Academic literature on the topic 'Model-based protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Model-based protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Model-based protocol"

1

Mordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Full text
Abstract:
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protocols over cellular channels: Verus and Copa. Our results show a successful approximation of throughput and delay characteristics of the protocols' model versions across variable network conditions. The learned model of a protocol provides key insights into an algorithm's convergence properties.
APA, Harvard, Vancouver, ISO, and other styles
3

Pan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.

Full text
Abstract:
The widely used network protocols play a crucial role in various systems. However, the protocol vulnerabilities caused by the design of the network protocol or its implementation by programmers lead to multiple security incidents and substantial losses. Hence, it is important to study the protocol fuzzing in order to ensure its correctness. However, the challenges of protocol fuzzing are the mutation of protocol messages and the deep interactivity of the protocol implementation. This paper proposes a model-based grey-box fuzzing approach for protocol implementations, including the server-side and client-side. The proposed method is divided into two phases: automata learning based on the minimally adequate teacher (MAT) framework and grey-box fuzzing guided by the learned model and code coverage. The StateFuzzer tool used for evaluation is presented to demonstrate the validity and feasibility of the proposed approach. The server-side fuzzing can achieve similar or higher code coverage and vulnerability discovery capability than those of AFLNET and StateAFL. Considering the client, the results show that it achieves 1.5X branch coverage (on average) compared with the default AFL, and 1.3X branch coverage compared with AFLNET and StateAFL, using the typical implementations such as OpenSSL, LibreSSL, and Live555. The StateFuzzer identifies a new memory corruption bug in Live555 (2021-08-25) and 14 distinct discrepancies based on differential testing.
APA, Harvard, Vancouver, ISO, and other styles
4

Deng, Guo Li, Tao He, Yong Wei, Hua Zhong Li, Shou Xiang Xu, and De Fen Zhang. "Model Based Protocol Conformance Test Study." Applied Mechanics and Materials 713-715 (January 2015): 466–70. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.466.

Full text
Abstract:
This paper puts forwards the problems during the process of conformance test based on the enhanced finite state machine and looks for the description method of the state machine for protocol. Through the analysis of model based on test principle, the protocol conformance testing will be applied based on the enhanced finite state machine test. Through comparing with the traditional test method, study how to design model for protocol, and through executing model produced test, verify the advantage and applicability of model based testing method by testing cases.
APA, Harvard, Vancouver, ISO, and other styles
5

Figueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.

Full text
Abstract:
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol's resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xinyan. "A Data-Driven WSN Security Threat Analysis Model Based on Cognitive Computing." Journal of Sensors 2022 (January 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/5013905.

Full text
Abstract:
In this paper, we use cognitive computing to build a WSN security threat analysis model using a data-driven approach and conduct an in-depth and systematic study. In this paper, we develop a simulation platform (OMNeT++-based WSN Security Protocol Simulation Platform (WSPSim)) based on OMNeT++ to make up for the shortcomings of current WSN simulation platforms, improve the simulation capability of WSN security protocols, and provide a new technical means for designing and verifying security protocols. The WSPSim simulation platform is used to simulate and analyze typical WSN protocols and verify the effectiveness of the platform. In this paper, we mainly analyze the node malicious behavior by listening and judging the communication behavior of the nodes, and the current trust assessment is given by the security management nodes. When the security management node is rotated, its stored trust value is used as historical trust assessment and current trust assessment together to participate in the integrated trust value calculation, which improves the reliability of node trust assessment; to increase the security and reliability of the management node, a trust value factor and residual energy factor are introduced in the security management node election in the paper. According to the time of management node election, the weights of both are changed to optimize the election. Using the WSPSim simulation platform, a typical WSN protocol is simulated and analyzed to verify the effectiveness of the platform. In this paper, the simulation results of the LEACH protocol with an MD5 hash algorithm and trust evaluation mechanism and typical LEACH protocol as simulation samples are compared; i.e., the correctness of the simulation platform is verified, and it is shown that improving the security of the protocol and enhancing the security and energy efficiency of wireless sensor networks provide an effective solution.
APA, Harvard, Vancouver, ISO, and other styles
7

Fu, Yulong, and Ousmane Koné. "Model based security verification of protocol implementation." Journal of Information Security and Applications 22 (June 2015): 17–27. http://dx.doi.org/10.1016/j.jisa.2014.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.

