Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Reuse and protocol exchange“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Reuse and protocol exchange" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Reuse and protocol exchange"
Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, Mustafa Doğu, Hatice Inan, Hatice Eser Okten, Serdar Coskun und Huseyin Selcuk. „Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming“. Membranes 12, Nr. 1 (23.12.2021): 10. http://dx.doi.org/10.3390/membranes12010010.
Der volle Inhalt der QuelleTermens, Miquel, Mireia Ribera und Anita Locher. „An analysis of file format control in institutional repositories“. Library Hi Tech 33, Nr. 2 (15.06.2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.
Der volle Inhalt der QuelleSTINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE und ROBERT C. DURST. „ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)“. Journal of Interconnection Networks 03, Nr. 03n04 (September 2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.
Der volle Inhalt der QuelleCui, Hui, und Glen Mudra. „Authenticated Key Exchange under Bad Randomness, Revisited“. Mathematics 11, Nr. 12 (15.06.2023): 2721. http://dx.doi.org/10.3390/math11122721.
Der volle Inhalt der QuelleGoncharov, M. V., und K. A. Kolosov. „On interoperability of metadata within RNPLS&T’s Single Open Information Archive“. Scientific and Technical Libraries, Nr. 10 (12.11.2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.
Der volle Inhalt der QuelleLi, Wei, und Xin Wang. „Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software“. Mobile Information Systems 2021 (19.10.2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.
Der volle Inhalt der QuelleHardwick, Martin. „On STEP-NC and the Complexities of Product Data Integration“. Journal of Computing and Information Science in Engineering 4, Nr. 1 (01.03.2004): 60–67. http://dx.doi.org/10.1115/1.1641188.
Der volle Inhalt der QuelleMeyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor und Jakob Andert. „Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests“. Automotive Innovation 4, Nr. 4 (16.10.2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.
Der volle Inhalt der QuelleYavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar und Chien-Ming Chen. „An Improved Blockchain-Based Authentication Protocol for IoT Network Management“. Security and Communication Networks 2020 (26.10.2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.
Der volle Inhalt der QuelleGilissen, Valentijng, und Hella Hollander. „Archiving the Past While Keeping up with the Times“. Studies in Digital Heritage 1, Nr. 2 (14.12.2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.
Der volle Inhalt der QuelleDissertationen zum Thema "Reuse and protocol exchange"
Djaffardjy, Marine. „Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation“. Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.
Der volle Inhalt der QuelleBioinformatics is a multidisciplinary field that combines biology, computer science, and statistics, aiming to gain a better understanding of living mechanisms. It relies primarily on the analysis of biological data. Major technological improvements, especially sequencing technologies, gave rise to an exponential increase of data, laying out new challenges in data analysis and management.In order to analyze this data, bioinformaticians use pipelines, which chain computational tools and processes. However, the reproducibility crisis in scientific research highlights the necessity of making analyses reproducible and reusable by others.Scientific workflow systems have emerged as a solution to make pipelines more structured, understandable, and reproducible. Workflows describe procedures with multiple coordinated steps involving tasks and their data dependencies. These systems assist bioinformaticians in designing and executing workflows, facilitating their sharing and reuse. In bioinformatics, the most popular workflow systems are Galaxy, Snakemake, and Nextflow.However, the reuse of workflows faces challenges, including the heterogeneity of workflow systems, limited accessibility to workflows, and the need for public workflow databases. Additionally, indexing and developing workflow search engines are necessary to facilitate workflow discovery and reuse.In this study, we developed an analysis method for workflow specifications to extract several representative characteristics from a dataset of workflows. The goal was to propose a standardized representation framework independent of the specification language. Additionally, we selected a set of workflow characteristics and indexed them into a relational database and a structured semantic format. Finally, we established an approach to detect similarity between workflows and between processors, enabling us to observe the reuse practices adopted by workflow developers
Soltwisch, Rene Alexander. „The Inter-Domain Key Exchange Protocol“. Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Der volle Inhalt der QuelleNilsson, Kim. „Reactive Networking using Dynamic Link Exchange Protocol“. Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.
Der volle Inhalt der QuelleChandramohan, Vijay. „Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol“. [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.
Der volle Inhalt der QuelleSardana, Divya. „Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks“. University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.
Der volle Inhalt der QuellePage, Shannon Charles. „Testing Protocol Development for a Proton Exchange Membrane Fuel Cell“. Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.
Der volle Inhalt der QuelleNinet, Tristan. „Formal verification of the Internet Key Exchange (IKEv2) security protocol“. Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Der volle Inhalt der QuelleIn this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
Thomson, Derek Stewart. „The development of packaged, reusable building services components : a pilot study in the UK national health service“. Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.
