Auswahl der wissenschaftlichen Literatur zum Thema „Design of protocols“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Design of protocols" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Design of protocols"

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang und Ilias Kiourktsidis. „Self-Evolvable Protocol Design Using Genetic Algorithms“. International Journal of Applied Evolutionary Computation 1, Nr. 1 (Januar 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Der volle Inhalt der Quelle
Annotation:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self Evolvable Transaction Protocol (SETP) with a GA executor embedded. We then use the Network Simulator (NS2) to evaluate this evolvable protocol module to demonstrate the feasibility of our new design approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yu, Song Sen, Yun Peng und Jia Jing Zhang. „A Lightweight RFID Mechanism Design“. Advanced Materials Research 216 (März 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Der volle Inhalt der Quelle
Annotation:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Turilli, Matteo. „Ethical protocols design“. Ethics and Information Technology 9, Nr. 1 (08.02.2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Song, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. „Practice and Consideration of Master Protocol in Clinical Trials“. Tumor Discovery 2, Nr. 2 (28.04.2023): 342. http://dx.doi.org/10.36922/td.342.

Der volle Inhalt der Quelle
Annotation:
There is great interest in accelerating late-stage therapy development by efficiently performing a trial design with multiple therapies or multiple subpopulations simultaneously under a single protocol. The master protocols are termed to describe the design of such trials, with a variety of terms such as umbrella, basket, or platform describing specific designs, which are, in contrast to the traditional trial designs, full of complexity. What should we consider in designing a trial ensuring the safety of human subjects and demonstrating the efficacy of new therapy? This paper overviews the master protocol framework, comprehensively unifies the definitions and illustrates essential design elements of representative example trials conducted in drugs and medical devices. Besides, to understand the master protocols deeply, it is also a need to summarize the commonly-used types of master protocols in various disease and treatment fields, along with the reasons for these phenomena by analyzing the characteristics of the diseases, the mechanism of therapeutic products, and the principles of various types of master protocols. Finally, we also propose practical considerations, including the design, ethical, statistics, and funding considerations that arise from implementing complex master protocols to help practitioners better design and identify potential valuable therapies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Nguyen, Philon, Thanh An Nguyen und Yong Zeng. „Segmentation of design protocol using EEG“. Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, Nr. 1 (03.04.2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Der volle Inhalt der Quelle
Annotation:
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistance in solving this problem. Such problems are typical inverse problems that occur in the line of research. A thought process needs to be reconstructed from its output, an EEG signal. We propose an EEG-based method for design protocol coding and segmentation. We provide experimental validation of our methods and compare manual segmentation by domain experts to algorithmic segmentation using EEG. The best performing automated segmentation method (when manual segmentation is the baseline) is found to have an average deviation from manual segmentations of 2 s. Furthermore, EEG-based segmentation can identify cognitive structures that simple observation of design protocols cannot. EEG-based segmentation does not replace complex domain expert segmentation but rather complements it. Techniques such as verbal protocols are known to fail in some circumstances. EEG-based segmentation has the added feature that it is fully automated and can be readily integrated in engineering systems and subsystems. It is effectively a window into the mind.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

He, Jiayue, Jennifer Rexford und Mung Chiang. „Don't optimize existing protocols, design optimizable protocols“. ACM SIGCOMM Computer Communication Review 37, Nr. 3 (20.07.2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

N, Hemanthraju. „A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 6 (30.06.2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.

Der volle Inhalt der Quelle
Annotation:
Abstract: The present modern bus protocols used for communication between different functional blocks on a System-on-Chip (Soc) designs face many different challenges among which complexity and communication management are the most important factors. These on-chip communications directly impact performance and functionality, hence depending on the application where the bus protocol is to be used, a perfect communication protocol is chosen. AMBA (Advanced Microcontroller Bus Architecture) provides various types of protocols to be used as IP, of which AXI4 (Advance Extensible Interface), is one of the widely used protocols for SoC designs. Out of its three different interconnect protocols: lite, stream and burst, AXI4-lite has the simplest architecture design that best suits to be used in applications where power, area and performance play a vital role. This paper briefs about using AMBA AXI4-lite bus protocol with more bus efficiency and performance in an SoC design for proper communication between various functional blocks present. The RTL is verified using UVM (Universal Verification Methodology) and various designing process is carried out using cadence tools.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo und Muhamad Asvial. „A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things“. Information 12, Nr. 8 (22.07.2021): 292. http://dx.doi.org/10.3390/info12080292.

Der volle Inhalt der Quelle
Annotation:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of the key technologies for the Internet of Things. The identified autonomic properties are self-organization, self-optimization, and self-protection. We review some protocols with the objective of energy consumption reduction and energy harvesting awareness, as it can support the self-energy-awareness property. As the result, the protocol designs are mapped according to each autonomic property supported, including protocols for MAC layer, protocols for clustering, protocols for routing, and protocols for security. This can be used to map the advances of communication protocol research for the autonomic Internet of Things and to identify the opportunities for future research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alfouzan, Faisal Abdulaziz. „Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges“. Journal of Marine Science and Engineering 9, Nr. 7 (04.07.2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Der volle Inhalt der Quelle
Annotation:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Hayam A. Al-Yasiri und Nyan D. Sallman. „Design and Implementation of Mobile Computing Simulator“. Diyala Journal of Engineering Sciences 7, Nr. 4 (01.12.2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.

Der volle Inhalt der Quelle
Annotation:
The Rapid progress in communications and wireless technology, especially in mobile computing, resulted in wide area of development in design, control and simulation of protocols that manage the wireless network. In this paper, a software simulator package has been designed, implemented and analyzed to simulate Internet Mobile Host Protocol (IMHP), Multicast Routing Protocol (MRP) and Handoff operation, which feature both route optimization and integrated authentication of all management packets.The simulator coverage area includes three extendable subnets (LANs) with ten mobile hosts moving either randomly or manually over the network. The moving hosts have the ability of entering or leaving the network at any time. The designed simulator simulates all the predicted events that practically associated with mobile computing operation. In addition, the simulator stands for other events such as the rebooting or crashing in the network elements.The simulated protocols are tested in terms of the speed of implementation, which computed throughout the designed simulator operation for both IMHP and MRP protocols. Also the effect of Handoff process on the mobile protocols implementation has been tested. The obtained results showed that the short cut route exhibits the fastest speed of implementation. Visual Basic programming language has been used in the design of this simulator.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Design of protocols"

1

Bandyopadhyay, Amrit. „The smart stone protocol (SSP) design and protocols /“. College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

alyanbaawi, ashraf. „DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS“. OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Der volle Inhalt der Quelle
Annotation:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagrams to a group of interested receivers in one transmission.Core-based trees major concerns are core selection and core as single point of failure.The problem of core selection is to choose the best core or cores in the network toimprove the network performance.In this dissertation we propose 1) a multiple core selection approach for core-based tree multicasting, senders can select different cores to have an efficient loadbalanced multicore multicasting. It will overcome any core failure as well. 2) Novel andefficient schemes for load shared multicore multicasting are presented. Multiple coresare selected statically, that is, independent of any existing multicast groups and also theselection process is independent of any underlying unicast protocol. Some of theselected cores can be used for fault- tolerant purpose also to guard against any possible core failures. 3) We have presented two novel and efficient schemes forgroup-based load shared multicore multicasting in which members of a multicast groupuse the same core tree for their multicasting. 4) We also presented two schemes aim atachieving low latency multicasting along with load sharing for delay sensitive multicastapplications. Besides, we have presented a unique approach for core migration, whichuses two very important parameters, namely, depth of a core tree and pseudo diameterof a core. One noteworthy point from the viewpoint of fault tolerance is that the degreeof fault-tolerance can be enhanced from covering single point-failure to any number ofcore failures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Müffke, Friedger. „A better way to design communication protocols“. Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Horan, Stephen, und Giriprassad Deivasigamani. „USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL“. International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.

Der volle Inhalt der Quelle
Annotation:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
The design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Rudolph, Carsten. „A model for secure protocols and its application to systematic design of cryptographic protocols“. Thesis, Queensland University of Technology, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Rouget, Peter. „Design of mechanisms for filtering and isolations of industrial protocols“. Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.

Der volle Inhalt der Quelle
Annotation:
Avec l’essor de l'Industrie 4.0, de nombreuses infrastructures ont été contraintes d’ouvrir leurs réseaux à Internet, principalement pour répondre au besoin croissant de supervision et de contrôle à distance. Mais là où ces infrastructures étaient auparavant isolées, épargnées par les menaces extérieures, leur ouverture a provoqué l’émergence de nouveaux risques, en particulier à travers le réseau, potentiellement sérieux et qui ne sont pas couverts.Les solutions de cybersécurité, comme les pare-feux, les systèmes de détection d’intrusion ou les systèmes de protection contre les intrusions, sont couramment utilisés pour répondre aux préoccupations liées à la cybersécurité des infrastructures industrielles. Cependant, la tendance à se fier aux systèmes logiciels pour assurer la protection du réseau a mis en lumière les vulnérabilités de ces systèmes, en raison de leurs implémentations logicielles inhérentes. En outre, l’industrie est liée à ses propres spécificités (faible latence, support de protocoles réseaux spécifiques), qui sont rarement couvertes par les solutions informatiques communes.L’objectif principal de cette thèse est d’étudier l’utilisation de dispositifs FPGA appliqués à la cybersécurité pour les réseaux industriels, soit comme support pour des applications de sécurité logicielle, soit pour effectuer des opérations critiques d’analyse réseau. Ce travail présente d’abord le contexte industriel, avec les systèmes de contrôle, leurs architectures, leurs besoins, les règles de mise en œuvre, les protocoles spécifiques et donne également deux exemples de systèmes de contrôle comme on peut en trouver dans l’industrie. Il met ensuite en lumière les problèmes de sécurité, avec une description des menaces les plus courantes, des études de cas sur leurs applications et leurs impacts dans un système de contrôle, et des discussions sur les contre-mesures de pointe disponibles sur le marché. Suite à l'établissement d'une cible de sécurité, nous mettrons en évidence la vulnérabilité des éléments logiciels et des systèmes d’exploitation. Nous verrons aussi comment l’absence d’analyse de sécurité tenant compte de l’état des processus peut mener à certaines vulnérabilités.Pour pallier à ces problèmes, nous proposons, par une première contribution, de renforcer la sécurité des systèmes logiciels en tirant parti des mécanismes de protection existants du FPGA. Enfin, pour répondre à des menaces applicatives spécifiques, nous proposons la mise en œuvre d’une architecture de reconnaissance de motifs, sur FPGA, prenant en considération le cadre temporel et l'état du procédé industriel. Cette thèse a été réalisée en collaboration avec le Laboratoire d'Informatique, de Robotique et de Microélectronique de Montpellier (LIRMM) et la société SECLAB
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zamora, Garcia Gerardo Alejandro. „Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach“. Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.

Der volle Inhalt der Quelle
Annotation:
This thesis presents Algorithmic State Machine (ASM) designs that follow the One Cycle Demand Driven Convention (OCDDC) of three cryptographic protocols: Secure Distributed Multiplication (SDM), Pi Secure Distributed Multiplication (PiSDM, or secure distributed multiplication of a sequence), and Secure Comparison (SC), all of which achieve maximum throughput of 1/32, 1/(32(l - 1)), and 1/(32(l - 1)), respectively, for l-bit numbers. In addition, these protocols where implemented in VHDL and tested using ModelSim-Altera, verifying their correct functionality. Noting that the difference between a scheme and a protocol is that protocols involve message exchanging between two or more parties, to the author's knowledge, these hardware designs are the first ever implementations of any kind of cryptographic protocol, and because of that reason, a general method is proposed to implement protocols in hardware. The SC protocol implementation is also shown to have a 300,000+ speed up over its Python implementation counterpart.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Liu, Changlei, und 劉長雷. „Bluetooth network design“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shen, Xiaowei 1966. „Design and verification of adaptive cache coherence protocols“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Subramanian, Srividhya. „Design and verification of secure E-commerce protocols /“. The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Design of protocols"

1

name, No. Vaccine protocols. 2. Aufl. Totowa, NJ: Humana Press, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Andrew, Robinson, Cranage Martin P und Hudson Michael, Hrsg. Vaccine protocols. 2. Aufl. Totowa, N.J: Humana Press, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

L, Hammond Joseph, und Pawlikowski Krzysztof, Hrsg. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sharp, Robin. Principles of protocol design. Berlin: Springer, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ehud, Gazit, und Nussinov Ruth, Hrsg. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

1947-, Robinson Andrew, Farrar Graham H und Wiblin Christopher N, Hrsg. Vaccine protocols. Totowa, N.J: Human Press, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kan, Jeff WT, und John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Holzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

American Telephone and Telegraph Company., Hrsg. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Design of protocols"

1

Wilson, Greg. „Protocols“. In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hyndman, David L., und Masato Mitsuhashi. „PCR Primer Design“. In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hercog, Drago. „System Specification and Design“. In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hercog, Drago. „Protocol Specification and Design“. In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Choi, Joonwon, Adam Chlipala und Arvind. „Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols“. In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.

Der volle Inhalt der Quelle
Annotation:
AbstractCache-coherence protocols have been one of the greatest challenges in formal verification of hardware, due to their central complication of executing multiple memory-access transactions concurrently within a distributed message-passing system. In this paper, we introduce Hemiola, a framework embedded in Coq that guides the user to design protocols that never experience inconsistent interleavings while handling transactions concurrently. The framework provides a DSL, where any protocol designed in the DSL always satisfies the serializability property, allowing a user to verify the protocol assuming that transactions are executed one-at-a-time. Hemiola also provides a novel invariant proof method, for protocols designed in Hemiola, that only requires considering execution histories without interleaved memory accesses. We used Hemiola to design and prove hierarchical MSI and MESI protocols as case studies. We also demonstrated that the case-study protocols are hardware-synthesizable, by using a compilation/synthesis toolchain targeting FPGAs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kůr, Jiří, Václav Matyáš und Petr Švenda. „Evolutionary Design of Attack Strategies“. In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Švenda, Petr. „Evolutionary Design of Attack Strategies“. In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

de Muro, Marilena Aquino. „Probe Design, Production, and Applications“. In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sarkar, Mouli, und Naveen Kumar. „De Novo Peptide Design Tools“. In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yu, Su-Yang, und Jeff Yan. „Security Design in Human Computation Games“. In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Design of protocols"

1

De Marchi, Mirco, und Nicola Bombieri. „Orchestration-Aware Optimization of ROS2 Communication Protocols“. In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dijk, Marten van, und Ulrich Ruhrmair. „Protocol attacks on advanced PUF protocols and countermeasures“. In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dijk, Marten van, und Ulrich Ruhrmair. „Protocol attacks on advanced PUF protocols and countermeasures“. In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Chiu, I., und L. H. Shu. „Potential Limitations of Verbal Protocols in Design Experiments“. In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.

Der volle Inhalt der Quelle
Annotation:
Contradictory results of a recent design stimulation and creativity experiment prompted us to re-examine our chosen methodological approach, namely the use of verbal protocols. We used verbal protocols to study design cognition associated with stimulus use. Our results showed that use of stimuli did not increase concept creativity, contradicting much of the design literature. After eliminating other possible errors, we re-examined the experimental methodology to identify potential design-specific limitations associated with verbal protocols. Many researchers have used verbal protocol experiments, also known as talk-out-loud experiments, to study cognitive processes, as there are few other methods to study internal cognition. While verbal protocols are a widely debated method, research has been done to validate them, and precautions can be taken to mitigate associated risks. Based on reviewing the literature and our own experiences, we have developed design-specific guidelines for the use of verbal protocols. We also outline future work required to explore and understand the suitability of verbal protocols for design studies. Despite potential limitations, verbal protocols remain a valuable and practical tool for studying design cognition and therefore should not be discarded.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Dong, Ling, Kefei Chen, Mi Wen und Yanfei Zheng. „Protocol Engineering Principles for Cryptographic Protocols Design“. In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

da Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli und J. Rabaey. „Wireless protocols design“. In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lubell, Joshua. „The Application Protocol Information Base World Wide Web Gateway“. In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.

Der volle Inhalt der Quelle
Annotation:
Abstract The Application Protocol Information Base (APIB) is an on-line repository of documents for the Standard for the Exchange of Product model data (STEP, officially ISO 10303 — Product Data Representation and Exchange). Document types in the APIB include STEP Application Protocols and Integrated Resources. Application Protocols are standards that are intended to be implemented in software systems, and Integrated Resources are used by them as building blocks. Application Protocols and Integrated Resources are represented in the Standard Generalized Markup Language (SGML) in the APIB in order to facilitate efficient information search and retrieval. This paper describes a World Wide Web gateway to the APIB, implemented using the Common Gateway Interface (CGI) standard. The APIB gateway allows STEP developers to efficiently search for ISO 10303 standards and supporting information. The only client software required to use the APIB gateway is a third party web browser.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Koh, Immanuel, Paul Keel und Jeffrey Huang. „Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix“. In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Chiasserini, C. F., P. Nuggehalli und V. Srinivasan. „Energy-efficient communication protocols“. In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Haeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger und Jane Burry. „Furniture Design Using Custom-Optimised Structural Nodes“. In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Design of protocols"

1

Rose, M. On the Design of Application Protocols. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Amer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1994. http://dx.doi.org/10.21236/ada290584.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Syverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, Januar 1996. http://dx.doi.org/10.21236/ada465132.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Serpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, Juli 2008. http://dx.doi.org/10.21236/ada484133.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lebovitz, G., und M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, Februar 2012. http://dx.doi.org/10.17487/rfc6518.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Griffin, Timothy G., Aaron D. Jaggard und Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, April 2004. http://dx.doi.org/10.21236/ada461910.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Herman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45100.

Der volle Inhalt der Quelle
Annotation:
This special report seeks to advance the field of ecological restoration by reviewing selected reports on the processes, procedures, and protocols associated with monitoring of ecological restoration projects. Specifically, this report identifies selected published herbaceous vegetation monitoring protocols at the national, regional, and local levels and then evaluates the recommended sampling design and methods from these identified protocols. Finally, the report analyzes the sampling designs and methods in the context of monitoring restored herbaceous vegetation at US Army Corps of Engineers (USACE) ecosystem restoration sites. By providing this information and the accompanying analyses in one document, this special report aids the current effort to standardize data-collection methods in monitoring ecosystem restoration projects.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Amer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1999. http://dx.doi.org/10.21236/ada370116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Krunz, Marwan, und Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada591559.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ang, Chwee B., und Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, Februar 2001. http://dx.doi.org/10.21236/ada405072.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie