Journal articles on the topic 'Computer network protocols – Specifications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer network protocols – Specifications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.
Full textEL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.
Full textSija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textCHEN, BO, and SAMIRA SADAOUI. "A GENERIC FORMAL FRAMEWORK FOR CONSTRUCTING AGENT INTERACTION PROTOCOLS." International Journal of Software Engineering and Knowledge Engineering 15, no. 01 (February 2005): 61–85. http://dx.doi.org/10.1142/s0218194005001884.
Full textTightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.
Full textAyyagari, A., and A. Ray. "A Fiber-Optic-Based Protocol for Manufacturing System Networks: Part I—Conceptual Development and Architecture." Journal of Dynamic Systems, Measurement, and Control 114, no. 1 (March 1, 1992): 113–20. http://dx.doi.org/10.1115/1.2896492.
Full textJmaiel, Mohamed, and Peter Pepper. "Development of communication protocols using algebraic and temporal specifications." Computer Networks 42, no. 6 (August 2003): 737–64. http://dx.doi.org/10.1016/s1389-1286(03)00215-9.
Full textMayouf, Mabroka Ali, and Zarina Shukur. "Animation of Natural Language Specifications of Authentication Protocols." Journal of Computer Science 4, no. 7 (July 1, 2008): 503–8. http://dx.doi.org/10.3844/jcssp.2008.503.508.
Full textLetichevsky, A., J. Kapitonova, A. Letichevsky, V. Volkov, S. Baranov, and T. Weigert. "Basic protocols, message sequence charts, and the verification of requirements specifications." Computer Networks 49, no. 5 (December 2005): 661–75. http://dx.doi.org/10.1016/j.comnet.2005.05.005.
Full textKim, Wonsoo, Kumaran Vijayasankar, Mickael Chouteau, and Jianwei Zhou. "An Experimental Study of Sub-1 GHz Frequency-Hopping-Based 6LoWPAN Mesh Networking for Smart-Grid Applications." Journal of Computer Networks and Communications 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/5787653.
Full textNakahara, Akiko, Hitoshi Aida, and Tadao Saito. "Performance evaluation of communication networks based on FSM specifications of protocols." Systems and Computers in Japan 23, no. 13 (1992): 1–14. http://dx.doi.org/10.1002/scj.4690231301.
Full textHerzberg, Amir, and Igal Yoffe. "The layered games framework for specifications and analysis of security protocols." International Journal of Applied Cryptography 1, no. 2 (2008): 144. http://dx.doi.org/10.1504/ijact.2008.021087.
Full textUnger, Nik, and Ian Goldberg. "Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (January 1, 2018): 21–66. http://dx.doi.org/10.1515/popets-2018-0003.
Full textLI, YONGJIAN, and RUI XUE. "DESIGN OF A CIL CONNECTOR TO SPIN." International Journal of Software Engineering and Knowledge Engineering 18, no. 01 (February 2008): 65–91. http://dx.doi.org/10.1142/s0218194008003568.
Full textMartynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.
Full textGao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.
Full textMALLOY, BRIAN A., ERROL L. LLOYD, JASON O. HALLSTROM, and EDWARD B. DUFFY. "CAPTURING INTERFACE PROTOCOLS TO SUPPORT COMPREHENSION AND EVALUATION OF C++ LIBRARIES." International Journal of Software Engineering and Knowledge Engineering 21, no. 08 (December 2011): 1123–46. http://dx.doi.org/10.1142/s0218194011005645.
Full textJin, Wenquan, Rongxu Xu, Sunhwan Lim, Dong-Hwan Park, Chanwon Park, and Dohyeun Kim. "Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers." Mobile Information Systems 2021 (May 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/5590605.
Full textBishop, Steve, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, and Keith Wansbrough. "Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets." ACM SIGCOMM Computer Communication Review 35, no. 4 (October 2005): 265–76. http://dx.doi.org/10.1145/1090191.1080123.
Full textAl Dallal, Jehad, and Kassem Saleh. "Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–13. http://dx.doi.org/10.1155/2008/794960.
Full textCHANG, YI-HSING, and CHING-LUNG YANG. "A HIGH-EFFICIENCY KNOWLEDGE MANAGEMENT SYSTEM BASED ON HABITUAL DOMAINS AND INTELLIGENT AGENTS." International Journal of Software Engineering and Knowledge Engineering 18, no. 08 (December 2008): 1083–114. http://dx.doi.org/10.1142/s0218194008004021.
Full textLavric, Alexandru, and Valentin Popa. "Performance Evaluation of LoRaWAN Communication Scalability in Large-Scale Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–9. http://dx.doi.org/10.1155/2018/6730719.
Full textXavereyno, Anselmus. "Comparative Analysis of VoIP Server Performance on Single Board Computers and Conventional CPUs." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 6, no. 1 (May 7, 2018): 23–27. http://dx.doi.org/10.33795/jartel.v6i1.134.
Full textvon Bochmann, G., and R. Gotzhein. "Deriving protocol specifications from service specifications." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 148–56. http://dx.doi.org/10.1145/1013812.18190.
Full textSidhu, D. P., and J. Aristizabal. "Constructing submodule specifications and network protocols." IEEE Transactions on Software Engineering 14, no. 11 (1988): 1565–77. http://dx.doi.org/10.1109/32.9045.
Full textKhendek, F., G. von Bochmann, and C. Kant. "New results on deriving protocol specifications from service specifications." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 136–45. http://dx.doi.org/10.1145/75247.75261.
Full textTOGASHI, ATSUSHI, GLENN MANSFIELD, and NORIO SHIRATORI. "ANIMATING LOTOS SPECIFICATIONS USING AMLOG." International Journal of Software Engineering and Knowledge Engineering 06, no. 01 (March 1996): 5–19. http://dx.doi.org/10.1142/s0218194096000028.
Full textWu, Xi, Huibiao Zhu, Yongxin Zhao, Zheng Wang, and Liu Si. "Modeling and verifying the Ariadne protocol using process algebra." Computer Science and Information Systems 10, no. 1 (2013): 393–421. http://dx.doi.org/10.2298/csis120601009w.
Full textYamaguchi, Hirozumi, Khaled El-Fakih, Gregor v. Bochmann, and Teruo Higashino. "Deriving protocol specifications from service specifications written as Predicate/Transition-nets." Computer Networks 51, no. 1 (January 2007): 258–84. http://dx.doi.org/10.1016/j.comnet.2006.03.011.
Full textGouda, Mohamed G. "Network protocols between exact specifications and pragmatic implementations." ACM Computing Surveys 28, no. 4es (December 1996): 43. http://dx.doi.org/10.1145/242224.242278.
Full textMordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.
Full textTerpeny, Janis P., and Robert P. Davis. "Postoptimality analysis for a network protocol feature specification model." Computers & Industrial Engineering 9, no. 4 (January 1985): 327–37. http://dx.doi.org/10.1016/0360-8352(85)90020-8.
Full textKant, Christian, Teruo Higashino, and Gregor von Bochmann. "Deriving protocol specifications from service specifications written in LOTOS." Distributed Computing 10, no. 1 (July 27, 1996): 29–47. http://dx.doi.org/10.1007/s004460050022.
Full textWelzl, Michael, Stephan Oepen, Cezary Jaskula, Carsten Griwodz, and Safiqul Islam. "Collaboration in the IETF." ACM SIGCOMM Computer Communication Review 51, no. 3 (July 11, 2021): 29–32. http://dx.doi.org/10.1145/3477482.3477488.
Full textAmara Korba, Abdelaziz, Mehdi Nafaa, and Salim Ghanemi. "An efficient intrusion detection and prevention framework for ad hoc networks." Information & Computer Security 24, no. 4 (October 10, 2016): 298–325. http://dx.doi.org/10.1108/ics-08-2015-0034.
Full textBodei, C., P. Degano, R. Focardi, and C. Priami. "Authentication primitives for secure protocol specifications." Future Generation Computer Systems 21, no. 5 (May 2005): 645–53. http://dx.doi.org/10.1016/j.future.2004.05.004.
Full textCervesato, Iliano. "Typed Multiset Rewriting Specifications of Security Protocols." Electronic Notes in Theoretical Computer Science 40 (March 2001): 8–51. http://dx.doi.org/10.1016/s1571-0661(05)80035-0.
Full textJero, Samuel, Maria Leonor Pacheco, Dan Goldwasser, and Cristina Nita-Rotaru. "Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9478–83. http://dx.doi.org/10.1609/aaai.v33i01.33019478.
Full textKapus-Kolar, Monika. "Comments on deriving protocol specifications from service specifications written in LOTOS." Distributed Computing 12, no. 4 (September 1, 1999): 175–77. http://dx.doi.org/10.1007/s004460050064.
Full textPapadimitriou, C. H., V. Rangan, and M. Sideri. "Designing secure communication protocols from trust specifications." Algorithmica 11, no. 5 (May 1994): 485–99. http://dx.doi.org/10.1007/bf01293268.
Full textMariño, Perfecto, Miguel Ángel Domı́nguez, Francisco Poza, and Fernando Vázquez. "Using LOTOS in the specification of industrial bus communication protocols." Computer Networks 45, no. 6 (August 2004): 767–99. http://dx.doi.org/10.1016/j.comnet.2004.03.029.
Full textDabbous, Walid, Sean O'Malley, and Claude Castelluccia. "Generating efficient protocol code from an abstract specification." ACM SIGCOMM Computer Communication Review 26, no. 4 (October 1996): 60–72. http://dx.doi.org/10.1145/248157.248163.
Full textKumar, Rahul, and Eric G. Mercer. "Verifying Communication Protocols Using Live Sequence Chart Specifications." Electronic Notes in Theoretical Computer Science 250, no. 2 (September 2009): 33–48. http://dx.doi.org/10.1016/j.entcs.2009.08.016.
Full textBaldoni, Matteo, Cristina Baroglio, Elisa Marengo, and Viviana Patti. "Constitutive and regulative specifications of commitment protocols." ACM Transactions on Intelligent Systems and Technology 4, no. 2 (March 2013): 1–25. http://dx.doi.org/10.1145/2438653.2438657.
Full textSLIVA, VLADIMIR P., TADAO MURATA, and SOL M. SHATZ. "PROTOCOL SPECIFICATION DESIGN USING AN OBJECT-BASED PETRI NET FORMALISM." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 97–125. http://dx.doi.org/10.1142/s0218194099000073.
Full textRudin, H. "An informal overview of formal protocol specification." IEEE Communications Magazine 23, no. 3 (March 1985): 46–52. http://dx.doi.org/10.1109/mcom.1985.1092527.
Full textTakura, Akira, Takafumi Sera, and Tadashi Ohta. "Protocol synthesis from rule-based communications service specifications." Electronics and Communications in Japan (Part I: Communications) 81, no. 3 (March 1998): 22–35. http://dx.doi.org/10.1002/(sici)1520-6424(199803)81:3<22::aid-ecja3>3.0.co;2-a.
Full textAnand, K. C., and R. K. Shyamasundar. "Formal Verification of Activity-Based Specification of Protocols." Journal of Parallel and Distributed Computing 60, no. 5 (May 2000): 639–76. http://dx.doi.org/10.1006/jpdc.2000.1622.
Full textAnderson, David P., and Lawrence H. Landweber. "A grammar-based methodology for protocol specification and implementation." ACM SIGCOMM Computer Communication Review 15, no. 4 (September 1985): 63–70. http://dx.doi.org/10.1145/318951.319006.
Full textMurphy, S. L., and A. U. Shankar. "Service specification and protocol construction for the transport layer." ACM SIGCOMM Computer Communication Review 18, no. 4 (August 1988): 88–97. http://dx.doi.org/10.1145/52325.52334.
Full text