Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Réseau Internet des objets“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Réseau Internet des objets" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Réseau Internet des objets"
Guyon, Frédérick. „Une accroche locale dans le réseau Internet“. Téoros 28, Nr. 2 (05.05.2014): 63–72. http://dx.doi.org/10.7202/1024808ar.
Der volle Inhalt der QuelleVivien, Laurent, Delphine Marris-Morini, Eric Cassan, Carlos Alonso-Ramos, Charles Baudot, Frédéric Bœuf und Bertrand Szelag. „Circuits intégrés photoniques silicium“. Photoniques, Nr. 93 (September 2018): 18–22. http://dx.doi.org/10.1051/photon/20189318.
Der volle Inhalt der QuelleLaferrière, Thérèse, Sylvie Barma, Fernand Gervais, Christine Hamel, Stéphane Allaire und Alain Breuleux. „TEACHING, LEARNING, AND KNOWLEDGE BUILDING: THE CASE OF THE REMOTE NETWORKED SCHOOL INITIATIVE“. Problems of Education in the 21st Century 40, Nr. 1 (20.03.2012): 96–113. http://dx.doi.org/10.33225/pec/12.40.96.
Der volle Inhalt der QuelleAncori, Bernard. „Espace-temps d’un réseau sociocognitif complexe“. Nouvelles perspectives en sciences sociales 3, Nr. 2 (17.04.2009): 113–81. http://dx.doi.org/10.7202/602478ar.
Der volle Inhalt der QuelleBordet, Isabelle, und Patricia Fize. „À Caen : une dynamique de « réseau des réseaux » REP et REP+“. Diversité 186, Nr. 1 (2016): 159–64. http://dx.doi.org/10.3406/diver.2016.4374.
Der volle Inhalt der QuelleLemos, André. „Artificial Intelligence’s Staging“. Sociétés 163, Nr. 1 (15.04.2024): 25–39. http://dx.doi.org/10.3917/soc.163.0025.
Der volle Inhalt der QuelleSandri, Eva. „Quelles utilisations des images de l’exposition sur les sites Internet de musées ? Congruence et incohérence entre objets et images numériques“. Article cinq 7, Nr. 2 (07.05.2015): 95–109. http://dx.doi.org/10.7202/1030252ar.
Der volle Inhalt der QuelleKirchler, Erich, und Annamaria Silvana de Rosa. „Analyse de l'effet des messages publicitaires grâce au réseau d'associations“. Recherche et Applications en Marketing (French Edition) 13, Nr. 1 (März 1998): 35–49. http://dx.doi.org/10.1177/076737019801300103.
Der volle Inhalt der QuelleProvencher-St-Pierre, Laurence. „Robert-Lionel Séguin et sa collection ethnologique : démarches, méthode et réseau“. Terrains 19 (15.10.2021): 105–22. http://dx.doi.org/10.7202/1082743ar.
Der volle Inhalt der QuelleLe Roch, Yann, und Éric Ballot. „Internet(s) des objets logistiques et modèles d'affaires“. Annales des Mines - Réalités industrielles Mai 2013, Nr. 2 (2013): 97. http://dx.doi.org/10.3917/rindu.132.0097.
Der volle Inhalt der QuelleDissertationen zum Thema "Réseau Internet des objets"
Hammi, Mohamed Tahar. „Sécurisation de l'Internet des objets“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Der volle Inhalt der QuelleInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Bonnefoi, Rémi. „Utilisation de la radio intelligente pour un réseau mobile à faible consommation d’énergie“. Thesis, CentraleSupélec, 2018. http://www.theses.fr/2018CSUP0001.