Der volle Inhalt der QuelleBuck, Randall Jay. „WiFu Transport: A User-level Protocol Framework“. BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.
Der volle Inhalt der QuelleGustavsson, C. C. Magnus. „Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post“. Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Der volle Inhalt der QuelleSMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.
In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.
Bücher zum Thema "Reuse and protocol exchange"
Canada Mortgage and Housing Corporation., Hrsg. Water reuse standards and verification protocol. [Ottawa]: CMHC, 2004.
Den vollen Inhalt der Quelle findenCanada Mortgage and Housing Corporation., Hrsg. Water reuse standards and verification protocol. Ottawa: Canada Mortgage and Housing Corporation, 2005.
Den vollen Inhalt der Quelle findenCurtis, Parks, und National Institute of Standards and Technology (U.S.), Hrsg. Initial Graphics Exchange Specification hybrid microcircuit application protocol. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Den vollen Inhalt der Quelle findenCommunity, Southern African Development. Protocol on Culture, Information and Sport. [Gaborone]: Southern African Development Community, 2001.
Den vollen Inhalt der Quelle findenInstitute Of Electrical and Electronics Engineers. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- common specifications--: Part 4: system load protocol. New York, N.Y: Institute of Electrical and Electronics Engineers, 1994.
Den vollen Inhalt der Quelle findenUnited States. Department of State, Hrsg. Double taxation: Convention between the United States of America and Japan, signed at Washington, November 6, 2003, with protocol and exchange of notes. Washington, D.C.]: U.S. Dept. of State, 2012.
Den vollen Inhalt der Quelle findenProtocol amending tax convention with Germany: Report (to accompany Treaty doc. 109-20 and exchange of notes dated August 17, 2006 (EC-2046)). Washington, D.C: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenChina. Double taxation, taxes on income: Agreement between the United States of America and the People's Republic of China, signed at Beijing April 30, 1984 with Protocol and exchange of notes and protocol signed at Beijing May 10, 1986. Washington, D.C: Dept. of State, 1995.
Den vollen Inhalt der Quelle findenMexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Washington, D.C: Dept. of State, 1998.
Den vollen Inhalt der Quelle findenMexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Washington, D.C: Dept. of State, 1998.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Reuse and protocol exchange"
Liu, Chao, Zhongxiang Zheng und Guangnan Zou. „Key Reuse Attack on NewHope Key Exchange Protocol“. In Lecture Notes in Computer Science, 163–76. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12146-4_11.
Der volle Inhalt der QuelleMa, Jianfeng, Changguang Wang und Zhuo Ma. „Authenticated Key Exchange Protocol“. In Security Access in Wireless Local Area Networks, 231–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_6.
Der volle Inhalt der QuelleRafat, Khan Farhan. „A Stealth Key Exchange Protocol“. In Advances in Intelligent Systems and Computing, 675–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22868-2_48.
Der volle Inhalt der QuelleBarcau, Mugurel, Vicenţiu Paşol, Cezar Pleşca und Mihai Togan. „On a Key Exchange Protocol“. In Innovative Security Solutions for Information Technology and Communications, 187–99. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69284-5_13.
Der volle Inhalt der QuelleHe, Lihong. „Secure Group Key Exchange Protocol“. In Electrical Engineering and Control, 391–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21765-4_49.
Der volle Inhalt der QuelleOniz, Cagil Can, Erkay Savas und Albert Levi. „A Fair Multimedia Exchange Protocol“. In Computer and Information Sciences - ISCIS 2005, 342–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569596_37.
Der volle Inhalt der QuelleShanker, Udai, B. Vidyareddi und Anupam Shukla. „PERDURABLE: A Real Time Commit Protocol“. In Recent Trends in Information Reuse and Integration, 1–17. Vienna: Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0738-6_1.
Der volle Inhalt der QuelleJiménez, Joan Campmany, Iza Romanowska, Rubina Raja und Eivind Heldaas Seland. „2Modelling an Urban Hinterland. The Case of Roman Palmyra“. In Exchange and Reuse in Roman Palmyra, 7–24. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132169.
Der volle Inhalt der QuelleŻuchowska, Marta. „8Textile Economy of Roman Palmyra“. In Exchange and Reuse in Roman Palmyra, 83–98. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132175.
Der volle Inhalt der QuelleButcher, Kevin. „3Circuits of Exchange: Palmyrene Coins and Roman Monetary Plurality“. In Exchange and Reuse in Roman Palmyra, 25–36. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132170.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Reuse and protocol exchange"
Saeed, Maryam, Hadi Shahriar Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun und Mohammad Zare Bidoki. „A secure two-party password-authenticated key exchange protocol“. In 2014 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 2014. http://dx.doi.org/10.1109/iri.2014.7051926.
Der volle Inhalt der QuellePedditi, Sandeep Reddy, Du Zhang und Chung-E. Wang. „FIEP: An initial design of a firewall information exchange protocol“. In 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI). IEEE, 2013. http://dx.doi.org/10.1109/iri.2013.6642446.
Der volle Inhalt der QuelleNi, Peifang. „Augmented Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies without Scripts“. In 8th International Conference on Artificial Intelligence and Fuzzy Logic System (AIFZ 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121605.
Der volle Inhalt der QuelleBeringer, Dorothea, Laurence Melloul und Gio Wiederhold. „A reuse and composition protocol for services“. In the 1999 symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/303008.303027.
Der volle Inhalt der QuelleHarrison, Andrew, Ian Harvey, Andrew Jones, David Rogers und Ian Taylor. „Object reuse and exchange for publishing and sharing workflows“. In the 6th workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2110497.2110506.
Der volle Inhalt der QuelleYang, Xuan, Zhaoping Yu und Bin Kang. „Chameleon-Based Optimistic Fair Exchange Protocol“. In 2008 International Conference on Embedded Software and Systems. IEEE, 2008. http://dx.doi.org/10.1109/icess.2008.26.
Der volle Inhalt der QuelleGanjavi, Ramin, Maryam Rajabzadeh Asaar und Mahmoud Salmasizadeh. „A traceable optimistic fair exchange protocol“. In 2014 11th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2014. http://dx.doi.org/10.1109/iscisc.2014.6994041.
Der volle Inhalt der QuelleYiyao Hao, D. M. Havey und D. A. Turner. „An exchange protocol for alternative currencies“. In International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.78.
Der volle Inhalt der QuelleSofu Risqi, Y. S., und Susila Windarta. „Design key exchange protocol SOFU-11“. In 2016 International Seminar on Intelligent Technology and its Applications (ISITIA). IEEE, 2016. http://dx.doi.org/10.1109/isitia.2016.7828671.
Der volle Inhalt der QuelleYi, Tong, Minyong Shi und Wenqian Shang. „Personalized two party key exchange protocol“. In 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS). IEEE, 2015. http://dx.doi.org/10.1109/icis.2015.7166659.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Reuse and protocol exchange"
Mahy, R., und B. Tate. Connection Reuse in the Session Initiation Protocol (SIP). Herausgegeben von V. Gurbani. RFC Editor, Juni 2010. http://dx.doi.org/10.17487/rfc5923.
Der volle Inhalt der QuelleKaufman, C., Hrsg. Internet Key Exchange (IKEv2) Protocol. RFC Editor, Dezember 2005. http://dx.doi.org/10.17487/rfc4306.
Der volle Inhalt der QuelleRatliff, S., S. Jury, D. Satterwhite, R. Taylor und B. Berry. Dynamic Link Exchange Protocol (DLEP). RFC Editor, Juni 2017. http://dx.doi.org/10.17487/rfc8175.
Der volle Inhalt der QuelleRose, M. The Blocks Extensible Exchange Protocol Core. RFC Editor, März 2001. http://dx.doi.org/10.17487/rfc3080.
Der volle Inhalt der QuelleFeinstein, B., und G. Matthews. The Intrusion Detection Exchange Protocol (IDXP). RFC Editor, März 2007. http://dx.doi.org/10.17487/rfc4767.
Der volle Inhalt der QuelleLear, E., und K. Crozier. Using the NETCONF Protocol over the Blocks Extensible Exchange Protocol (BEEP). RFC Editor, Dezember 2006. http://dx.doi.org/10.17487/rfc4744.
Der volle Inhalt der QuelleClancy, T., und W. Arbaugh. Extensible Authentication Protocol (EAP) Password Authenticated Exchange. RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4746.
Der volle Inhalt der QuelleKaufman, C., P. Hoffman, Y. Nir und P. Eronen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, September 2010. http://dx.doi.org/10.17487/rfc5996.
Der volle Inhalt der QuelleKaufman, C., P. Hoffman, Y. Nir, P. Eronen und T. Kivinen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, Oktober 2014. http://dx.doi.org/10.17487/rfc7296.
Der volle Inhalt der QuelleNeumann, Scott, Jeramy Lochner, Siddharth Sridhar, Scott Mix, Olga Kuchar, Surya Singh, Mark Rice und Charles Schmidt. Universal Utility Data Exchange (UUDEX) - Protocol Design. Office of Scientific and Technical Information (OSTI), August 2019. http://dx.doi.org/10.2172/1776875.
Der volle Inhalt der Quelle