaus auf menschlicher Ebene zu ermöglichen. Die Relevanz dieser Forschungsarbeit liegt im Bereich der Kommunikationskartographie, die die Effektivität und Verbindlichkeit der Kommunikation über räumliche Strukturen und Sachverhalte zu vertiefen sucht
Styles APA, Harvard, Vancouver, ISO, etc.
8

Hayden, Marie A. « Engaging Users through the Application of Value Stream Mapping to Streamline the Procurement Process for Office Equipment ». Ohio University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1471354005.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hall, Peter Alec. « Uses of Mapping in Design Criticism and Practice ». Thesis, Griffith University, 2014. http://hdl.handle.net/10072/367228.

Texte intégral
Résumé :
This exegesis presents a selection of my published work of the last twenty years as original research into the uses of mapping in design practice and criticism. The argument springs from three understandings of the term ‘mapping’: as a practical term, denoting the practice of map-­‐making and visualisation, as a relational term, describing the discourse-­‐driven approach to design writing and criticism advocated here, and as a reflexive term, describing a process of situated self-­‐reflection. While a substantial part of my work published since the book Else/Where: Mapping (Abrams and Hall, 2006) covers mapping and visualisation outcomes as its subject matter, my interest in mapping as a research method extends the scope beyond things that look like diagrams and maps. Of particular relevance is the use of mapping to denote the designerly methods of framing, selecting, connecting and arranging causal relationships in the service of uncovering new possibilities. When informed by psychogeographic traditions, the map-­‐maker does not pretend to detached omniscience, but is implicated the relational structure developed. Each mapping, whether its output is visual or textual, is a formative iteration. In this sense, this exegesis is also a mapping of my critical development, tracing the passage of design writing from the reporting methods learned on trade magazines to more critical methods of design research and analysis.
Thesis (PhD Doctorate)
Doctor of Philosophy by Publication (PhD)
Queensland College of Art
Arts, Education and Law
Full Text
Styles APA, Harvard, Vancouver, ISO, etc.
10

He, Chao. « Improving System Performance in Cellular and WBAN Networks via User-Specific QoS and MIMO In Vivo Technologies ». Scholar Commons, 2015. https://scholarcommons.usf.edu/etd/5496.

Texte intégral
Résumé :
This dissertation is composed of two independent studies: Cellular research and WBAN (Wireless Body Area Network) research. Both investigations are directed towards improving the system performance in wireless communication systems in terms of Quality of Service (QoS) and system capacity. For the Cellular research part, this dissertation will present novel user-specific QoS requirements as defined by their respective Mean Opinion Score (MOS) formulas, and associated schedulers for wireless applications and systems that optimize spectral allocation. User-specific QoS requirements are defined and several methods to make use of such requirements to maximum the spectral utilization are presented. Five User-Specific QoS Aware (USQA) schedulers are proposed that consider the user-specific QoS requirements in the allocation of spectral resources. Schedulers are introduced that dynamically adapt to the user-specific QoS requirements to improve quality as measured by the MOS, or the system capacity, or can improve both the quality and system capacity. Due to the different cell deployment arrangements and inter-cell interference in heterogeneous networks in comparison to homogeneous networks, the USQA scheduling is also analyzed and the system performance is evaluated in such networks. Throughput improvements of File Transfer Protocol (FTP) applications benefiting from the rate adaptation and MAC (Media Access Control) scheduling algorithms for video applications that incorporate user-specific QoS requirements to improve system capacity are demonstrated. Another novel approach recognizes that the user-specific frequency sensitivity can be used to improve capacity. There is considerable variation in the audible range of frequencies that can be perceived by individuals, especially at the high frequency end, which is primarily affected by a gradual decline with age. This can be utilized to improve the system performance by personalizing the VoIP codecs and decreasing the user's source data rate for people from an older age group and thus increase the system capacity. Given the potentially substantial system performance gain resulting from the USQA schedulers, it is critical to analyze their feasibility and complexity in practical LTE (4G cellular) and future wireless systems. From the LTE system perspective, LTE QoS end-to-end signaling procedures are addressed, and corresponding protocol adaptations are analyzed in order to support the USQA schedulers. In addition, the optimal scheduling period is analyzed that trades off between performance gain and implementation complexity. In the WBAN research, MIMO (Multiple Input Multiple Output) in vivo antenna technologies are introduced and are motivated by the high data rate requirements of wirelessly transmitted low-delay High Definition (HD) video during Minimally Invasive Surgery (MIS). MIMO in vivo technologies are proposed to be used in the in vivo environments to enhance and determine the maximum data transmission rate while satisfying the Specific Absorption Rate (SAR) power limitations. Various factors are considered in the MIMO in vivo study including antenna separation, antenna angular positions, human body size, and system bandwidth to determinate the maximum data rate that can be supported.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Mac users"

1

Baron, Cynthia. Windows for Mac users. Berkeley, Calif : Peachpit Press, 1999.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Haines, Nathan. Beginning Ubuntu for Windows and Mac Users. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Haines, Nathan. Beginning Ubuntu for Windows and Mac Users. Berkeley, CA : Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3000-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Haines, Nathan. Beginning Ubuntu for Windows and Mac Users. Berkeley, CA : Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-8972-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Granneman, Scott. Mac OS X Snow Leopard for Power Users. Sous la direction de Clay Andres, Douglas Pundick, Steve Anglin, Mark Beckner, Ewan Buckingham, Gary Cornell, Jonathan Gennick et al. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3031-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Myer, Thomas. Mac OS X UNIX toolbox : 1000+ commands for Mac OS X power users. Indianapolis, IN : Wiley Pub., Inc., 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Myer, Tom. Mac OS X UNIX toolbox : 1000+ commands for Mac OS X power users. Indianapolis, IN : Wiley Pub., Inc., 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Coursey, David. Mac OS X for Windows users : A switchers' guide. Berkeley, Calif : Peachpit, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Sobell, Mark G. A practical guide to Unix for Mac OS X users. Upper Saddle River, NJ : Prentice Hall, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

McElhearn, Kirk. Take control of users & accounts in Snow Leopard. Ithaca, N.Y : TidBITS Pub., 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Mac users"

1

Granneman, Scott. « Maintaining Your Mac ». Dans Mac OS X Snow Leopard for Power Users, 9–50. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3031-1_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Granneman, Scott. « Backing Up Your Mac ». Dans Mac OS X Snow Leopard for Power Users, 267–94. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3031-1_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Granneman, Scott. « Securing Your Mac & ; Networks ». Dans Mac OS X Snow Leopard for Power Users, 237–66. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3031-1_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Granneman, Scott. « Introduction : Advanced Secrets of Mac OS X ». Dans Mac OS X Snow Leopard for Power Users, 1–7. Berkeley, CA : Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3031-1_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Haines, Nathan. « Installing Ubuntu ». Dans Beginning Ubuntu for Windows and Mac Users, 1–49. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Haines, Nathan. « Getting Started with Ubuntu ». Dans Beginning Ubuntu for Windows and Mac Users, 51–78. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Haines, Nathan. « Productivity at Home and Work ». Dans Beginning Ubuntu for Windows and Mac Users, 79–117. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Haines, Nathan. « Enjoying Media and Other Entertainment ». Dans Beginning Ubuntu for Windows and Mac Users, 119–47. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Haines, Nathan. « Command-Line Tricks and Applications ». Dans Beginning Ubuntu for Windows and Mac Users, 149–77. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Haines, Nathan. « Power User Tools ». Dans Beginning Ubuntu for Windows and Mac Users, 179–202. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0608-9_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Mac users"

1

Nuggehalli, Pavan, Mahasweta Sarkar et Ramesh R. Rao. « QoS and Selfish Users : A MAC Layer Perspective ». Dans IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference. IEEE, 2007. http://dx.doi.org/10.1109/glocom.2007.895.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kim, Yunmin, Chul Wan Park et Tae-Jin Lee. « MAC protocol for energy-harvesting users in cognitive radio networks ». Dans the 8th International Conference. New York, New York, USA : ACM Press, 2014. http://dx.doi.org/10.1145/2557977.2558054.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kowshik, Suhas S., et Yury Polyanskiy. « Quasi-static fading MAC with many users and finite payload ». Dans 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849781.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kampeas, Joseph, Asaf Cohen et Omer Gurewitz. « MAC capacity under distributed scheduling of multiple users and linear decorrelation ». Dans 2013 IEEE Information Theory Workshop (ITW 2013). IEEE, 2013. http://dx.doi.org/10.1109/itw.2013.6691258.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Bkassiny, Mario, Sudharman K. Jayaweera et Keith A. Avery. « Distributed Reinforcement Learning based MAC protocols for autonomous cognitive secondary users ». Dans 2011 20th Annual Wireless and Optical Communications Conference (WOCC 2011). IEEE, 2011. http://dx.doi.org/10.1109/wocc.2011.5872298.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhou, Xujin, Irem Koprulu, Atilla Eryilmaz et Michael J. Neely. « Low-Overhead Distributed MAC for Serving Dynamic Users over Multiple Channels ». Dans 2021 19th International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt). IEEE, 2021. http://dx.doi.org/10.23919/wiopt52861.2021.9589394.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dappuri, Bhasker, T. G. Venkatesh et Vivin Thomas. « MAC protocols for Cognitive Radio Networks with passive and Active primary users ». Dans 2013 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2013. http://dx.doi.org/10.1109/wcsp.2013.6677245.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Macoir, Nicola, Matteo Ridolfi, Jen Rossey, Ingrid Moerman et Eli De Poorter. « MAC Protocol for Supporting Multiple Roaming Users in Mult-Cell UWB Localization Networks ». Dans 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2018. http://dx.doi.org/10.1109/wowmom.2018.8449815.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lmater, Moulay Abdellatif, Abdelkrim Haqiq, Abdelillah Karouit et Majed Haddad. « Performance Evaluation of a Jamming-Resistant of MAC Protocol with Self-Interested Users ». Dans 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). IEEE, 2018. http://dx.doi.org/10.1109/iintec.2018.8695284.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Sarkar, Mahasweta, et Rene L. Cruz. « A MAC Layer Dynamic Power Management Scheme for Multiple Users in a WLAN ». Dans 2007 IEEE Wireless Communications and Networking Conference. IEEE, 2007. http://dx.doi.org/10.1109/wcnc.2007.398.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Mac users"

1

Qian, Sean, et Qiling Zou. MAC-POSTS Users’ Manual. Office of Scientific and Technical Information (OSTI), avril 2023. http://dx.doi.org/10.2172/1970686.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Oviedo, Daniel, Yisseth Scorcia et Lynn Scholl. Ride-hailing and (dis)Advantage : Perspectives from Users and Non-users. Inter-American Development Bank, septembre 2021. http://dx.doi.org/10.18235/0003656.

Texte intégral
Résumé :
The introduction of ride-hailing in cities of Latin America and the Caribbean (LAC) remains a relatively new topic in regional research and a contentious issue in local policy and practice. Evidence regarding users and how do they differ from non-users is scarce, and there is little documented evidence about how user preferences and perceptions may influence the uptake of ride-hailing. This paper uses primary data from a survey collected from users and non-users of ride-hailing in Bogotá during 2019 to develop a Latent Class Analysis Model (LCA) to identify clusters of users and non-users of ride-hailing. The paper builds on results from the LCA to reflect on conditions of advantage and disadvantage that may make ride-hailing attractive and beneficial for particular social groups. The paper identifies four unique clusters: Carless middle-income ride-hailing users, Disadvantaged non-users, Young middle-class non-users, and Advantaged ride-hailing users. The research uses data on such perceptions to draw insights that may inform commercial and policy decisions. Findings suggest that issues such as the perception of legality in ride-hailing and aversion to crime play a significant role in the choice of such a mode in the context of Bogotá, particularly among socially and transport advantaged users.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Goldie, James. Map : Biggest nuclear power users. Monash University, avril 2024. http://dx.doi.org/10.54377/a8dd-5de6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Russell, V. K. MAC, material accounting database user guide. Office of Scientific and Technical Information (OSTI), septembre 1994. http://dx.doi.org/10.2172/10104854.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Emery, Benjamin. National Sediment Placement Data Viewer users guide. Engineer Research and Development Center (U.S.), juillet 2022. http://dx.doi.org/10.21079/11681/44700.