Der volle Inhalt der QuelleThe reduction of the carbon footprint of human activities is one of the current major economic and ecological challenges. Communication networks have a dual role in this reduction. On one hand, mobile networks, and in particular the base stations, are nowadays an important energy consumer. It is, thus, necessary to optimize their behavior in order to reduce their carbon footprint. On the other hand, some communication networks are necessary to better manage the electrical grid. Thanks to this better management, it is possible to improve the proportion of electricity produced by renewable energy sources.In this thesis, we look at both aspects. In a first step, we propose a solution to reduce the energy consumption of wireless mobile networks. For that purpose, we propose algorithms that optimize the power allocation when Cell Discontinuous Transmission is used by the base stations.In a second step, we propose a solution in order to improve the performance of Internet of Things networks used for the electrical grid. More precisely, we use multi-armed bandit algorithm for channel selection in IoT networks as a means of increasing the reliability of communications
Bamdé, Aurélien. „Essai d'une théorie sur l'architecture normative du réseau Internet“. Thesis, Paris 2, 2013. http://www.theses.fr/2013PA020036.
Der volle Inhalt der QuelleComplex is undoubtedly the adjective that best summarises the issue of the normative architecture of the Internet network. This issue is complex for two reasons. The first one results from the identification of the rules that make up this architecture and the second one from their purpose. First of all, the identification of the rules proves to be an extremely complex matter, since this concept of the rule is not so easy to define, as it refers to such a wide range of realities. After establishing the existence of the rules which set the behaviour of network builders, it is necessary to raise the question of the the nature of the rules. Here again, solving this issue is not as easy as it seems. In fact, in literature there is no universal way to distinguish the various types of rules. Secondly, the rules that compose the normative architecture of the internet aim at organising the digital society. Yet, this is a complex system. If one accepts the idea, one has to correlatively claim that the rule-complying scheme that enables such a system to be controlled is very different from that which rules more common rules for us, such as the rules of law. While the former is underpinned by a self organising mechanism, the creation of the latter stems from an act of willing. The difference between both schemes is significant: in the first case spontaneity controls the setting up of rules of conduct, while in the second case reason does. The opposition between these two normative schemes can be found in the digital universe too. It is conveyed by the existing competition between the digital and the legal orders. That is why the normative architecture of the Internet network will be described through the competition between these two normative systems
Pittoli, Philippe. „Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets“. Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
Der volle Inhalt der QuelleThe Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Marcastel, Alexandre. „Allocation de puissance en ligne dans un réseau IoT dynamique et non-prédictible“. Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG0995/document.
Der volle Inhalt der QuelleOne of the key challenges in Internet of Things (IoT) networks is to connect numerous, heterogeneous andautonomous devices. These devices have different types of characteristics in terms of: application, computational power, connectivity, mobility or power consumption. These characteristics give rise to challenges concerning resource allocation such as: a) these devices operate in a highly dynamic and unpredictable environments; b) the lack of sufficient information at the device end; c) the interference control due to the large number of devices in the network. The fact that the network is highly dynamic and unpredictable implies that existing solutions for resource allocation are no longer relevant because classical solutions require a perfect or statistical knowledge of the network. To address these issues, we use tools from online optimization and machine learning. In the online optimization framework, the device only needs to have strictly causal information to define its online policy. In order to evaluate the performance of a given online policy, the most commonly used notion is that of the regret, which compares its performance in terms of loss with a benchmark policy, i.e., the best fixed strategy computed in hindsight. Otherwise stated, the regret measures the performance gap between an online policy and the best mean optimal solution over a fixed horizon. In this thesis, we focus on an online power minimization problem under rate constraints in a dynamic IoT network. To address this issue, we propose a regret-based formulation that accounts for arbitrary network dynamics, using techniques used to solve the multi-armed bandit problem. This allows us to derive an online power allocation policy which is provably capable of adapting to such changes, while relying solely on strictly causal feedback. In so doing, we identify an important tradeoff between the amount of feedback available at the transmitter side and the resulting system performance. We first study the case in which the device has access to a vector, either the gradient or an unbiased estimated of the gradient, as information feedback. To limit the feedback exchange in the network our goal is to reduce it as mush as possible. Therefore, we study the case in which the device has access to only a loss-based information (scalar feedback). In this case, we propose a second online algorithm to determine an efficient and adaptative power allocation policy
Hahm, Oliver. „Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols“. Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX090/document.
Der volle Inhalt der QuelleThe Internet of Things aims to seamlessly integrate billions of so-called Smart Objects into traditional Internet infrastructures.From the hardware perspective, Smart Objects emerged when tiny, cheap computers became available, combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators interacting with the physical world, often powered by batteries.Typically, Smart Objects are thus heavily constrained in terms of CPU, memory and energy resources.Furthermore, wireless links used for communication among Smart Objects or towards the Internet are often slow, subject to high packet loss, and may require spontaneous store-and-forward among peer Smart Objects to ensure connectivity.Such characteristics pose challenges, on one hand in terms of software running on Smart Objects, and on the other hand in terms of network protocols Smart Objects use to communicate.In consequence, novel evaluation methods and experimental tools are needed to study Smart Object networks in vivo, new software platforms are needed to efficiently operate Smart Objects, and innovative networking paradigms and protocols are required to interconnect Smart Objects.This thesis addresses these challenges by introducing new tools for large scale testbed-driven experimental research, a novel operating system (RIOT) applicable to a wide variety of connected Smart Objects, and several new mechanisms leveraging information-centric networking which significantly improve energy-efficiency compared to state-of-the-art network protocols in the Internet of Things
Dalmasso, Loïc. „De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets“. Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.
Der volle Inhalt der QuelleThe Internet of Things (IoT) is a global infrastructure, aiming to connect any systems of various kinds, to generate new services. While this hyperconnectivity offers many opportunities in many areas (e.g. health, industry, energy, etc.), its deployment represents a major challenge in terms of security and privacy. The use of cryptography becomes essential, particularly to ensure the confidentiality of data. Nevertheless, classical algorithms such as AES are not designed to be embedded in systems with limited resources, such as connected devices. To address this issue, the scientific community is moving towards so-called "lightweight" cryptography. Despite this term, to what extent is it relevant and in line with the resources of the connected objects ? What level of security can it achieve ?Through common metrics, the objective of the first axis of this thesis is to determine the gains of lightweight cryptography compared to the classical one, in terms of size, performance and robustness against side channel analysis, recognized as a major attack vector. This evaluation focuses on the AES- 128 standard and its close lightweight derivatives PRESENT-80/128 and more recent GIFT-64- 128/GIFT-128-128, whose bit-level oriented structure favours hardware implementation. In terms of performances, GIFT-64-128 is positioned as the best alternative, with a reduction in size by almost a factor of 10, for a 58% gain in efficiency over AES-128. In terms of resistance against side channel analysis, CPA in this thesis, lightweight cryptography is once again proving its worth, with PRESENT-128 achieving an increased robustness by a factor of 3 compared to AES-128.Although indispensable, confidentiality alone is not enough to create a secure environment. Facing the emergence of cyber attacks, an IoT ecosystem has to integrate security mechanisms to deal with various threats. In addition, its network topology is becoming conducive to decentralization for efficiency reasons. Without central organization, how can the reliability and security of a highly heterogeneous environment be ensured ?The second part of this thesis proposes a trust protocol, specifically designed for IoT. Inspired by the blockchain concept, several optimizations have been implemented, allowing to reduce the use of resources to a minimum. In an approach centered on network gateways, the results show a reduction in storage space by a factor of 3 000 compared to Bitcoin, as well as a latency divided by 18, for a consumption lower than that of a smartphone charger. Finally, an extension of the protocol is proposed to be embedded in objects. The model focuses on the trust assessment in a close environment, that means on entities where direct communication is possible. With less than 400 bytes, the protocol is capable of evaluating the trust of about ten objects, and up to thirty with only 1 KB
Naas, Mohammed Islam. „Placement des données de l'internet des objets dans une infrastructure de fog“. Thesis, Brest, 2019. http://www.theses.fr/2019BRES0014/document.
Der volle Inhalt der QuelleIn the coming years, Internet of Things (IoT) will be one of the applications generating the most data. Nowadays, IoT data is stored in the Cloud. As the number of connected objects increases, transmitting the large amount of produced data to the Cloud will create bottlenecks. As a result, latencies will be high and unpredictable. In order to reduce these latencies, Fog computing has been proposed as a paradigm extending Cloud services to the edge of the network. It consists of using any equipment located in the network (e.g. router) to store and process data. Therefore, the Fog presents a heterogeneous infrastructure. Indeed, its components have differences in computing performance, storage capacity and network interconnections. This heterogeneity can further increase the latency of the service. This raises a problem: the wrong choice of data storage locations can increase the latency of the service. In this thesis, we propose a solution to this problem in the form of four contributions: 1. A formulation of the IoT data placement problem in the Fog as a linear program. 2. An exact solution to solve the data placement problem using the CPLEX, a mixed linear problem solver. 3. Two heuristics based on the principle of “divide and conquer” to reduce the time of placement computation. 4. An experimental platform for testing and evaluating solutions for IoT data placement in the Fog, integrating data placement management with iFogSim, a Fog and IoT environment simulator
Vucinic, Malisa. „Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things“. Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM084/document.
Der volle Inhalt der QuelleOur research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization
Sagar, Samya. „Gestion intelligente de réseaux de capteurs, intégrés à des vêtements sportifs instrumentés“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0129/document.
Der volle Inhalt der QuelleThe Internet of Things (IoT) integrates sensor networks with the Internet, and paves the way for systems or ecosystems to help people live in both physical and cyber worlds. IoT offers the ubiquity of objects that are able to interact with each other and cooperate with their neighbors to achieve common goals. These objects, called "Smart" (SO), can detect the environment and communicate with other objects. The creation of SO and IoT system involves actors of very diverse expertise. Hence, it becomes essential to have standardized and semantic descriptions to solve the problems related to the interoperability and the semantic heterogeneity between the different available resources on the one hand, and between the different stakeholders designing/manufacturing the SO, on the other hand. Therefore, we have proposed the FSMS semantic and generic framework, which is structured into a set of ontological modules to design/manufacture a given SO. A support methodology for this framework has been equally proposed. It is based on the same ontological modules identified in the semantic component of the FSMS. These ontological modules form the SMS ontology that is proposed and constitutes the corner stone of this thesis. In order to intelligently manage an SO design, we proposed a generic process based on a semantic description of the structural and behavioral components of an SO. This process was thereafeter implemented for Smart Clothing of sports. This Sportswear is intended to be used in different contexts of use, an approach to reconfiguration/adaptation of the operation of the Smart Clothing has been proposed. This one is also based on the modular ontology SMS
Bücher zum Thema "Réseau Internet des objets"
1966-, Normant François, Centre de recherche informatique de Montréal und Groupe C, Hrsg. Internet: Introduction au réseau. Montréal: Éditions Logiques, 1995.
Den vollen Inhalt der Quelle findenDufour, Arnaud. Internet. 2. Aufl. Paris: Presses Universitaires de France, 1996.
Den vollen Inhalt der Quelle findenInternet. 8. Aufl. Paris: Presses universitaires de France, 2000.
Den vollen Inhalt der Quelle findenInternet: Mode d'emploi. Paris: Sybex, 1996.
Den vollen Inhalt der Quelle findenThiran, Yves. Sexe, mensonges et Internet: Réseau et transparence. Bruxelles: Labor, 2000.
Den vollen Inhalt der Quelle findenKenyon, Brown, Hrsg. Voyages sur Internet. Paris: Sybex, 1995.
Den vollen Inhalt der Quelle findenVéronique, Lévy, Hrsg. Toujours plus sur Internet pour les nuls. Paris: Sybex, 1999.
Den vollen Inhalt der Quelle findenLevine, Young Margaret, Hrsg. Toujours plus sur Internet pour les nuls. Paris: Sybex, 1995.
Den vollen Inhalt der Quelle findenSchieb, Jörg. Voice over IP: Telefonieren übers Internet. Kilchberg: SmartBooks, 2006.
Den vollen Inhalt der Quelle findenL'ingénierie pédagogique: Pour construire l'apprentissage en réseau. Sainte-Foy: Presses de l'Université du Québec, 2002.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Réseau Internet des objets"
HONBA HONBA, Cédric. „Sémiotique et archive d’images“. In Corpus audiovisuels, 125–46. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5705.
Der volle Inhalt der QuelleHADDADOU, Kamel, und Guy PUJOLLE. „Cloud et Edge Networking dans l’IoT“. In Cloud et Edge Networking, 165–89. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9128.ch10.
Der volle Inhalt der QuelleBenghozi, Pierre-Jean, Sylvain Bureau und Françoise Massit-Folléa. „Defining the Internet of Things“. In L’Internet des objets, 91–99. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.97.
Der volle Inhalt der QuelleAL AGHA, Khaldoun, Pauline LOYGUE und Guy PUJOLLE. „L’exemple de Green Communications“. In Edge Networking, 207–20. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch10.
Der volle Inhalt der QuelleBenghozi, Pierre-Jean, Sylvain Bureau und Françoise Massit-Folléa. „Technical evolution of the Internet of Things“. In L’Internet des objets, 111–20. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.99.
Der volle Inhalt der QuelleLE GALL, Guillaume, Georgios Z. PAPADOPOULOS, Mohamed-Aymen CHALOUF und Nicolas MONTAVONT. „Vers une gestion intelligente de la qualité de service dans l’IoT : cas d’un réseau Low Rate WPAN“. In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 107–35. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch5.
Der volle Inhalt der QuelleHADJADJ-AOUL, Yassine, und Soraya AIT-CHELLOUCHE. „Utilisation de l’apprentissage par renforcement pour la gestion des accès massifs dans les réseaux NB-IoT“. In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 27–55. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch2.
Der volle Inhalt der QuelleBenghozi, Pierre-Jean, Sylvain Bureau und Françoise Massit-Folléa. „The prominence and challenges of the Internet of Things“. In L’Internet des objets, 101–10. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.98.
Der volle Inhalt der QuelleAMRAOUI, Asma, und Badr BENMAMMAR. „Optimisation des réseaux à l’aide des techniques de l’intelligence artificielle“. In Gestion et contrôle intelligents des réseaux, 71–94. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch3.
Der volle Inhalt der QuelleZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE und Axel LEGAY. „L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée“. In Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Réseau Internet des objets"
Michel, Frederic, Matthieu Papaux, Mohsen Ghribi und Azeddine Kaddouri. „Conception d'un Robot Mobile Télécommandé Via Internet et Réseau Local“. In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277312.
Der volle Inhalt der QuelleORLIANGES, Jean-Christophe, Younes El Moustakime, Aurelian Crunteanu STANESCU, Ricardo Carrizales Juarez und Oihan Allegret. „Retour vers le perceptron - fabrication d’un neurone synthétique à base de composants électroniques analogiques simples“. In Les journées de l'interdisciplinarité 2023. Limoges: Université de Limoges, 2024. http://dx.doi.org/10.25965/lji.761.
Der volle Inhalt der QuelleHaboyan, Razmik. „La Grande Réinitialisation : projet, symptôme ou promesse ? La transition comme une arme de guérilla sémiotique“. In Actes du congrès de l’Association Française de Sémiotique. Limoges: Université de Limoges, 2024. http://dx.doi.org/10.25965/as.8487.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Réseau Internet des objets"
Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin und Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, Dezember 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Der volle Inhalt der Quelle