Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Conception de protocoles“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Conception de protocoles" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Conception de protocoles"
Alata, Eric, Vincent Nicomette, Julien Duch êne, Colas Le Guernic und Mohamed Kaaniche. „Outils pour la rétro-conception de protocoles. Analyse et classification“. Techniques et sciences informatiques 35, Nr. 6 (30.12.2016): 609–40. http://dx.doi.org/10.3166/tsi.35.609-640.
Der volle Inhalt der QuelleAmira, Derradji, und Verdier Christine. „Conception et évaluation d’un langage orienté patient pour la représentation de protocoles de soins“. Ingénierie des systèmes d'information 21, Nr. 2 (28.04.2016): 123–46. http://dx.doi.org/10.3166/isi.21.2.123-146.
Der volle Inhalt der QuelleMasbernat, Raphaël, Églantine Bigot-Doll, Maxime Fouillat, Elisabeth Sulmont, François Pacquelet, Antoine Chevalier, Naomi Pereira und Chloé Blanc. „Machines à voir, machines à penser : écosystème robotique situé pour la conception architecturale“. SHS Web of Conferences 147 (2022): 06001. http://dx.doi.org/10.1051/shsconf/202214706001.
Der volle Inhalt der QuelleCalixte, Xaviera, Karine Cuffi und Pierre Leclercq. „Mise en place d’un outil pédagogique de documentation du processus de conception architecturale“. SHS Web of Conferences 147 (2022): 03002. http://dx.doi.org/10.1051/shsconf/202214703002.
Der volle Inhalt der QuelleMonod-Ansaldi, Réjane, Michèle Prieur, Isabelle Arbez und Agnès Golay. „Étayer la conception de protocoles expérimentaux par des élèves de CM2 pour évaluer l’entrée d’eau dans la plante“. RDST, Nr. 12 (15.11.2015): 113–39. http://dx.doi.org/10.4000/rdst.1144.
Der volle Inhalt der QuelleBennett, Fionn C. „Expliquer according to Jacques Derrida : explanation and critique“. Recherches anglaises et nord-américaines 37, Nr. 1 (2004): 137–49. http://dx.doi.org/10.3406/ranam.2004.1729.
Der volle Inhalt der QuelleChazalon, Jean-François. „Approche du traitement non chirurgical des supraclusions par la technique des aligneurs : quels protocoles de traitement et comment optimiser les résultats cliniques ?“ Revue d'Orthopédie Dento-Faciale 56, Nr. 1 (Februar 2022): 51–70. http://dx.doi.org/10.1051/odf/2022006.
Der volle Inhalt der QuelleSoulez, Antonia. „Otto Neurath : la force d’une pensée constructiviste du possible contre le déclinisme“. Les cercles viennois de l'entre-deux-guerres 94 (2022): 187–209. http://dx.doi.org/10.4000/11vee.
Der volle Inhalt der QuelleMelançon, Benoît. „Pour une lecture sociale de la correspondance de Saint-Denys Garneau“. Dossier 20, Nr. 1 (29.08.2006): 96–106. http://dx.doi.org/10.7202/201142ar.
Der volle Inhalt der QuelleHÉRODIN, F. „Problèmes éthiques posés par la recherche duale sur les cellules souches menée par le Service de santé des armées“. Revue Médecine et Armées, Volume 43, Numéro 3 (01.06.2015): 240–45. http://dx.doi.org/10.17184/eac.6882.
Der volle Inhalt der QuelleDissertationen zum Thema "Conception de protocoles"
Plainchault, Mélanie. „Conception de protocoles DDF pour le déploiement de relais auto-configurables“. Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Der volle Inhalt der QuelleSeinturier, Lionel. „Conception d'algorithmes répartis et de protocoles réseaux en approche objet“. Phd thesis, Paris, CNAM, 1997. http://tel.archives-ouvertes.fr/tel-00439136.
Der volle Inhalt der QuelleEtrog, Jonathan. „Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée“. Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Der volle Inhalt der QuelleThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
SANTOSO, HARRY. „Conception et evaluation de protocoles de communication a haut debit“. Paris 6, 1993. http://www.theses.fr/1993PA066238.
Der volle Inhalt der QuelleDuchene, Julien. „Développement et évaluation d'obfuscations de protocoles basées sur la spécification“. Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Der volle Inhalt der QuelleThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Tanter, Éric. „Des protocoles de métaobjets aux noyaux versatiles pour la programmation par aspects“. Nantes, 2004. http://www.theses.fr/2004NANT2075.
Der volle Inhalt der QuelleBendedouch, Fethi. „Conception et realisation d'un systeme d'apprentissage des protocoles de communication assiste par ordinateur : simulation et analyse des protocoles“. Toulouse 3, 1987. http://www.theses.fr/1987TOU30033.
Der volle Inhalt der QuelleBendedouch, Fethi. „Conception et réalisation d'un système d'apprentissage des protocoles de communication assisté par ordinateur simulation et analyse des protocoles /“. Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37602822c.
Der volle Inhalt der QuelleSTEFFAN, LAURENT. „Conception et specification de protocoles de communication pour applications temps reel“. Nantes, 1988. http://www.theses.fr/1988NANT2046.
Der volle Inhalt der QuellePlainchault, Mélanie. „Conception de protocoles DDF pour le déploiement de relais auto-configurables“. Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Der volle Inhalt der QuelleRelaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Bücher zum Thema "Conception de protocoles"
Liljeroth, Pia. Rädsla inför förlossningen: Ett uppenbart kliniskt problem? : konstruktionen av förlossningsrädsla som medicinsk kategori. Åbo: Åbo Akademis förlag, 2009.
Den vollen Inhalt der Quelle findenQuirouette, R. L. Le mur à écran pare-pluie: Un protocole de mise en service. Ottawa, Ont: Société canadienne d'hypothèques et de logement, 1996.
Den vollen Inhalt der Quelle findenBellavance, English Lisa, Hrsg. Combinatorial library methods and protocols. Totowa, N.J: Humana Press, 2002.
Den vollen Inhalt der Quelle findenWAHL, Sondi. Conception et Evaluation Protocole Rouhb: Conception et Evaluation de Protocole de Routage Ad Hoc. ISTE Editions Ltd., 2023.
Den vollen Inhalt der Quelle findenSpecial Edition Using SOAP. Que, 2001.
Den vollen Inhalt der Quelle findenGrijalba Carabali, Paola Andrea, Adriana Pérez Portocarrero, Jhon Fredy Salazar Riascos und Jorge Humberto Restrepo Zapata. Guía de protocolo del síndrome de pie diabético. Editorial Universidad Santiago de Cali, 2019. http://dx.doi.org/10.35985/9789585248403.
Der volle Inhalt der QuelleFaúndez C., Jorge, Marlene Verónica González González, Patricio Parra Sanhueza und Juan Carlos Valencia Baier. Manual 38: Manual para la certificación sanitaria forestal. INFOR, 2001. http://dx.doi.org/10.52904/20.500.12220/6669.
Der volle Inhalt der QuelleCatanesi, Cecilia Inés, und Egle Etel Villegas Castagnasso, Hrsg. Elementos de Genética para estudiantes de Ciencias Biológicas. Editorial de la Universidad Nacional de La Plata (UNLP), 2021. http://dx.doi.org/10.35537/10915/129625.
Der volle Inhalt der QuelleCustom CGI Scripting with Perl. John Wiley & Sons, 2001.
Den vollen Inhalt der Quelle findenHanegan, Kevin. Custom CGI Scripting with Perl. Wiley & Sons, Incorporated, John, 2002.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Conception de protocoles"
Bentley, Joseph. „Neurath’s Conception of Protocol Statements“. In Logical Empiricism and Naturalism, 67–96. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29328-3_3.
Der volle Inhalt der QuelleWoodland, Sarah, und Kamarra Bell-Wykes. „Culturally Led, Culturally Safe Performance Making“. In First Nations Australian Theatre for Health Equity, 61–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65506-7_4.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Évaluation des performances du protocole pour des applications coopératives“. In Conception et évaluation de protocole de routage ad hoc, 155–211. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch4.
Der volle Inhalt der QuelleIsel, M. „Conception et réalisation des orthèses“. In Orthèses De la Main et du Poignet. Protocoles De Rééducation, 29–37. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71185-5.00005-9.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Enjeux autour des communications ad hoc sur la route“. In Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Intégration des composantes ad hoc dans une infrastructure globale“. In Conception et évaluation de protocole de routage ad hoc, 249–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch6.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Approche fonctionnelle de conception de protocole“. In Conception et évaluation de protocole de routage ad hoc, 17–80. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch2.
Der volle Inhalt der QuelleBentley, Joseph. „Conceptions of Protocol Sentences in Neurath and Carnap and the Bipartite Metatheory Conception“. In Ways of the Scientific World-Conception. Rudolf Carnap and Otto Neurath, 152–79. BRILL, 2024. http://dx.doi.org/10.1163/9789004680203_008.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Modèle formel pour l’analyse de propriétés du protocole“. In Conception et évaluation de protocole de routage ad hoc, 213–47. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch5.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Modèles et simulations pour l’analyse de performance“. In Conception et évaluation de protocole de routage ad hoc, 81–153. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Conception de protocoles"
Frikha, Mounir, und Jamila Ben Slimane. „Conception and simulation of energy-efficient AODV protocol in ad hoc networks“. In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292343.