Full text
Abstract:
Most of the existing cryptographic schemes, e.g., key agreement protocol, call for good randomness. Otherwise, the security of these cryptographic schemes cannot be fully guaranteed. Nonce-based cryptosystem is recently introduced to improve the security of public key encryption and digital signature schemes by ensuring security when randomness fails. In this paper, we first investigate the security of key agreement protocols when randomness fails. Then we define the security model for nonce-based key agreement protocols and propose a nonce-based key agreement protocol that protects against bad randomness. The new protocol is proven to be secure in our proposed security model.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.

Full text
Abstract:
Accurate and reliable routing protocols with Quality of Service (QoS) support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Model-based protocol"

1

Blom, Johan. "Model-Based Protocol Testing in an Erlang Environment." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-279489.

Full text
Abstract:
Testing is the dominant technique for quality assurance of software systems. It typically consumes considerable resources in development projects, and is often performed in an ad hoc manner. This thesis is concerned with model-based testing, which is an approach to make testing more systematic and more automated. The general idea in model-based testing is to start from a formal model, which captures the intended behavior of the software system to be tested. On the basis of this model, test cases can be generated in a systematic way. Since the model is formal, the generation of test suites can be automated and with adequate tool support one can automatically quantify to which degree they exercise the tested software. Despite the significant improvements on model-based testing in the last 20 years, acceptance by industry has so far been limited. A number of commercially available tools exist, but still most testing in industry relies on manually constructed test cases. This thesis address this problem by presenting a methodology and associated tool support, which is intended to be used for model-based testing of communication protocol implementations in industry. A major goal was to make the developed tool suitable for industrial usage, implying that we had to consider several problems that typically are not addressed by the literature on model-based testing. The thesis presents several technical contributions to the area of model-based testing, including - a new specification language based on the functional programming language Erlang, - a novel technique for specifying coverage criteria for test suite generation, and - a technique for automatically generating test suites. Based on these developments, we have implemented a complete tool chain that generates and executes complete test suites, given a model in our specification language. The thesis also presents a substantial industrial case study, where our technical contributions and the implemented tool chain are evaluated. Findings from the case study include that test suites generated using (model) coverage criteria have at least as good fault-detection capability as equally large random test suites, and that model-based testing could discover faults in previously well-tested software where previous testing had employed a relaxed validation of requirements.
APA, Harvard, Vancouver, ISO, and other styles
2

De, Wet Nico. "Model driven communication protocol engineering and simulation based performance analysis using UML 2.0." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/6392.

Full text
Abstract:
Includes bibliographical references.
The automated functional and performance analysis of communication systems specified with some Formal Description Technique has long been the goal of telecommunication engineers. In the past SDL and Petri nets have been the most popular FDT's for the purpose. With the growth in popularity of UML the most obvious question to ask is whether one can translate one or more UML diagrams describing a system to a performance model. Until the advent of UML 2.0, that has been an impossible task since the semantics were not clear. Even though the UML semantics are still not clear for the purpose, with UML 2.0 now released and using ITU recommendation Z.109, we describe in this dissertation a methodology and tool called proSPEX (protocol Software Performance Engineering using XMI), for the design and performance analysis of communication protocols specified with UML.
APA, Harvard, Vancouver, ISO, and other styles
3

Laxmi, Vijaya. "Trust based QOS-aware packet forwarding model for ad hoc network independent of routing protocol." Thesis, Wichita State University, 2010. http://hdl.handle.net/10057/3732.

