Academic literature on the topic 'Conception de protocoles'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Conception de protocoles.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Conception de protocoles"
Alata, Eric, Vincent Nicomette, Julien Duch êne, Colas Le Guernic, and Mohamed Kaaniche. "Outils pour la rétro-conception de protocoles. Analyse et classification." Techniques et sciences informatiques 35, no. 6 (December 30, 2016): 609–40. http://dx.doi.org/10.3166/tsi.35.609-640.
Full textAmira, Derradji, and Verdier Christine. "Conception et évaluation d’un langage orienté patient pour la représentation de protocoles de soins." Ingénierie des systèmes d'information 21, no. 2 (April 28, 2016): 123–46. http://dx.doi.org/10.3166/isi.21.2.123-146.
Full textMasbernat, Raphaël, Églantine Bigot-Doll, Maxime Fouillat, Elisabeth Sulmont, François Pacquelet, Antoine Chevalier, Naomi Pereira, and Chloé Blanc. "Machines à voir, machines à penser : écosystème robotique situé pour la conception architecturale." SHS Web of Conferences 147 (2022): 06001. http://dx.doi.org/10.1051/shsconf/202214706001.
Full textCalixte, Xaviera, Karine Cuffi, and Pierre Leclercq. "Mise en place d’un outil pédagogique de documentation du processus de conception architecturale." SHS Web of Conferences 147 (2022): 03002. http://dx.doi.org/10.1051/shsconf/202214703002.
Full textMonod-Ansaldi, Réjane, Michèle Prieur, Isabelle Arbez, and Agnès Golay. "Étayer la conception de protocoles expérimentaux par des élèves de CM2 pour évaluer l’entrée d’eau dans la plante." RDST, no. 12 (November 15, 2015): 113–39. http://dx.doi.org/10.4000/rdst.1144.
Full textBennett, Fionn C. "Expliquer according to Jacques Derrida : explanation and critique." Recherches anglaises et nord-américaines 37, no. 1 (2004): 137–49. http://dx.doi.org/10.3406/ranam.2004.1729.
Full textChazalon, Jean-François. "Approche du traitement non chirurgical des supraclusions par la technique des aligneurs : quels protocoles de traitement et comment optimiser les résultats cliniques ?" Revue d'Orthopédie Dento-Faciale 56, no. 1 (February 2022): 51–70. http://dx.doi.org/10.1051/odf/2022006.
Full textSoulez, Antonia. "Otto Neurath : la force d’une pensée constructiviste du possible contre le déclinisme." Les cercles viennois de l'entre-deux-guerres 94 (2022): 187–209. http://dx.doi.org/10.4000/11vee.
Full textMelançon, Benoît. "Pour une lecture sociale de la correspondance de Saint-Denys Garneau." Dossier 20, no. 1 (August 29, 2006): 96–106. http://dx.doi.org/10.7202/201142ar.
Full textHÉRODIN, F. "Problèmes éthiques posés par la recherche duale sur les cellules souches menée par le Service de santé des armées." Revue Médecine et Armées, Volume 43, Numéro 3 (June 1, 2015): 240–45. http://dx.doi.org/10.17184/eac.6882.
Full textDissertations / Theses on the topic "Conception de protocoles"
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Full textSeinturier, Lionel. "Conception d'algorithmes répartis et de protocoles réseaux en approche objet." Phd thesis, Paris, CNAM, 1997. http://tel.archives-ouvertes.fr/tel-00439136.
Full textEtrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Full textThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
SANTOSO, HARRY. "Conception et evaluation de protocoles de communication a haut debit." Paris 6, 1993. http://www.theses.fr/1993PA066238.
Full textDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification." Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Full textThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Tanter, Éric. "Des protocoles de métaobjets aux noyaux versatiles pour la programmation par aspects." Nantes, 2004. http://www.theses.fr/2004NANT2075.
Full textBendedouch, Fethi. "Conception et realisation d'un systeme d'apprentissage des protocoles de communication assiste par ordinateur : simulation et analyse des protocoles." Toulouse 3, 1987. http://www.theses.fr/1987TOU30033.
Full textBendedouch, Fethi. "Conception et réalisation d'un système d'apprentissage des protocoles de communication assisté par ordinateur simulation et analyse des protocoles /." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37602822c.
Full textSTEFFAN, LAURENT. "Conception et specification de protocoles de communication pour applications temps reel." Nantes, 1988. http://www.theses.fr/1988NANT2046.
Full textPlainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Full textRelaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Books on the topic "Conception de protocoles"
Liljeroth, Pia. Rädsla inför förlossningen: Ett uppenbart kliniskt problem? : konstruktionen av förlossningsrädsla som medicinsk kategori. Åbo: Åbo Akademis förlag, 2009.
Find full textQuirouette, R. L. Le mur à écran pare-pluie: Un protocole de mise en service. Ottawa, Ont: Société canadienne d'hypothèques et de logement, 1996.
Find full textBellavance, English Lisa, ed. Combinatorial library methods and protocols. Totowa, N.J: Humana Press, 2002.
Find full textWAHL, Sondi. Conception et Evaluation Protocole Rouhb: Conception et Evaluation de Protocole de Routage Ad Hoc. ISTE Editions Ltd., 2023.
Find full textSpecial Edition Using SOAP. Que, 2001.
Find full textGrijalba Carabali, Paola Andrea, Adriana Pérez Portocarrero, Jhon Fredy Salazar Riascos, and Jorge Humberto Restrepo Zapata. Guía de protocolo del síndrome de pie diabético. Editorial Universidad Santiago de Cali, 2019. http://dx.doi.org/10.35985/9789585248403.
Full textFaúndez C., Jorge, Marlene Verónica González González, Patricio Parra Sanhueza, and Juan Carlos Valencia Baier. Manual 38: Manual para la certificación sanitaria forestal. INFOR, 2001. http://dx.doi.org/10.52904/20.500.12220/6669.
Full textCatanesi, Cecilia Inés, and Egle Etel Villegas Castagnasso, eds. Elementos de Genética para estudiantes de Ciencias Biológicas. Editorial de la Universidad Nacional de La Plata (UNLP), 2021. http://dx.doi.org/10.35537/10915/129625.
Full textCustom CGI Scripting with Perl. John Wiley & Sons, 2001.
Find full textHanegan, Kevin. Custom CGI Scripting with Perl. Wiley & Sons, Incorporated, John, 2002.
Find full textBook chapters on the topic "Conception de protocoles"
Bentley, Joseph. "Neurath’s Conception of Protocol Statements." In Logical Empiricism and Naturalism, 67–96. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29328-3_3.
Full textWoodland, Sarah, and Kamarra Bell-Wykes. "Culturally Led, Culturally Safe Performance Making." In First Nations Australian Theatre for Health Equity, 61–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65506-7_4.
Full textWAHL, Martine, and Patrick SONDI. "Évaluation des performances du protocole pour des applications coopératives." In Conception et évaluation de protocole de routage ad hoc, 155–211. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch4.
Full textIsel, M. "Conception et réalisation des orthèses." In Orthèses De la Main et du Poignet. Protocoles De Rééducation, 29–37. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71185-5.00005-9.
Full textWAHL, Martine, and Patrick SONDI. "Enjeux autour des communications ad hoc sur la route." In Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Full textWAHL, Martine, and Patrick SONDI. "Intégration des composantes ad hoc dans une infrastructure globale." In Conception et évaluation de protocole de routage ad hoc, 249–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch6.
Full textWAHL, Martine, and Patrick SONDI. "Approche fonctionnelle de conception de protocole." In Conception et évaluation de protocole de routage ad hoc, 17–80. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch2.
Full textBentley, Joseph. "Conceptions of Protocol Sentences in Neurath and Carnap and the Bipartite Metatheory Conception." In Ways of the Scientific World-Conception. Rudolf Carnap and Otto Neurath, 152–79. BRILL, 2024. http://dx.doi.org/10.1163/9789004680203_008.
Full textWAHL, Martine, and Patrick SONDI. "Modèle formel pour l’analyse de propriétés du protocole." In Conception et évaluation de protocole de routage ad hoc, 213–47. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch5.
Full textWAHL, Martine, and Patrick SONDI. "Modèles et simulations pour l’analyse de performance." In Conception et évaluation de protocole de routage ad hoc, 81–153. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch3.
Full textConference papers on the topic "Conception de protocoles"
Frikha, Mounir, and Jamila Ben Slimane. "Conception and simulation of energy-efficient AODV protocol in ad hoc networks." In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292343.
Full textDel Junco González, Juan José. "Conexiones disciplinarias en una práctica "mestiza”. El caso de la “ornitología emocional”." In V Congreso Internacional de Investigacion en Artes Visuales ANIAV 2022. RE/DES Conectar. València: Editorial Universitat Politècnica de València, 2022. http://dx.doi.org/10.4995/aniav2022.2022.15501.
Full textMichaud, Martin, Daniel Forgues, Julien Meyer, and Claudiane Ouellet- Plamondon. "A Case Study on Improving Standardization in the Conception Phase by Developing Tools and Protocols." In 27th Annual Conference of the International Group for Lean Construction (IGLC). International Group for Lean Construction, 2019. http://dx.doi.org/10.24928/2019/0176.
Full textFlorensa Ferrando, Ignasi, Iria Fraga Rivas, and Víctor Martínez Junza. "Mathematics education in engineering: a triple discontinuity?" In SEFI 50th Annual conference of The European Society for Engineering Education. Barcelona: Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788412322262.1144.
Full textMauricio, María Dolores, Eva Serna, Soraya Lilian Vallés, Martín Aldasoro, and José María Vila. "Aprendiendo de forma cooperativa a través del método científico." In In-Red 2016 - Congreso de Innovación Educativa y Docencia en Red de la Universitat Politècnica de València. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/inred2016.2016.4289.
Full textSouza, Wander Pereira de, Artur de Souza Moret, Sandro Adalberto, Gleimiria Batista da Costa Matos, Haroldo de Sá Medeiros, and Dércio Bernardes de Souza. "Sustainable tourism and public policies in the Amazon: Scientific invisibility." In III SEVEN INTERNATIONAL MULTIDISCIPLINARY CONGRESS. Seven Congress, 2023. http://dx.doi.org/10.56238/seveniiimulti2023-220.
Full textCaballero, Victor, David Vernet, Agustín Zaballos, and Guiomar Corral. "Web of Energy: hacia la integración inteligente para las redes de sensores en Smart Grids." In XIII Jornadas de Ingenieria Telematica - JITEL2017. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6499.
Full textLuca, Andreea iuliana, and Ioana roxana Podina. "ETHIC MODELS SHAPING (IM)MORAL IDENTITY IN (POST)PANDEMIC TIMES: A PROPOSAL FOR A LONGITUDINAL STUDY PROTOCOL." In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-176.
Full textMarín Ramos, Ruben. "En el Parque." In II Congreso Internacional Estéticas Híbridas de la Imagen en Movimiento: Identidad y Patrimonio. Valencia: Universitat Politàcnica de València, 2021. http://dx.doi.org/10.4995/eshid2021.2021.13240.
Full textAparicio Pico, Lilia Edith, and Patrick Francois Tarquino Aparicio. "TELESALUD UN MODELO DE CONVERGENCIA ENTRE TECNOLOGÍA, MEDICINA Y EDUCACIÓN." In La formación de ingenieros: un compromiso para el desarrollo y la sostenibilidad. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2020. http://dx.doi.org/10.26507/ponencia.813.
Full textReports on the topic "Conception de protocoles"
Wolfenson, David, William W. Thatcher, and James E. Kinder. Regulation of LH Secretion in the Periovulatory Period as a Strategy to Enhance Ovarian Function and Fertility in Dairy and Beef Cows. United States Department of Agriculture, December 2003. http://dx.doi.org/10.32747/2003.7586458.bard.
Full textOsejo, Alejandra, Ana María Garrido, Juana Alvarez, Santiago Martínez, Diana Lara, Omar Ruiz, and Bernardo Posada. Guía para la caracterización de la gobernanza en paisajes rurales. Edited by Alejandra Osejo. Instituto de Investigación de Recursos Biológicos Alexander von Humboldt, December 2019. http://dx.doi.org/10.21068/cssbgobernanza2019.
Full textBritt, Jack, Miriam Rosenberg, Steven Washburn, and Moshe Kaim. Development and Evaluation of a Method of Hormonal Treatment to Increase Fertility in Dairy Cows. United States Department of Agriculture, December 1995. http://dx.doi.org/10.32747/1995.7612833.bard.
Full text