Academic literature on the topic 'Computer network protocols – Specifications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – Specifications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer network protocols – Specifications"
Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.
Full textEL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.
Full textSija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textCHEN, BO, and SAMIRA SADAOUI. "A GENERIC FORMAL FRAMEWORK FOR CONSTRUCTING AGENT INTERACTION PROTOCOLS." International Journal of Software Engineering and Knowledge Engineering 15, no. 01 (February 2005): 61–85. http://dx.doi.org/10.1142/s0218194005001884.
Full textTightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.
Full textAyyagari, A., and A. Ray. "A Fiber-Optic-Based Protocol for Manufacturing System Networks: Part I—Conceptual Development and Architecture." Journal of Dynamic Systems, Measurement, and Control 114, no. 1 (March 1, 1992): 113–20. http://dx.doi.org/10.1115/1.2896492.
Full textJmaiel, Mohamed, and Peter Pepper. "Development of communication protocols using algebraic and temporal specifications." Computer Networks 42, no. 6 (August 2003): 737–64. http://dx.doi.org/10.1016/s1389-1286(03)00215-9.
Full textMayouf, Mabroka Ali, and Zarina Shukur. "Animation of Natural Language Specifications of Authentication Protocols." Journal of Computer Science 4, no. 7 (July 1, 2008): 503–8. http://dx.doi.org/10.3844/jcssp.2008.503.508.
Full textLetichevsky, A., J. Kapitonova, A. Letichevsky, V. Volkov, S. Baranov, and T. Weigert. "Basic protocols, message sequence charts, and the verification of requirements specifications." Computer Networks 49, no. 5 (December 2005): 661–75. http://dx.doi.org/10.1016/j.comnet.2005.05.005.
Full textKim, Wonsoo, Kumaran Vijayasankar, Mickael Chouteau, and Jianwei Zhou. "An Experimental Study of Sub-1 GHz Frequency-Hopping-Based 6LoWPAN Mesh Networking for Smart-Grid Applications." Journal of Computer Networks and Communications 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/5787653.
Full textDissertations / Theses on the topic "Computer network protocols – Specifications"
Son, Chang Won. "Functional description and formal specification of a generic gateway." Diss., The University of Arizona, 1988. http://hdl.handle.net/10150/184534.
Full textCwikla, Joseph J. "Specifying, Implementing and Verifying Layered Network Protocols." University of Akron / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=akron1217270536.
Full textTsiknis, George. "Specification-verification of protocols : the significant event temporal logic technique." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/25047.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Li, Zheng. "A pattern-based approach to the specification and validation of web services interactions." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070618.115228/index.html.
Full textA thesis submitted to Faculty of Information and Communication Technologies, Swinburne University of Technology for the degree of Master of Science by Research, 2007. Typescript. Bibliography p. 107-112.
Nguyen, Quoc The. "Protocols specification and validation for the movement of Grades 2 and 3 Bitstream data through the Virtual Channel Link Control layer of the return link of the CCSDS Principal Network (CPN)." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43293.
Full textMaster of Science
Irey, Philip Musser IV. "From specification to realization: implementing the express transfer protocol." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43088.
Full textMaster of Science
Berglund, Anders. "On the understanding of computer network protocols." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86076.
Full textPerlman, Radia Joy. "Network layer protocols with Byzantine robustness." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14403.
Full textFord, Daniel Alexander. "Semi-automatic implementation of network protocols." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24665.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.
Full textBooks on the topic "Computer network protocols – Specifications"
Tarnay, Katie. Protocol specification and testing. New York: Plenum Press, 1991.
Find full textIEEE Computer Society. Technical Committee on Computer Communications., ed. Token-passing bus access method and physical layer specifications: IEEE standards for local area networks. New York, NY, USA: Institute of Electrical and Electronics Engineers, 1985.
Find full textTao, JianYi. Protocol interoperability between DDN and ISO protocols: A study and specification report. Tucson, Ariz: Computer Engineering Research Laboratory, University of Arizona, 1989.