Full text
Abstract:
The need for users to be able to setup wireless networks as, and when they require, has led to a boom in MANET. The constantly changing status of wireless links, mobility and resource scarcity, pose serious problems when a node in an ad hoc network is required to not only be able to communicate with other neighbors (multiple hops away), but also have demand QOS of intermediate nodes to its delay sensitive packets. As this technology has matured, resource starving of best effort traffic in the presence of priority traffic is not acceptable. Moreover, a true seamless, wireless network would be one in which intermediate nodes do not always need to support the same type of routing protocol in their TCP/IP stack to allow communication between the source and destination node. This research proposes to solve the QOS issues in a wireless ad hoc network by enriching the nodes in a network with trust databases, and a pool table to keep records of its previous interactions with all malicious and trustworthy nodes. A node can assign trust points to well behaving nodes and deduct points away from the database for a bad node. Thus, a node can always have a look at an intermediate node’s trust points and its previous performance to decide if this node can be trusted to properly forward its multimedia traffic by satisfying the QOS request. Also, QOS favors are returned promptly to provide incentives for nodes to become trustworthy. This author has proposed to solve the QOS issues in a MANET in a unique way, and has also tried to capture the dynamism of wireless channels by using a Best Effort (BE) timer to gain the best utilization of a costly channel and to provide fairness. A Universal Packet Format is used in this research to ensure communication between two nodes which may be separated by nodes that do not support the same routing protocol in their TCP/IP stack. Hence, an attempt toward a comprehensive solution for achieving the goals of a seamless QOS aware ad hoc network is made in this research work.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
4

Santiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.

Full text
Abstract:
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. The idea is to verify communication protocols that use encryption to guarantee secrecy and that use authentication of data to ensure security. Formal methods are used in protocol analysis to provide formal proofs of security, and to uncover bugs and security flaws that in some cases had remained unknown long after the original protocol publication, such as the case of the well known Needham-Schroeder Public Key (NSPK) protocol. In this thesis we tackle problems regarding the three main pillars of protocol verification: modelling capabilities, verifiable properties, and efficiency. This thesis is devoted to investigate advanced features in the analysis of cryptographic protocols tailored to the Maude-NPA tool. This tool is a model-checker for cryptographic protocol analysis that allows for the incorporation of different equational theories and operates in the unbounded session model without the use of data or control abstraction. An important contribution of this thesis is relative to theoretical aspects of protocol verification in Maude-NPA. First, we define a forwards operational semantics, using rewriting logic as the theoretical framework and the Maude programming language as tool support. This is the first time that a forwards rewriting-based semantics is given for Maude-NPA. Second, we also study the problem that arises in cryptographic protocol analysis when it is necessary to guarantee that certain terms generated during a state exploration are in normal form with respect to the protocol equational theory. We also study techniques to extend Maude-NPA capabilities to support the verification of a wider class of protocols and security properties. First, we present a framework to specify and verify sequential protocol compositions in which one or more child protocols make use of information obtained from running a parent protocol. Second, we present a theoretical framework to specify and verify protocol indistinguishability in Maude-NPA. This kind of properties aim to verify that an attacker cannot distinguish between two versions of a protocol: for example, one using one secret and one using another, as it happens in electronic voting protocols. Finally, this thesis contributes to improve the efficiency of protocol verification in Maude-NPA. We define several techniques which drastically reduce the state space, and can often yield a finite state space, so that whether the desired security property holds or not can in fact be decided automatically, in spite of the general undecidability of such problems.
Santiago Pinazo, S. (2015). Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/48527
TESIS
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.

Full text
Abstract:
Les systèmes distribués sont composés de nombreux sous-systèmes distants les uns des autres. Afin de réaliser une même tâche, les sous-systèmes communiquent à la fois avec l’environnement par des messages externes et avec d’autres sous-systèmes par des messages internes, via un réseau de communication. En pratique, les systèmes distribués mettent en jeu plusieurs types d’erreurs, propres aux sous-systèmes les constituant, ou en lien avec les communications internes. Afin de s’assurer de leur bon fonctionnement, savoir tester de tels systèmes est essentiel. Cependant, il est très compliqué de les tester car sans horloge globale, les sous-systèmes ne peuvent pas facilement synchroniser leurs envois de messages, ce qui explique l’existence des situations non déterministes. Le test à base de modèles (MBT) est une approche qui consiste à vérifier si le comportement d’un système sous test (SUT) est conforme à son modèle, qui spécifie les comportements souhaités. MBT comprend deux étapes principales: la génération de cas de test et le calcul de verdict. Dans cette thèse, nous nous intéressons à la génération de cas de test dans les systèmes distribués. Nous utilisons les systèmes de transition symbolique temporisé à entrées et sorties (TIOSTS) et les analysons à l’aide des techniques d’exécution symbolique pour obtenir les comportements symboliques du système distribué. Dans notre approche, l’architecture de test permet d’observer au niveau de chaque soussystème à la fois les messages externes émis vers l’environnement et les messages internes reçus et envoyés. Notre framework de test comprend plusieurs étapes: sélectionner un objectif de test global, défini comme un comportement particulier exhibé par exécution symbolique, projeter l’objectif de test global sur chaque sous-système pour obtenir des objectifs de test locaux, dériver des cas de test unitaires pour chacun des sous-systèmes. L’exécution du test consiste à exécuter des cas de test locaux sur les sous-systèmes paramétrés par les objectifs de tests en calculant à la volée les données de test à soumettre au sous-système en fonction de données observées. Enfin, nous mettons en œuvre notre approche sur un cas d’étude décrivant un protocole utilisé dans le contexte de l’IoT
Distributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
APA, Harvard, Vancouver, ISO, and other styles
6

Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.

Full text
Abstract:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.
APA, Harvard, Vancouver, ISO, and other styles
7

Rowden, Elizabeth Szydlo. "Response to Intervention: A Case Study Documenting one Elementary School's Successful Implementation." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97953.

Full text
Abstract:
The use of Response to Intervention, more commonly referred to as RTI has become more prevalent as school systems look to find ways of bridging the opportunity gap and provide support those students who are not successful in their attempts to access the general education curriculum. More research is needed in order to have a better understanding of not only how schools implement RTI, but also how they utilize data, monitor student progress and help to ensure fidelity of implementation. The purpose of this study was to examine and explain how one elementary school with a high quality RTI program implemented Response to Intervention while keeping all three essential components in consideration. The findings demonstrate that the subject elementary school combined several elements of Response to Intervention and in turn, created their own version of a hybrid RTI model that utilized components from both the standard protocol model and the problem-solving model. In order to monitor student progress, universal screeners were utilized several times throughout the year for both reading and math. Reading was also monitored through running records, PALS Quick Checks, Orton Gillingham assessments, and exit tickets, whereas Math utilized formative assessments, anecdotal notes, and exit tickets to track student progress. Each math and reading CLT met weekly to engage in dialogue around student data. An important finding is that the subject elementary school made RTI implementation decisions around what was best for their students, which allowed for a more flexible and adaptable approach. The system utilized targeted individual student needs and helped to ensure that ALL students had access to the necessary supports that would help to ensure student success.
Doctor of Education
As schools continue to face increasing demands, including how to meet the needs of students with diverse academic backgrounds, they have been charged with exploring new ways and methods of ensuring that students are successful in their attempts to access the general education curriculum. Response to Intervention, more commonly referred to as RTI, has become more widely used in school systems as they continue to work to ensure student success for all. RTI is seen as a tool to help accurately identify students who have a learning disability (Ciolfi and Ryan, 2011), however more research is needed in order to have a better understanding of how schools implement RTI, as well as how they utilize the data collected and monitor student progress. This qualitative case study analyzes how one subject elementary school implemented RTI, how they utilized data, as well as how they monitored the progress of their students.
APA, Harvard, Vancouver, ISO, and other styles
8

Riese, Marc. "Model-based diagnosis of communication protocols /." [S.l.] : [s.n.], 1993. http://library.epfl.ch/theses/?nr=1173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pinheiro, Pedro Victor Pontes. "Teste baseado em modelos para serviços RESTful usando máquinas de estados de protocolos UML." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-14072014-165410/.

Full text
Abstract:
A Arquitetura Orientada a Serviços (SOA) é um estilo arquitetural formado por um conjunto de restrições que visa promover a escalabilidade e a flexibilidade de um sistema, provendo suas funcionalidades como serviços. Nos últimos anos, um estilo alternativo foi proposto e amplamente adotado, que projeta as funcionalidades de um sistema como recursos. Este estilo arquitetural orientado a recursos é chamado de REST. O teste de serviços web em geral apresenta vários desafios devido a sua natureza distribuída, canal de comunicação pouco confiável, baixo acoplamento e a falta de uma interface de usuário. O teste de serviços RESTful (serviços que utilizam o REST) compartilham estes mesmos desafios e ainda necessitam que suas restrições sejam obedecidas. Estes desafios demandam testes mais sistemáticos e formais. Neste contexto, o teste baseado em modelos (TBM) se apresenta como um processo viável para abordar essas necessidades. O modelo que representa o sistema deve ser simples e ao mesmo tempo preciso para que sejam gerados casos de teste com qualidade. Com base nesse contexto, este projeto de mestrado propõe uma abordagem baseada em modelos para testar serviços RESTful. O modelo comportamental adotado foi a máquina de estados de protocolos UML, capaz de formalizar a interface do serviço enquanto esconde o seu funcionamento interno. Uma ferramenta foi desenvolvida para gerar automaticamente os casos de teste usando critérios de cobertura de estados e transições para percorrer o modelo
Service Oriented Architecture (SOA) is an architectural style consisting of a set of restrictions aimed at promoting the scalability and flexibility of a system, providing its functionalities as services. In recent years, an alternative style was proposed and widely adopted, which designs the system\'s functionalities as resources. This resource oriented architectural style is called REST. In general, the test of web services has several challenges due to its distributed nature, unreliable communication channel, low coupling and the lack of a user interface. Testing RESTful web services (services that use REST) share these same challenges and also need to obey the REST constraints. These challenges require a more systematic and formal testing approach. In this context, model based testing presents itself as a viable process for addressing those needs. The model that represents the system should be simple and precise enough to generate quality test cases. Based on this context, this work proposes a model based approach to test RESTful web services. The behavioral model used was the UML protocol state machine, which is capable to provide a formalization of the service interface, while hiding its internal behaviour. A tool was developed to automatically generate test cases using the state and transition coverage criteria to traverse the model
APA, Harvard, Vancouver, ISO, and other styles
10

Ponge, Julien Nicolas Computer Science &amp Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.

Full text
Abstract:
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted that a service description should include not only the interface, but also the business protocol supported by the service. The present work focuses on the formalization of the important category of protocols that include time-related constraints (called timed protocols), and the impact of time on compatibility and replaceability analysis. We formalized the following timing constraints: CInvoke constraints define time windows of availability while MInvoke constraints define expirations deadlines. We extended techniques for compatibility and replaceability analysis between timed protocols by using a semantic-preserving mapping between timed protocols and timed automata, leading to the novel class of protocol timed automata (PTA). Specifically, PTA exhibit silent transitions that cannot be removed in general, yet they are closed under complementation, making every type of compatibility or replaceability analysis decidable. Finally, we implemented our approach in the context of a larger project called ServiceMosaic, a model-driven framework for web service life-cycle management.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Model-based protocol"

1

Einstein, Andrew J. Radiation Considerations. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199392094.003.0034.

Full text
Abstract:
Radiation considerations are an integral part of the practice of nuclear cardiac imaging. Concern regarding radiation has increased in recent years, reflected in statements by many professional societies, and likely attributable both to rapid growth in use of nuclear cardiology as well as high doses received by some nuclear cardiology patients. The fundamental principles of medical radiological protection are justification (ensuring that the right test is performed for the right patient at the right time), optimization (ensuring that the test is performed in the right manner), and dose limitation, which while applicable to healthcare workers is not operative regarding patients. Three "As" facilitate and serve as an organizing principle for justification: awareness, appropriateness, and audit. Awareness incorporates knowledge of the benefits and risks of testing involving radiation and effective communication of these to the patient. Appropriateness in nuclear cardiology can be assessed using the American College of Cardiology's appropriateness criteria. Methods that have been demonstrated to improve appropriateness include using a collaborative learning model, a point-of-order decision support tool, and a multifaceted intervention including threatened loss of insurance coverage. A variety of strategies should be considered for optimization to ensure patient-centered imaging. These including strategic selection of both the protocol, e.g. selecting a stress-first protocol and performing stress-only imaging in patients without a high pre-test probability of abnormal findings on stress imaging, or using PET, and also the administered activity, e.g. by using weight-based dosing and/or software- or hardware-based advances in camera technology. Special considerations are required for pregnant, nursing, and pediatric patients.
APA, Harvard, Vancouver, ISO, and other styles
2

Morrell, Kevin, and Mark Learmonth. Evidence-Based Management. Edited by Adrian Wilkinson, Steven J. Armstrong, and Michael Lounsbury. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198708612.013.21.

Full text
Abstract:
This chapter outlines the case for “evidence-based management” then adopts a critical perspective. To do so, it focuses on a recurring feature of evidence-based writings: the management-as-medicine motif (MAMM). Advocates draw on MAMM in two ways. First, they promote the same model of knowledge production as in medicine, e.g. championing ‘systematic reviews’. Second, they rely on comparisons between management and medicine as professional practices. Identified here are consequent problems and a ‘systematic review’ is considered in the Cochrane Database of Systematic Reviews. This concerns a management phenomenon: nursing turnover and there are now five versions of the review. Bizarrely, these never actually review any evidence and the different versions are incompatible. This shows how the protocols of ‘systematic’ reviews do not necessarily lead to superior evidence, instead they can disguise inaccuracies and inconsistencies. It also exemplifies problems with MAMM.
APA, Harvard, Vancouver, ISO, and other styles
3

Ehrenreich-May, Jill, and Sarah M. Kennedy, eds. Applications of the Unified Protocols for Transdiagnostic Treatment of Emotional Disorders in Children and Adolescents. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780197527931.001.0001.

Full text
Abstract:
The Unified Protocols for Transdiagnostic Treatment of Emotional Disorders in Children and Adolescents (UP-C and UP-A) are evidence-based, transdiagnostic intervention programs that target core emotion regulation processes that may be shared across varying presentations of internalizing distress or disorders in youth. Given their popular transdiagnostic and modular structures, the UP-C and UP-A have quickly been disseminated and implemented with a variety of populations and in differing treatment settings. This volume aims to aid UP-C and UP-A therapists in understanding varied applications and modifications of these approaches and assist them in applying such in their own practice. To that end, chapters are offered on not only standard UP-C and UP-A research and practice but also applications for youth with obsessive-compulsive symptoms, tic-related concerns, substance use, serious mental illness, and eating disorders. Structural modifications to the UP-C and UP-A using a stepped care model and when delivering care in pediatric or community practice settings and in differing cultures or languages are also discussed. To aid in their use, each chapter includes a brief, user-friendly description of the modifications or adaptations of the UP-C and/or UP-A that are described therein.
APA, Harvard, Vancouver, ISO, and other styles
4

Sirová, Dagmara, Jiří Bárta, Jakub Borovec, and Jaroslav Vrba. The Utricularia-associated microbiome: composition, function, and ecology. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198779841.003.0025.

Full text
Abstract:
This chapter reviews current advances regarding plant–microbe interactions in aquatic Utricularia. New findings on the composition and function of trap commensals, based mainly on the advances in molecular methods, are presented in the context of the ecological role of Utricularia-associated microorganisms. Bacteria, fungi, algae, and protozoa colonize the Utricularia trap lumen and form diverse, interactive communities. The involvement of these microbial food webs in the regeneration of nutrients from complex organic matter is explained and their potential contribution to the nutrient acquisition in aquatic Utricularia is discussed. The Utricularia–commensal system is suggested to be a suitable model system for studying plant-microbe and microbe-microbe interactions and related ecological questions.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Model-based protocol"

1

You, Xine, and Lingfeng Zhang. "Improved Authentication Model Based on Kerberos Protocol." In Advances in Intelligent and Soft Computing, 593–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25989-0_95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yan, Guomin, Jiguo Yu, Congcong Chen, and Lili Jia. "Virtual Backbone Construction Algorithms Based on Protocol Interference Model." In Communications in Computer and Information Science, 31–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54522-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaliappan, Prabhu Shankar, Hartmut König, and Sebastian Schmerl. "Model-Driven Protocol Design Based on Component Oriented Modeling." In Formal Methods and Software Engineering, 613–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Simonsen, Kent Inge Fagerland, and Lars Michael Kristensen. "Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models." In Model-Based Methodologies for Pervasive and Embedded Software, 106–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38209-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Luukkala, Vesa, and Ian Oliver. "Model Based Testing of an Embedded Session and Transport Protocol." In Testing of Software and Communicating Systems, 212–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73066-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, Wandan, Guiran Chang, Xingwei Wang, Shoubin Wang, Guangjie Han, and Xubo Zhou. "A QoS Model for Grid Computing Based on DiffServ Protocol." In Grid and Cooperative Computing, 549–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24680-0_90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saito, Takumi, Shigenari Nakamura, Tomoya Enokido, and Makoto Takizawa. "Topic-Based Processing Protocol in a Mobile Fog Computing Model." In Advances in Intelligent Systems and Computing, 43–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57811-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Changchun, Kangnian Wang, and Xingtao Zhu. "Formal Analysis of Authentication Protocol Based on Directed Graph Model." In Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, 829–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31698-2_117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tanabe, Kotaro, Yoshinori Tanabe, and Masami Hagiya. "Model-Based Testing for MQTT Applications." In Knowledge-Based Software Engineering: 2020, 47–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53949-8_5.

Full text
Abstract:
Abstract Model-based testing is a widely-used vital technique for testing software running in a complex environment. In this paper, we propose extensions to existing model-based tools to apply this technique to software that employs the MQ Telemetry Transport (MQTT) protocol for transmitting messages, commonly used in the Internet of Things (IoT) environment. First, in the finite state machine used for generating test cases in a model-based testing framework, we introduce a type of transition that is triggered when receiving MQTT messages. Second, we extend the finite-state machine so that it produces test cases that reflect the characteristics of IoT software – a large number of relatively simple devices communicate with servers. Third, the concept of time is introduced into the finite state machine. Naturally, this is necessary for verifying the properties of software that runs for a long time. Moreover, to facilitate such verification, both real-time and virtual time are introduced. We implemented these extensions into a model-based testing tool, Modbat, and conducted a small experiment to confirm the feasibility, gaining positive results.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Xinyan, Huiying Zhang, and Chunxia Yin. "DHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model." In Communications in Computer and Information Science, 539–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Model-based protocol"

1

Shaleva, A., and V. Korkhov. "EFFICIENT GOSSIP-BASED PROTOCOL IN THE NEO BLOCKCHAIN NETWORK." In 9th International Conference "Distributed Computing and Grid Technologies in Science and Education". Crossref, 2021. http://dx.doi.org/10.54546/mlit.2021.71.22.002.

Full text
Abstract:
Peer-to-peer (P2P) networks, together with other distributed systems, must meet strict efficiencyrequirements in terms of the information dissemination process. Rapid message transmission affectsthe entire functionality of the network, including data processing, attack resistance, topology changes,etc. In this article, we look at the most common network protocols based on gossip, explore andcompare several approaches to improve the information dissemination model. We describe the Neoblockchain network protocol, which extends gossip algorithms to distribute messages over a P2Pnetwork. Based on the simulation results, we build a model of the Neo blockchain network protocoland evaluate the effectiveness of the Neo network protocol in terms of reactive message processing inseveral scenarios, propose protocol improvements and evaluate the resulting performance gain.
APA, Harvard, Vancouver, ISO, and other styles
2

He, Yunhua, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, and Limin Sun. "A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Kaichun, Xingyuan Chen, Xuehui Du, Yibao Bao, and Hongxu Wang. "Reconfigurable Network Protocol Model Based on Process Algebra." In 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abd El-Haleem, Ahmed M., Ihab A. Ali, Ibrahim I. Ibrahim, and Abdel Rahman H. El-Sawy. "Trust model for TRIDNT trust based routing Protocol." In 2010 2nd International Conference on Computer Technology and Development (ICCTD). IEEE, 2010. http://dx.doi.org/10.1109/icctd.2010.5645954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ran, Juan, and Xiaoyu Li. "Mobile Database Model Based on Secret Sharing Protocol." In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/meic-15.2015.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Otrok, Hadi, Azzam Mourad, Jean-Marc Robert, Nadia Moati, and Hiba Sanadiki. "A cluster-based model for QoS-OLSR protocol." In 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011). IEEE, 2011. http://dx.doi.org/10.1109/iwcmc.2011.5982694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grieskamp, Wolfgang, Nico Kicillof, Dave MacDonald, Alok Nandan, Keith Stobie, and Fred Wurden. "Model-Based Quality Assurance of Windows Protocol Documentation." In 2008 International Conference on Software Testing, Verification, and Validation. IEEE, 2008. http://dx.doi.org/10.1109/icst.2008.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chaker, Hamza, Loïc Cudennec, Safae Dahmani, Guy Gogniat, and Martha Johanna Sepúlveda. "Cycle-based Model to Evaluate Consistency Protocols within a Multi-protocol Compilation Tool-chain." In COSMIC '15: International Workshop on Code Optimisation for Multi and Many Cores. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2723772.2723779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Megyesi, D., J. Lesko, and M. Schreiner. "Evaluation of multihop UAV communication model based on protocol-independent and protocol-dependent methods." In 2019 Modern Safety Technologies in Transportation (MOSATT). IEEE, 2019. http://dx.doi.org/10.1109/mosatt48908.2019.8944102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grieskamp, Wolfgang, Nicolas Kicillof, Dave MacDonald, Alok Nandan, Keith Stobie, Fred Wurden, and Danpo Zhang. "Model-Based Quality Assurance of the SMB2 Protocol Documentation." In 2008 Eighth International Conference on Quality Software (QSIC). IEEE, 2008. http://dx.doi.org/10.1109/qsic.2008.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Model-based protocol"

1

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, April 1999. http://dx.doi.org/10.17487/rfc2575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, April 1999. http://dx.doi.org/10.17487/rfc2574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

James, Natasha A. Using agent-based models to examine implications of introducing conservation auctions in Costa Rica: overview, design concepts, and details (ODD) protocol for a conservation auction agent-based model (CA-ABM). Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2019. http://dx.doi.org/10.2737/srs-gtr-245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

James, Natasha A. Using agent-based models to examine implications of introducing conservation auctions in Costa Rica: overview, design concepts, and details (ODD) protocol for a conservation auction agent-based model (CA-ABM). Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2019. http://dx.doi.org/10.2737/srs-gtr-245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography