Auswahl der wissenschaftlichen Literatur zum Thema „Protocoles de communications“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Protocoles de communications" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Protocoles de communications"
Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He und Muhammad Farhan. „A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management“. Systems 11, Nr. 7 (24.06.2023): 322. http://dx.doi.org/10.3390/systems11070322.
Der volle Inhalt der QuelleSangam, Sahana V., Sahana S. Kulkarni und Asst Prof Chaitanya K. Jambotkar. „Smart Grid Communication Protocols“. International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (28.02.2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.
Der volle Inhalt der QuelleBoeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif und Juan Lopez. „Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed“. Energies 17, Nr. 2 (11.01.2024): 373. http://dx.doi.org/10.3390/en17020373.
Der volle Inhalt der QuelleGee, K. „Communications network protocols“. Computer Communications 8, Nr. 5 (Oktober 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.
Der volle Inhalt der QuelleGossner, Olivier. „Protocoles de communication robustes.“ Revue économique 48, Nr. 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.
Der volle Inhalt der QuelleGossner, Olivier. „Protocoles de communication robustes“. Revue économique 48, Nr. 3 (Mai 1997): 685. http://dx.doi.org/10.2307/3502853.
Der volle Inhalt der QuelleGossner, Olivier. „Protocoles de communication robustes.“ Revue économique 48, Nr. 3 (01.05.1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.
Der volle Inhalt der QuelleSuleman, Danladi, Rania Shibl und Keyvan Ansari. „Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions“. Smart Cities 6, Nr. 5 (06.10.2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.
Der volle Inhalt der QuelleSingh, Rameshwar, und Prof Gayatri Bhoyar. „Green Communications Using Ambient Backscattered: The Review Paper“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 8 (31.08.2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.
Der volle Inhalt der QuelleBoczkowski, Lucas, Iordanis Kerenidis und Frédéric Magniez. „Streaming Communication Protocols“. ACM Transactions on Computation Theory 10, Nr. 4 (17.10.2018): 1–21. http://dx.doi.org/10.1145/3276748.
Der volle Inhalt der QuelleDissertationen zum Thema "Protocoles de communications"
Gerault, David. „Security analysis of contactless communication protocols“. Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Der volle Inhalt der QuelleMoulierac, Joanna. „Agrégation des communications multicast“. Rennes 1, 2006. http://www.theses.fr/2006REN1S151.
Der volle Inhalt der QuelleMoulierac, Joanna Rubino Gerardo. „Agrégation des communications multicast“. [S.l.] : [s.n.], 2006. ftp://ftp.irisa.fr/techreports/theses/2006/moulierac.pdf.
Der volle Inhalt der QuelleArnal, Fabrice. „Optimisation de la fiabilité pour des communications multipoints par satellite géostationnaire“. Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00001160.
Der volle Inhalt der QuelleMota, Gonzalez Sara del Socorro. „Modélisation et vérification de protocoles pour des communications sécurisées de groupes“. Toulouse, INPT, 2008. http://ethesis.inp-toulouse.fr/archive/00000628/.
Der volle Inhalt der QuelleSystems that implement communications in the form of group multicast have increasingly raised security problems. The protection mechanisms applied to that communication rely on symmetrical and asymmetrical key exchanges, and the way these mechanisms are selected does influence the system’s efficiency. Following an in depth analysis of the needs captured by these systems, we defined a model for representing the dynamics of groups, as well as communication among group members. We defined one system architecture which focuses on key creation, exchange and management functions. The system was modeled in UML 2. 0 and checked against security and temporal properties. The approach we followed to investigate temporal requirements may be extended to a broad variety of distributed systems
Mota, Gonzalez Sara Del Socorro. „Modélisation et vérification de protocoles pour des communications sécurisées de groupes“. Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2008. http://tel.archives-ouvertes.fr/tel-00309824.
Der volle Inhalt der QuelleMota, Gonzalez Sara del Socorro Villemur Thierry Diaz Michel. „Modélisation et vérification de protocoles pour des communications sécurisées de groupes“. Toulouse : INP Toulouse, 2008. http://ethesis.inp-toulouse.fr/archive/00000628.
Der volle Inhalt der QuelleTourki, Kamel. „Conception et optimisation de protocoles de coopération pour les communications sans fil“. Nice, 2008. http://www.theses.fr/2008NICE4006.
Der volle Inhalt der QuelleCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Guitton, Alexandre. „Communications multicast : contributions aux réseaux optiques et au passage à l'échelle“. Rennes 1, 2005. https://hal-clermont-univ.archives-ouvertes.fr/tel-01448117.
Der volle Inhalt der QuelleGuitton, Alexandre Marie Raymond Molnár Miklós. „Communications multicast contributions aux réseaux optiques et au passage à l'échelle /“. [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/guitton.pdf.
Der volle Inhalt der QuelleBücher zum Thema "Protocoles de communications"
Bulbrook, Dale. WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.
Den vollen Inhalt der Quelle findenHalsall, Fred. Introduction to data communications and computer networks. Wokingham, England: Addison-Wesley, 1985.
Den vollen Inhalt der Quelle findenHalsall, Fred. Data communications, computer networks, and OSI. 2. Aufl. Wokingham, England: Addison-Wesley, 1988.
Den vollen Inhalt der Quelle findenStevens, W. Richard. UNIX network programming: Interprocess communications. 2. Aufl. Noida (IN): Addison Wesley Longman Singapore Pte. Ltd., 1999.
Den vollen Inhalt der Quelle findenStallings, William. Data and Computer Communications. 5. Aufl. Upper Saddle River, N.J: Prentice Hall, 1997.
Den vollen Inhalt der Quelle findenStallings, William. Data and computer communications. 3. Aufl. Cowley: Maxwell Macmillan, 1991.
Den vollen Inhalt der Quelle findenWilliam, Stallings. Data and computer communications. 8. Aufl. Upper Saddle River, N.J: Pearson/Prentice Hall, 2007.
Den vollen Inhalt der Quelle findenWilliam, Stallings. Data and computer communications. 2. Aufl. New York: Macmillan Pub. Co., 1988.
Den vollen Inhalt der Quelle findenWilliam, Stallings. Data and computer communications. 3. Aufl. New York: Macmillan Pub. Co., 1991.
Den vollen Inhalt der Quelle findenWilliam, Stallings. Data and computer communications. New York: Macmillan Pub. Co., 1985.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Protocoles de communications"
Hercog, Drago. „Communication Service, Communication Protocol“. In Communication Protocols, 45–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_4.
Der volle Inhalt der QuelleJaved, Adeel. „Communication Protocols“. In Building Arduino Projects for the Internet of Things, 35–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1940-9_3.
Der volle Inhalt der QuelleSuhonen, Jukka, Mikko Kohvakka, Ville Kaseva, Timo D. Hämäläinen und Marko Hännikäinen. „Communication Protocols“. In Low-Power Wireless Sensor Networks, 27–41. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2173-3_4.
Der volle Inhalt der QuelleSubero, Armstrong. „Communication Protocols“. In Programming Microcontrollers with Python, 185–208. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7058-5_7.
Der volle Inhalt der QuelleĎud’ák, Juraj, und Gabriel Gaspar. „Communication Protocols“. In Signals and Communication Technology, 1–76. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-30152-0_1.
Der volle Inhalt der QuelleKanagachidambaresan, G. R., und Bharathi N. „Communication Protocols“. In Sensors and Protocols for Industry 4.0, 73–112. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9007-1_3.
Der volle Inhalt der QuelleYang, Ke, Meihua Xiao, Zifan Song und Ri Ouyang. „Deriving Security Protocols Based on Protocol Derivation System“. In Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Der volle Inhalt der QuelleQin, Xudong, Yuxin Deng und Wenjie Du. „Verifying Quantum Communication Protocols with Ground Bisimulation“. In Tools and Algorithms for the Construction and Analysis of Systems, 21–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_2.
Der volle Inhalt der QuelleCowley, John. „Network Protocols“. In Communications and Networking, 81–109. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_6.
Der volle Inhalt der QuelleHercog, Drago. „Communication Protocol Performance“. In Communication Protocols, 83–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_6.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Protocoles de communications"
Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri und Markus Endler. „GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things“. In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Der volle Inhalt der QuelleTan, Yang, und Bo Lv. „Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections“. In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Der volle Inhalt der QuelleGeromel, Paulo A., und Sergio T. Kofuji. „Avaliação do U-Net em Clusters com Rede Myrinet“. In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.
Der volle Inhalt der QuelleCruz, Tiago Rodrigo, Gustavo Cainelli, Max Feldman und Ivan Muller. „Towards handover in IWN: a fast data collection technique“. In Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1172.
Der volle Inhalt der QuelleLivesey, Joseph, und Dominik Wojtczak. „Propositional Gossip Protocols under Fair Schedulers“. In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Der volle Inhalt der QuelleBarcelos, Patrícia Pitthan A., Taisy Silva Weber und Roberto Jung Drebes. „Um Toolkit para Avaliação da Intrusão de Métodos de Injeção de Falhas“. In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/wtf.2002.23398.
Der volle Inhalt der QuelleFritzke Jr., Udo, Luiz Alberto F. Gomes, Denis L. Silva und Daniel M. Morais. „A Meta Protocol for Adaptable Mobile Replicated Databases“. In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23247.
Der volle Inhalt der QuelleLi, Kuang-Yu J., und B. Keith Jenkins. „A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems“. In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.
Der volle Inhalt der QuellePauli, Joakim. „Service Oriented Vehicle Diagnostic Communication and Regulations“. In Automotive Technical Papers. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-5050.
Der volle Inhalt der QuelleTiflea, Denisa-Ionela. „Vulnerabilities of LRSAS Protocol“. In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Protocoles de communications"
Brooks, Richard R. Detecting Hidden Communications Protocols. Fort Belvoir, VA: Defense Technical Information Center, Februar 2013. http://dx.doi.org/10.21236/ada581858.
Der volle Inhalt der QuelleAdler, Micah, und Bruce M. Maggs. Protocols for Asymetric Communication Channels. Fort Belvoir, VA: Defense Technical Information Center, Dezember 1997. http://dx.doi.org/10.21236/ada333259.
Der volle Inhalt der QuelleCarroll, J. Ritchie, und F. Russell Robertson. A COMPARISON OF PHASOR COMMUNICATIONS PROTOCOLS. Office of Scientific and Technical Information (OSTI), März 2019. http://dx.doi.org/10.2172/1504742.
Der volle Inhalt der QuelleP., R., P. A., P. Sijben, S. Brim und M. Shore. Middlebox Communications (midcom) Protocol Requirements. RFC Editor, August 2002. http://dx.doi.org/10.17487/rfc3304.
Der volle Inhalt der QuelleStiemerling, M., J. Quittek und T. Taylor. Middlebox Communications (MIDCOM) Protocol Semantics. RFC Editor, Februar 2005. http://dx.doi.org/10.17487/rfc3989.
Der volle Inhalt der QuelleBarnes, M., Hrsg. Middlebox Communications (MIDCOM) Protocol Evaluation. RFC Editor, Juni 2005. http://dx.doi.org/10.17487/rfc4097.
Der volle Inhalt der QuelleLiu, Ming T. Protocol Engineering for Multimedia Communications. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1995. http://dx.doi.org/10.21236/ada305077.
Der volle Inhalt der QuelleEspinoza, J., P. Sholander und B, Van Leeuwen. Effective Protocols for Mobile Communications and Networking. Office of Scientific and Technical Information (OSTI), Dezember 1998. http://dx.doi.org/10.2172/2758.
Der volle Inhalt der QuelleMoser, Louise E., und P. M. Melliar-Smith. Secure Multicast Protocols for Group Communication. Fort Belvoir, VA: Defense Technical Information Center, Juni 2001. http://dx.doi.org/10.21236/ada388045.
Der volle Inhalt der QuelleAwerbuch, Baruch, Alan Baratz und David Peleg. Cost-Sensitive Analysis of Communication Protocols. Fort Belvoir, VA: Defense Technical Information Center, Juni 1991. http://dx.doi.org/10.21236/ada237356.
Der volle Inhalt der Quelle