Der volle Inhalt der QuelleDel Junco González, Juan José. „Conexiones disciplinarias en una práctica "mestiza”. El caso de la “ornitología emocional”“. In V Congreso Internacional de Investigacion en Artes Visuales ANIAV 2022. RE/DES Conectar. València: Editorial Universitat Politècnica de València, 2022. http://dx.doi.org/10.4995/aniav2022.2022.15501.
Der volle Inhalt der QuelleMichaud, Martin, Daniel Forgues, Julien Meyer und Claudiane Ouellet- Plamondon. „A Case Study on Improving Standardization in the Conception Phase by Developing Tools and Protocols“. In 27th Annual Conference of the International Group for Lean Construction (IGLC). International Group for Lean Construction, 2019. http://dx.doi.org/10.24928/2019/0176.
Der volle Inhalt der QuelleFlorensa Ferrando, Ignasi, Iria Fraga Rivas und Víctor Martínez Junza. „Mathematics education in engineering: a triple discontinuity?“ In SEFI 50th Annual conference of The European Society for Engineering Education. Barcelona: Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788412322262.1144.
Der volle Inhalt der QuelleMauricio, María Dolores, Eva Serna, Soraya Lilian Vallés, Martín Aldasoro und José María Vila. „Aprendiendo de forma cooperativa a través del método científico“. In In-Red 2016 - Congreso de Innovación Educativa y Docencia en Red de la Universitat Politècnica de València. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/inred2016.2016.4289.
Der volle Inhalt der QuelleSouza, Wander Pereira de, Artur de Souza Moret, Sandro Adalberto, Gleimiria Batista da Costa Matos, Haroldo de Sá Medeiros und Dércio Bernardes de Souza. „Sustainable tourism and public policies in the Amazon: Scientific invisibility“. In III SEVEN INTERNATIONAL MULTIDISCIPLINARY CONGRESS. Seven Congress, 2023. http://dx.doi.org/10.56238/seveniiimulti2023-220.
Der volle Inhalt der QuelleCaballero, Victor, David Vernet, Agustín Zaballos und Guiomar Corral. „Web of Energy: hacia la integración inteligente para las redes de sensores en Smart Grids“. In XIII Jornadas de Ingenieria Telematica - JITEL2017. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6499.
Der volle Inhalt der QuelleLuca, Andreea iuliana, und Ioana roxana Podina. „ETHIC MODELS SHAPING (IM)MORAL IDENTITY IN (POST)PANDEMIC TIMES: A PROPOSAL FOR A LONGITUDINAL STUDY PROTOCOL“. In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-176.
Der volle Inhalt der QuelleMarín Ramos, Ruben. „En el Parque“. In II Congreso Internacional Estéticas Híbridas de la Imagen en Movimiento: Identidad y Patrimonio. Valencia: Universitat Politàcnica de València, 2021. http://dx.doi.org/10.4995/eshid2021.2021.13240.
Der volle Inhalt der QuelleAparicio Pico, Lilia Edith, und Patrick Francois Tarquino Aparicio. „TELESALUD UN MODELO DE CONVERGENCIA ENTRE TECNOLOGÍA, MEDICINA Y EDUCACIÓN“. In La formación de ingenieros: un compromiso para el desarrollo y la sostenibilidad. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2020. http://dx.doi.org/10.26507/ponencia.813.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Conception de protocoles"
Wolfenson, David, William W. Thatcher und James E. Kinder. Regulation of LH Secretion in the Periovulatory Period as a Strategy to Enhance Ovarian Function and Fertility in Dairy and Beef Cows. United States Department of Agriculture, Dezember 2003. http://dx.doi.org/10.32747/2003.7586458.bard.
Der volle Inhalt der QuelleOsejo, Alejandra, Ana María Garrido, Juana Alvarez, Santiago Martínez, Diana Lara, Omar Ruiz und Bernardo Posada. Guía para la caracterización de la gobernanza en paisajes rurales. Herausgegeben von Alejandra Osejo. Instituto de Investigación de Recursos Biológicos Alexander von Humboldt, Dezember 2019. http://dx.doi.org/10.21068/cssbgobernanza2019.
Der volle Inhalt der QuelleBritt, Jack, Miriam Rosenberg, Steven Washburn und Moshe Kaim. Development and Evaluation of a Method of Hormonal Treatment to Increase Fertility in Dairy Cows. United States Department of Agriculture, Dezember 1995. http://dx.doi.org/10.32747/1995.7612833.bard.
Der volle Inhalt der Quelle