Texte intégral
Résumé :
This US Army Corps of Engineers (USACE) Regional Sediment Management (RSM) technical note serves as a user’s guide for the RSM National Sediment Placement Data Viewer. This application was created utilizing over 20 yr* of detailed and verified USACE dredging data, giving users an interactive web-based tool that takes these datasets and displays them on a national map, viewable at the district or project scale. The Data Viewer will quantify the total cubic yards dredged, disposed, and/or beneficially used based on the user selected parameters. Detailed information on the datasets utilized and the verification processes followed to create this application can be found in ERDC/TN RSM-22-XX, USACE Navigation Sediment Placement: An RSM Program Database (1998 – 2019) (Elko et al. 2022). This technical note attempts to define each of the inputs/outputs given from the Data Viewer and then provide a step-by-step example of utilizing the Data Viewer, accessed here: https://www.arcgis.com/apps/MapSeries/index.html?appid=0ea8fc0a956f46068428c862e7497233
Styles APA, Harvard, Vancouver, ISO, etc.
6

Pivi, Mauro T. F. C-MAD User's Manual. Office of Scientific and Technical Information (OSTI), août 2011. http://dx.doi.org/10.2172/1022521.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kiefner et Vieth. L51688B A Modified Criterion for Evaluating the Remaining Strength of Corroded Pipe. Chantilly, Virginia : Pipeline Research Council International, Inc. (PRCI), décembre 1989. http://dx.doi.org/10.55274/r0011347.

Texte intégral
Résumé :
The RSTRENG software program and users manual were developed to enhance the usability and options available in the original program RSTRENG. RSTRENG was developed as part of AGA PR-3-805, "A Modified Criterion for Evaluating the Remaining Strength of Corroded Pipe." RSTRENG can be used by pipeline operators to evaluate the remaining strength of corroded pipe. The required user inputs are pipe diameter, wall thickness, grade of the pipe material, and a series of pit depth and length measurements. The new version of the RSTRENG software actually produces the same results as the first version; the improvements serve to make the software more versatile and user-friendly. Includes soft-cover manual and CD. It also address some problems encountered in its use (principally through misunderstanding or misuse). There will be flags alerting the user that he is attempting to extend the RSTRENG equation beyond its validation points and that the results may be non-conservative in a given application. A new version of the software was released in August 1999. (Includes: L51688, RSTRENG 3.0 Users Manual and Software) (https://prci.quickbase.com/db/bc5ycaqrp?a=dr and r=hh3 and rl=bf8j)
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kolaj, M., S. Halchuk et J. Adams. Sixth-generation seismic hazard model of Canada : grid values of mean hazard to be used with the 2020 National Building Code of Canada. Natural Resources Canada/CMSS/Information Management, 2023. http://dx.doi.org/10.4095/331497.

Texte intégral
Résumé :
Canada's 6th Generation seismic hazard model is the basis for the seismic design provisions in the 2020 National Building Code of Canada. The 2020 code uses mean ground motions of spectral acceleration at 0.2, 0.5, 1.0, 2.0, 5.0 and 10.0 second periods, peak acceleration and peak velocity for a variety of site conditions. Users of the 2020 code access seismic hazard values by using the 2020 National Building Code of Canada Seismic Hazard Tool which provides values for any site located in Canada. The online tool accomplishes this through the interpolation of a pre-calculated dataset. This Open File provides that dataset for users who may wish to access those values directly, and describes the interpolation methods used.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Vaidya, Ramesh A., Arun B. Shrestha, Santosh Nepal et Kanchan Shrestha. The Koshi River basin : A biophysical and socioeconomic overview ; Resource Book. International Centre for Integrated Mountain Development (ICIMOD), avril 2022. http://dx.doi.org/10.53055/icimod.1008.

Texte intégral
Résumé :
The Koshi River basin resource book presents an analysis of the complexities inherent in effectively managing water resources. It collates current knowledge on the Koshi basin’s water resource system and related ecosystems, their uses and users, and integrated governance mechanisms. Building on these, it presents possible approaches for water management at different scales. The authors identify key knowledge gaps and provide specific recommendations that may be useful for policy makers, administrators, development workers, and researchers working on addressing water resource management issues in the basin.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Cupps, Kim C. Level-2 Milestone 4797 : Early Users on Max, Sequoia Visualization Cluster. Office of Scientific and Technical Information (OSTI), décembre 2013. http://dx.doi.org/10.2172/1116891.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie