Academic literature on the topic 'Jabber (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jabber (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Jabber (Computer network protocol)"

1

Al-Saadoon, Ghossoon M. W. "A Platform to Develop a Secure Instant Messaging Using Jabber Protocol." Journal of Computer Science 5, no. 9 (September 1, 2009): 661–65. http://dx.doi.org/10.3844/jcssp.2009.661.665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Radia, Perlman. "Network protocol folklore." ACM SIGCOMM Computer Communication Review 49, no. 5 (November 8, 2019): 48–53. http://dx.doi.org/10.1145/3371934.3371953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neville-Neil, George V. "The network protocol battle." Communications of the ACM 55, no. 4 (April 2012): 27–28. http://dx.doi.org/10.1145/2133806.2133816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Neville-Neil, George V. "The Network Protocol Battle." Queue 10, no. 1 (January 2012): 10–12. http://dx.doi.org/10.1145/2090147.2090149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stenn, Harlan. "Securing network time protocol." Communications of the ACM 58, no. 2 (January 28, 2015): 48–51. http://dx.doi.org/10.1145/2697397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stenn, Harlan. "Securing the Network Time Protocol." Queue 13, no. 1 (December 31, 2014): 20–25. http://dx.doi.org/10.1145/2716276.2717320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mason, Ian A., and Carolyn L. Talcott. "Simple Network Protocol Simulation within Maude." Electronic Notes in Theoretical Computer Science 36 (2000): 274–91. http://dx.doi.org/10.1016/s1571-0661(05)80139-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tu-Chih Tsai. "NETWORK PROTOCOL HANDBOOK [Book Reviews]." IEEE Communications Magazine 34, no. 1 (January 1996): 10. http://dx.doi.org/10.1109/mcom.1996.482238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edmond, W., K. Leib, and C. Topolcic. "The DARPA wideband network protocol." ACM SIGCOMM Computer Communication Review 20, no. 4 (August 1990): 79–89. http://dx.doi.org/10.1145/99517.99539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Jabber (Computer network protocol)"

1

Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dukach, Semyon. "SNPP--a Simple Network Payment Protocol." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/12629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Edwin N. (Edwin Neil) 1975. "A protocol for network level caching." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9860.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (p. 44-45).
by Edwin N. Johnson.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Du, Jingzhe. "Geometric routing protocol in Disruption tolerant network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27680.

Full text
Abstract:
We describe Geometric Localized Routing (GLR) in Disruption (delay) tolerant networks (DTNs). Although DTNs do not guarantee the connectivity of the network all the time, geometric location information still could be used to make routing decisions in a store and forward way. When a message reaches a region where greedy forwarding is impossible for some time, geometric planar spanners, especially local Delaunay triangulation still could be used to provide a good routing graph with constant stretch factor and shorter paths during communication. Existing DTN routing protocols either focus on the improvement of message delivery latency and delivery ratio in an impractical way, or without achieving desirable delivery attributes. In this work, we design local distributed solutions to extract spanning trees from Delaunay triangulation (DT) in the direction from source to destination. Our protocol resorts to flooding packets along the trees and with high probability packets are delivered with low delay. The goals of Geometric Localized Routing are: (1) fast delivery with intelligence, (2) better storage utilization. (3) guaranteed delivery using face routing. Through the implementation in the NS-2 simulator, we have shown that the proposed routing protocol achieves high delivery ratio with satisfied attributes.
APA, Harvard, Vancouver, ISO, and other styles
6

Rajagopal, Murali. "Protocol conversion : an algorithmic approach." Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/13352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Suh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
8

Pantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Whateley, Brendon J. "The influence of protocol choice on network performance." Master's thesis, University of Cape Town, 1995. http://hdl.handle.net/11427/13529.

Full text
Abstract:
Bibliography: leaves 100-102.
Computer communication networks are a vital link in providing many of the services that we use daily, and our reliance on these networks is on the increase. The growing use of networks is driving network design towards greater performance. The greater need for network connectivity and increased performance makes the study of network performance constraints important. Networks consist of both hardware and software components. Currently great advances are being made in network hardware, resulting in advances in the available raw network performance. In this thesis, I will show through measurement that it is difficult to harness all the raw performance and to make it available to carry network services. I will also identify some of the factors limiting the full utilization of a high speed network.
APA, Harvard, Vancouver, ISO, and other styles
10

Zang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Jabber (Computer network protocol)"

1

Programming Jabber. Sebastopol, CA: O'Reilly, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Stephen, and Lee Stephen. Jabber programming. New York, NY: M&T Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wright, William. Jabber Developer's Handbook. Upper Saddle River: Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saint-André, Peter. XMPP: The definitive guide : building real-time applications with Jabber technologies. [Sebastopol, CA]: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saint-André, Peter. XMPP: The definitive guide : building real-time applications with Jabber technologies. [Sebastopol, CA]: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saint-André, Peter. XMPP: The definitive guide. Sebastopol, Calif: O'Reilly Media, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Professional XMPP programming with JavaScript and jQuery. Indianapolis, IN: Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Expert Network Time Protocol. Berkeley: Apress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Naugle, Matthew G. Network protocol handbook. New York: McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1924-, Green Paul Eliot, ed. Network interconnection and protocol conversion. New York: IEEE Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Jabber (Computer network protocol)"

1

Klima, Martin, and Pavel Slavik. "Jabber Based Protocol for Collaborative Mobile Work." In Lecture Notes in Computer Science, 9–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11863649_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "network management protocol." In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barksdale, William J. "Network Protocol and Architecture." In Practical Computer Data Communications, 319–84. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "Simple Network Management Protocol." In Computer Science and Communications Dictionary, 1591. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shionozaki, A., and M. Tokoro. "Towards a Responsive Network Protocol." In Responsive Computer Systems, 99–122. Vienna: Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jestratjew, Arkadiusz, and Andrzej Kwiecień. "Using HTTP as Field Network Transfer Protocol." In Computer Networks, 306–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Dong-Seong, and Hoa Tran-Dang. "Communication Using Controller Area Network Protocol." In Computer Communications and Networks, 31–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Yongxue, Jiayu Xie, Yujue Wang, and Yin Zhou. "Research on Space Information Network Protocol." In Communications in Computer and Information Science, 163–71. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3442-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Du, Xiujuan, Meiju Li, and Keqin Li. "Reliable Transmission Protocol for Underwater Acoustic Networks." In Computer and Network Security Essentials, 173–87. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Jabber (Computer network protocol)"

1

Wang, Liang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton. "Seeing through Network-Protocol Obfuscation." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2810103.2813715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patiyoot, Danai. "“Patiyoot” Cryptography Authentication Protocol for Computer Network." In 2022 International Electrical Engineering Congress (iEECON). IEEE, 2022. http://dx.doi.org/10.1109/ieecon53204.2022.9741669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Xudong, and Bingxin Li. "NC-ODTN:Ocean DTN Network Coding Protocol." In 2016 International Conference on Computer Science and Electronic Technology. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/cset-16.2016.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, K. C., X. Y. Chen, Y. B. Bao, and X. H. Du. "Reconfiguration method for component-based network protocol." In International Conference on Computer Science and Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iccst140641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdrabou, Mohammed Aly. "Robust pre-authentication protocol for wireless network." In 2017 13th International Computer Engineering Conference (ICENCO). IEEE, 2017. http://dx.doi.org/10.1109/icenco.2017.8289809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xiaoshuang, Sunil Agham, Vikram Munishwar, Vaibhav Nipunage, Shailendra Singh, and Kartik Gopalan. "Transparent Network Protocol Testing and Evaluation." In 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hashmi, Shafiq, Hussein T. Mouftah, and Nicolas D. Georganas. "A New Transport Layer Sensor Network Protocol." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anbiah, Anix, and Krishna M. Sivalingam. "Funplace: A Protocol for Network Function Placement." In 2017 IEEE 42nd Conference on Local Computer Networks (LCN). IEEE, 2017. http://dx.doi.org/10.1109/lcn.2017.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nurhayati. "Inner cluster routing protocol wireless sensor network." In 2012 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2012. http://dx.doi.org/10.1109/iccce.2012.6271345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bakker, Arno, and Maarten van Steen. "PuppetCast: A Secure Peer Sampling Protocol." In 2008 European Conference on Computer Network Defense, EC2ND. IEEE, 2008. http://dx.doi.org/10.1109/ec2nd.2008.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Jabber (Computer network protocol)"

1

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Full text
Abstract:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography