Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,627,603 papers from all fields of science
Search
Sign In
Create Free Account
Apple Keyboard
Known as:
Apple Pro Keyboard
, Macintosh keyboard
, Mighty Keyboard
Expand
The Apple Keyboard is a keyboard designed by Apple Inc. first for the Apple line, then the Macintosh line of computers. Dozens of models have been…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Apple Desktop Bus
Apple II series
Apple III
Apple Lisa
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method
Zhengyuan Zhang
,
Kun Lv
,
Changzhen Hu
International Conference on Science of Cyber…
2018
Corpus ID: 53875858
Establishing a complete network defense system is one of the hot research directions in recent years. Some approaches are based…
Expand
2016
2016
Social worker registration: A decade of development, debate and delivery
Barbara Gilray
2016
Corpus ID: 156908783
The Social Workers Registration Act was enacted into Aotearoa New Zealand law in April 2003 and provides the framework for the…
Expand
2016
2016
Interactive comment on “ A geological model for the management of subsurface data in the urban environment of Barcelona city ” by Enric Vázquez-Suñé et al
E. Vázquez-Suñé
2016
Corpus ID: 53991645
REFEREE #2: c) It is necessary to clarify the objectives and follow them along the text. From my point for view there are three…
Expand
2015
2015
A Pilot Study of User-Requirements for Building Maintenance Systems in Malaysian Higher Education Institutions
Mohd. Zulakhmar Zakiyudin
,
M. Fathi
,
S. Rambat
,
S. U. Tobi
,
N. Rajab
2015
Corpus ID: 54976756
Abstract - Worldwide, the investment in building maintenance is huge as it represents almost 50% of the total turnover of…
Expand
2012
2012
The Safe of the Blade Encryption Sever
Xiuling Sun
2012
Corpus ID: 62144842
The sever is the center of Internet. The user can store and process all information by severs. The safe of sever is main problem…
Expand
2011
2011
Development of a scoring rubric for A to F grading and assessment of Master’s Theses that are using quantitative methodology
H. Jernström
2011
Corpus ID: 35460937
Malmo University uses ECTS grades (A to Fail) in parallel with Swedish grades for some courses. During 2008 and 2009 I was course…
Expand
2011
2011
THE FINANCIAL SUPPLY CHAIN MANAGEMENT: A RESPONSE TO THE NEW ECONOMY – CRISIS AND RECESSION ECONOMY
V. Popa
,
L. Badea
,
M. Barna
2011
Corpus ID: 55596538
Supply chain- all the organizations and processes which refer to products and services from the view of buying organization…
Expand
2011
2011
An Experimental Analysis of the Role of Harmony in Musical Memory and the Categorization of Genre
David H. Witkowsky
2011
Corpus ID: 53972957
Expectations play a significant role in the way a listener experiences a piece of music. These expectations have been thought to…
Expand
2010
2010
Communicating harmony versus conflict in an online environment : the effects of portraits & shape on website user response
Christine Bellmann
2010
Corpus ID: 59131092
This paper addresses the impact of communicating harmony and conflict through portraits and shape on the evaluation and response…
Expand
2006
2006
Data entry system
벤자민 피루쯔 가사빈
2006
Corpus ID: 59349440
As shown in Figure 18, the data input system for handling ambiguous data comprises keys (14 203) Unclear and clear keys (14 207…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE