Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Design of protocols“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Design of protocols" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang und Ilias Kiourktsidis. „Self-Evolvable Protocol Design Using Genetic Algorithms“. International Journal of Applied Evolutionary Computation 1, Nr. 1 (Januar 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Der volle Inhalt der QuelleYu, Song Sen, Yun Peng und Jia Jing Zhang. „A Lightweight RFID Mechanism Design“. Advanced Materials Research 216 (März 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Der volle Inhalt der QuelleTurilli, Matteo. „Ethical protocols design“. Ethics and Information Technology 9, Nr. 1 (08.02.2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Der volle Inhalt der QuelleSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. „Practice and Consideration of Master Protocol in Clinical Trials“. Tumor Discovery 2, Nr. 2 (28.04.2023): 342. http://dx.doi.org/10.36922/td.342.
Der volle Inhalt der QuelleNguyen, Philon, Thanh An Nguyen und Yong Zeng. „Segmentation of design protocol using EEG“. Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, Nr. 1 (03.04.2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Der volle Inhalt der QuelleHe, Jiayue, Jennifer Rexford und Mung Chiang. „Don't optimize existing protocols, design optimizable protocols“. ACM SIGCOMM Computer Communication Review 37, Nr. 3 (20.07.2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Der volle Inhalt der QuelleN, Hemanthraju. „A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 6 (30.06.2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Der volle Inhalt der QuelleSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo und Muhamad Asvial. „A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things“. Information 12, Nr. 8 (22.07.2021): 292. http://dx.doi.org/10.3390/info12080292.
Der volle Inhalt der QuelleAlfouzan, Faisal Abdulaziz. „Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges“. Journal of Marine Science and Engineering 9, Nr. 7 (04.07.2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Der volle Inhalt der QuelleHayam A. Al-Yasiri und Nyan D. Sallman. „Design and Implementation of Mobile Computing Simulator“. Diyala Journal of Engineering Sciences 7, Nr. 4 (01.12.2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Der volle Inhalt der QuelleDissertationen zum Thema "Design of protocols"
Bandyopadhyay, Amrit. „The smart stone protocol (SSP) design and protocols /“. College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Der volle Inhalt der QuelleThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. „DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS“. OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Der volle Inhalt der QuelleMüffke, Friedger. „A better way to design communication protocols“. Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Der volle Inhalt der QuelleHoran, Stephen, und Giriprassad Deivasigamani. „USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL“. International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Der volle Inhalt der QuelleThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. „A model for secure protocols and its application to systematic design of cryptographic protocols“. Thesis, Queensland University of Technology, 2001.
Den vollen Inhalt der Quelle findenRouget, Peter. „Design of mechanisms for filtering and isolations of industrial protocols“. Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Der volle Inhalt der QuelleWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. „Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach“. Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Der volle Inhalt der QuelleLiu, Changlei, und 劉長雷. „Bluetooth network design“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Der volle Inhalt der QuelleShen, Xiaowei 1966. „Design and verification of adaptive cache coherence protocols“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Der volle Inhalt der QuelleSubramanian, Srividhya. „Design and verification of secure E-commerce protocols /“. The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Der volle Inhalt der QuelleBücher zum Thema "Design of protocols"
name, No. Vaccine protocols. 2. Aufl. Totowa, NJ: Humana Press, 2003.
Den vollen Inhalt der Quelle findenAndrew, Robinson, Cranage Martin P und Hudson Michael, Hrsg. Vaccine protocols. 2. Aufl. Totowa, N.J: Humana Press, 2003.
Den vollen Inhalt der Quelle findenL, Hammond Joseph, und Pawlikowski Krzysztof, Hrsg. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.
Den vollen Inhalt der Quelle findenSharp, Robin. Principles of protocol design. Berlin: Springer, 2010.
Den vollen Inhalt der Quelle findenEhud, Gazit, und Nussinov Ruth, Hrsg. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.
Den vollen Inhalt der Quelle findenLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Den vollen Inhalt der Quelle finden1947-, Robinson Andrew, Farrar Graham H und Wiblin Christopher N, Hrsg. Vaccine protocols. Totowa, N.J: Human Press, 1996.
Den vollen Inhalt der Quelle findenKan, Jeff WT, und John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Der volle Inhalt der QuelleHolzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.
Den vollen Inhalt der Quelle findenAmerican Telephone and Telegraph Company., Hrsg. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Design of protocols"
Wilson, Greg. „Protocols“. In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Der volle Inhalt der QuelleHyndman, David L., und Masato Mitsuhashi. „PCR Primer Design“. In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Der volle Inhalt der QuelleHercog, Drago. „System Specification and Design“. In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Der volle Inhalt der QuelleHercog, Drago. „Protocol Specification and Design“. In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Der volle Inhalt der QuelleChoi, Joonwon, Adam Chlipala und Arvind. „Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols“. In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Der volle Inhalt der QuelleKůr, Jiří, Václav Matyáš und Petr Švenda. „Evolutionary Design of Attack Strategies“. In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Der volle Inhalt der QuelleŠvenda, Petr. „Evolutionary Design of Attack Strategies“. In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Der volle Inhalt der Quellede Muro, Marilena Aquino. „Probe Design, Production, and Applications“. In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Der volle Inhalt der QuelleSarkar, Mouli, und Naveen Kumar. „De Novo Peptide Design Tools“. In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Der volle Inhalt der QuelleYu, Su-Yang, und Jeff Yan. „Security Design in Human Computation Games“. In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Design of protocols"
De Marchi, Mirco, und Nicola Bombieri. „Orchestration-Aware Optimization of ROS2 Communication Protocols“. In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Der volle Inhalt der QuelleDijk, Marten van, und Ulrich Ruhrmair. „Protocol attacks on advanced PUF protocols and countermeasures“. In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Der volle Inhalt der QuelleDijk, Marten van, und Ulrich Ruhrmair. „Protocol attacks on advanced PUF protocols and countermeasures“. In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Der volle Inhalt der QuelleChiu, I., und L. H. Shu. „Potential Limitations of Verbal Protocols in Design Experiments“. In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Der volle Inhalt der QuelleDong, Ling, Kefei Chen, Mi Wen und Yanfei Zheng. „Protocol Engineering Principles for Cryptographic Protocols Design“. In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Der volle Inhalt der Quelleda Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli und J. Rabaey. „Wireless protocols design“. In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Der volle Inhalt der QuelleLubell, Joshua. „The Application Protocol Information Base World Wide Web Gateway“. In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Der volle Inhalt der QuelleKoh, Immanuel, Paul Keel und Jeffrey Huang. „Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix“. In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Der volle Inhalt der QuelleChiasserini, C. F., P. Nuggehalli und V. Srinivasan. „Energy-efficient communication protocols“. In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Der volle Inhalt der QuelleHaeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger und Jane Burry. „Furniture Design Using Custom-Optimised Structural Nodes“. In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3117.
Der volle Inhalt der QuelleAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1994. http://dx.doi.org/10.21236/ada290584.
Der volle Inhalt der QuelleSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, Januar 1996. http://dx.doi.org/10.21236/ada465132.
Der volle Inhalt der QuelleSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, Juli 2008. http://dx.doi.org/10.21236/ada484133.
Der volle Inhalt der QuelleLebovitz, G., und M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, Februar 2012. http://dx.doi.org/10.17487/rfc6518.
Der volle Inhalt der QuelleGriffin, Timothy G., Aaron D. Jaggard und Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, April 2004. http://dx.doi.org/10.21236/ada461910.
Der volle Inhalt der QuelleHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45100.
Der volle Inhalt der QuelleAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1999. http://dx.doi.org/10.21236/ada370116.
Der volle Inhalt der QuelleKrunz, Marwan, und Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada591559.
Der volle Inhalt der QuelleAng, Chwee B., und Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, Februar 2001. http://dx.doi.org/10.21236/ada405072.
Der volle Inhalt der Quelle