Academic literature on the topic 'Jabber (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jabber (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Jabber (Computer network protocol)"
Al-Saadoon, Ghossoon M. W. "A Platform to Develop a Secure Instant Messaging Using Jabber Protocol." Journal of Computer Science 5, no. 9 (September 1, 2009): 661–65. http://dx.doi.org/10.3844/jcssp.2009.661.665.
Full textKumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.
Full textRadia, Perlman. "Network protocol folklore." ACM SIGCOMM Computer Communication Review 49, no. 5 (November 8, 2019): 48–53. http://dx.doi.org/10.1145/3371934.3371953.
Full textNeville-Neil, George V. "The network protocol battle." Communications of the ACM 55, no. 4 (April 2012): 27–28. http://dx.doi.org/10.1145/2133806.2133816.
Full textNeville-Neil, George V. "The Network Protocol Battle." Queue 10, no. 1 (January 2012): 10–12. http://dx.doi.org/10.1145/2090147.2090149.
Full textStenn, Harlan. "Securing network time protocol." Communications of the ACM 58, no. 2 (January 28, 2015): 48–51. http://dx.doi.org/10.1145/2697397.
Full textStenn, Harlan. "Securing the Network Time Protocol." Queue 13, no. 1 (December 31, 2014): 20–25. http://dx.doi.org/10.1145/2716276.2717320.
Full textMason, Ian A., and Carolyn L. Talcott. "Simple Network Protocol Simulation within Maude." Electronic Notes in Theoretical Computer Science 36 (2000): 274–91. http://dx.doi.org/10.1016/s1571-0661(05)80139-2.
Full textTu-Chih Tsai. "NETWORK PROTOCOL HANDBOOK [Book Reviews]." IEEE Communications Magazine 34, no. 1 (January 1996): 10. http://dx.doi.org/10.1109/mcom.1996.482238.
Full textEdmond, W., K. Leib, and C. Topolcic. "The DARPA wideband network protocol." ACM SIGCOMM Computer Communication Review 20, no. 4 (August 1990): 79–89. http://dx.doi.org/10.1145/99517.99539.
Full textDissertations / Theses on the topic "Jabber (Computer network protocol)"
Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textDukach, Semyon. "SNPP--a Simple Network Payment Protocol." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/12629.
Full textJohnson, Edwin N. (Edwin Neil) 1975. "A protocol for network level caching." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9860.
Full textIncludes bibliographical references (p. 44-45).
by Edwin N. Johnson.
S.B.and M.Eng.
Du, Jingzhe. "Geometric routing protocol in Disruption tolerant network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27680.
Full textRajagopal, Murali. "Protocol conversion : an algorithmic approach." Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/13352.
Full textSuh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.
Full textTitle from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
Pantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.
Full textWhateley, Brendon J. "The influence of protocol choice on network performance." Master's thesis, University of Cape Town, 1995. http://hdl.handle.net/11427/13529.
Full textComputer communication networks are a vital link in providing many of the services that we use daily, and our reliance on these networks is on the increase. The growing use of networks is driving network design towards greater performance. The greater need for network connectivity and increased performance makes the study of network performance constraints important. Networks consist of both hardware and software components. Currently great advances are being made in network hardware, resulting in advances in the available raw network performance. In this thesis, I will show through measurement that it is difficult to harness all the raw performance and to make it available to carry network services. I will also identify some of the factors limiting the full utilization of a high speed network.
Zang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Full textBooks on the topic "Jabber (Computer network protocol)"
Wright, William. Jabber Developer's Handbook. Upper Saddle River: Pearson Education, 2005.
Find full textSaint-André, Peter. XMPP: The definitive guide : building real-time applications with Jabber technologies. [Sebastopol, CA]: O'Reilly, 2009.
Find full textSaint-André, Peter. XMPP: The definitive guide : building real-time applications with Jabber technologies. [Sebastopol, CA]: O'Reilly, 2009.
Find full textSaint-André, Peter. XMPP: The definitive guide. Sebastopol, Calif: O'Reilly Media, Inc., 2009.
Find full textProfessional XMPP programming with JavaScript and jQuery. Indianapolis, IN: Wiley Pub., 2010.
Find full text1924-, Green Paul Eliot, ed. Network interconnection and protocol conversion. New York: IEEE Press, 1988.
Find full textBook chapters on the topic "Jabber (Computer network protocol)"
Klima, Martin, and Pavel Slavik. "Jabber Based Protocol for Collaborative Mobile Work." In Lecture Notes in Computer Science, 9–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11863649_2.
Full textWeik, Martin H. "network management protocol." In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.
Full textBarksdale, William J. "Network Protocol and Architecture." In Practical Computer Data Communications, 319–84. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_10.
Full textWeik, Martin H. "Simple Network Management Protocol." In Computer Science and Communications Dictionary, 1591. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17461.
Full textShionozaki, A., and M. Tokoro. "Towards a Responsive Network Protocol." In Responsive Computer Systems, 99–122. Vienna: Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_6.
Full textJestratjew, Arkadiusz, and Andrzej Kwiecień. "Using HTTP as Field Network Transfer Protocol." In Computer Networks, 306–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_33.
Full textKim, Dong-Seong, and Hoa Tran-Dang. "Communication Using Controller Area Network Protocol." In Computer Communications and Networks, 31–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_3.
Full textYu, Yongxue, Jiayu Xie, Yujue Wang, and Yin Zhou. "Research on Space Information Network Protocol." In Communications in Computer and Information Science, 163–71. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3442-3_13.
Full textBochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.
Full textDu, Xiujuan, Meiju Li, and Keqin Li. "Reliable Transmission Protocol for Underwater Acoustic Networks." In Computer and Network Security Essentials, 173–87. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_10.
Full textConference papers on the topic "Jabber (Computer network protocol)"
Wang, Liang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, and Thomas Shrimpton. "Seeing through Network-Protocol Obfuscation." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2810103.2813715.
Full textPatiyoot, Danai. "“Patiyoot” Cryptography Authentication Protocol for Computer Network." In 2022 International Electrical Engineering Congress (iEECON). IEEE, 2022. http://dx.doi.org/10.1109/ieecon53204.2022.9741669.
Full textZhang, Xudong, and Bingxin Li. "NC-ODTN:Ocean DTN Network Coding Protocol." In 2016 International Conference on Computer Science and Electronic Technology. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/cset-16.2016.23.
Full textJin, K. C., X. Y. Chen, Y. B. Bao, and X. H. Du. "Reconfiguration method for component-based network protocol." In International Conference on Computer Science and Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iccst140641.
Full textAbdrabou, Mohammed Aly. "Robust pre-authentication protocol for wireless network." In 2017 13th International Computer Engineering Conference (ICENCO). IEEE, 2017. http://dx.doi.org/10.1109/icenco.2017.8289809.
Full textWang, Xiaoshuang, Sunil Agham, Vikram Munishwar, Vaibhav Nipunage, Shailendra Singh, and Kartik Gopalan. "Transparent Network Protocol Testing and Evaluation." In 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614205.
Full textHashmi, Shafiq, Hussein T. Mouftah, and Nicolas D. Georganas. "A New Transport Layer Sensor Network Protocol." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277711.
Full textAnbiah, Anix, and Krishna M. Sivalingam. "Funplace: A Protocol for Network Function Placement." In 2017 IEEE 42nd Conference on Local Computer Networks (LCN). IEEE, 2017. http://dx.doi.org/10.1109/lcn.2017.70.
Full textNurhayati. "Inner cluster routing protocol wireless sensor network." In 2012 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2012. http://dx.doi.org/10.1109/iccce.2012.6271345.
Full textBakker, Arno, and Maarten van Steen. "PuppetCast: A Secure Peer Sampling Protocol." In 2008 European Conference on Computer Network Defense, EC2ND. IEEE, 2008. http://dx.doi.org/10.1109/ec2nd.2008.7.
Full textReports on the topic "Jabber (Computer network protocol)"
LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.
Full text