Find full textIFIP WG6.1 International Workshop on Protocol Specification, Testing and Verification (5th 1985 Toulouse-Moissac). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 fifth International Workshop on Protocol Specification, Testing, and Verification organized by the LAAS du CNRS, Toulouse-Moissac, France, June 10-13, 1985. Amsterdam: North-Holland, 1986.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing and Verification (6th Montreal, Quebec 1986). Protocol specification, testing and verification, VI: Proceedings of the IFIP WG6.1 sixth International Workshop on Protocol Specification Testing, and Verification organized by Concordia University and Université de Montréal Montreal, Quebec, Canada, June 10-13, 1986. Amsterdam: North-Holland, 1987.
Find full textInternational, Organization for Standardization Technical Committee ISO/TC 46 Documentation SC4/WG4. Documentation, interlibrary loan protocol specification. [S.l: s.n., 1989.
Find full textIFIP, WG 6. 1. International Workshop on Protocol Specification Testing and Verification (4th 1984 Skytop Lodge Pa ). Protocol specification, testing, and verification, IV: Proceedings of the IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1985.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (5th 1985 Toulouse, France and Moissac, Tarn-et-Garonne, France). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 Fifth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1986.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (6th 1986 Montréal, Québec). Protocol specification, testing, and verification, VI: Proceedings of the IFIP WG 6.1 Sixth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (7th 1987 Zurich, Switzerland). Protocol specification, testing, and verification, VII: Proceedings of the IFIP WG 6.1 Seventh International Conference on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.
Find full textBook chapters on the topic "Computer network protocols – Specifications"
Bochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.
Full textAbadi, Martín. "Security Protocols and Specifications." In Lecture Notes in Computer Science, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49019-1_1.
Full textHarrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.
Full textSchwartz, Mischa, and Thomas E. Stern. "Routing Protocols." In Computer Network Architectures and Protocols, 239–71. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_9.
Full textJeannin, Jean-Baptiste, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, and Nikhil Swamy. "dkal ⋆ : Constructing Executable Specifications of Authorization Protocols." In Lecture Notes in Computer Science, 139–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_10.
Full textPapadimitriou, Christos H., Venkat Rangan, and Martha Sideri. "Designing secure communication protocols from trust specifications." In Lecture Notes in Computer Science, 360–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54967-6_81.
Full textConference papers on the topic "Computer network protocols – Specifications"
Thu, Kyaw Myat, Myo Thet Naung, Kyaw Zaw Ye, and V. V. Devyatkov. "The Formal Logical Analysis of the Correctness of the Specifications of Network Protocol SIP." In 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim). IEEE, 2016. http://dx.doi.org/10.1109/uksim.2016.47.
Full textHe, HuiHui, and YongJun Wang. "PNFUZZ: A Stateful Network Protocol Fuzzing Approach Based on Packet Clustering." In 6th International Conference on Computer Science, Engineering And Applications (CSEA 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101805.
Full textCiobanu, G., and K. N. Sridhar. "Specifications and verification of network protocols by process algebra." In Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05). IEEE, 2005. http://dx.doi.org/10.1109/synasc.2005.68.
Full textKim, Eunsoo, Dongkwan Kim, CheolJun Park, Insu Yun, and Yongdae Kim. "BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/ndss.2021.24365.
Full textOswald, Nicolai, Vijay Nagarajan, and Daniel J. Sorin. "ProtoGen: Automatically Generating Directory Cache Coherence Protocols from Atomic Specifications." In 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2018. http://dx.doi.org/10.1109/isca.2018.00030.
Full textKalai, Yael Tauman, Xin Li, Anup Rao, and David Zuckerman. "Network Extractor Protocols." In 2008 IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 2008. http://dx.doi.org/10.1109/focs.2008.73.
Full textOliveira, Loreno, Andre Rodrigues, Kyller Gorgonio, and Angelo Perkusich. "Specification and analysis of a Bluetooth handoff protocol for real-time applications." In 2008 16th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2008. http://dx.doi.org/10.1109/softcom.2008.4669475.
Full textVazquez Sandoval, Itzel, and Gabriele Lenzini. "Experience Report: How to Extract Security Protocols' Specifications from C Libraries." In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.10325.
Full textAslanyan, Levon, Hasmik Sahakyan, Vladimir Romanov, Georges Da Costa, and Rahim Kacimi. "Large Network Target Coverage Protocols." In 2019 Computer Science and Information Technologies (CSIT). IEEE, 2019. http://dx.doi.org/10.1109/csitechnol.2019.8895058.
Full textVinodh Kumar, B., and J. Ramesh. "Automotive in vehicle network protocols." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921836.
Full text