Academic literature on the topic 'Protocole de transfert hypertexte'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocole de transfert hypertexte.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protocole de transfert hypertexte"
Watters, Paul Andrew, and Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development." South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.
Full textSUSANA, RATNA, ANGGA NUGRAHA, and DECY NATALIANA. "Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP)." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 3, no. 1 (January 1, 2015): 1. http://dx.doi.org/10.26760/elkomika.v3i1.1.
Full textPresseau1, Annie. "Analyse de l'efficacité d'interventions sur le transfert des apprentissages en mathématiques." Articles 26, no. 3 (October 15, 2002): 515–44. http://dx.doi.org/10.7202/000289ar.
Full textDimitrova, Biljana, and Aleksandra Mileva. "Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)." Journal of Computer and Communications 05, no. 05 (2017): 98–111. http://dx.doi.org/10.4236/jcc.2017.55008.
Full textDempsey, B. J., and J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, no. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.
Full textCarignan, Isabelle. "La mobilisation de stratégies de lecture sur trois formes de documents en 3e secondaire." Nouveaux cahiers de la recherche en éducation 12, no. 2 (July 30, 2013): 161–78. http://dx.doi.org/10.7202/1017465ar.
Full textMusliyana, Zuhar, Teuku Yuliar Arif, and Rizal Munadi. "Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia." Jurnal Rekayasa Elektrika 12, no. 1 (March 25, 2016): 21. http://dx.doi.org/10.17529/jre.v12i1.2896.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textAlmanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.
Full textSwen, Bin. "Outline of initial design of the Structured Hypertext Transfer Protocol." Journal of Computer Science and Technology 18, no. 3 (May 2003): 287–98. http://dx.doi.org/10.1007/bf02948898.
Full textDissertations / Theses on the topic "Protocole de transfert hypertexte"
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Full textIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Chen, Xin. "Performance analysis of persistent hypertext transfer protocol (HTTP) over satellite links." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177605718.
Full textGilis, Matteus, David Hörnsten, and David Larsson. "Filöverföring i modern tid : En jämförelse av SMTP, SFTP och HTTP." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45684.
Full textTransferring and receiving computer files are something most of us do on a regularbasis whether it is for private purposes or if it is work related. FTP is a protocolused for this very purpose which was launched during a time when personal computerswere growing increasingly popular in both home and workplace environments.Since then, more protocols have been introduced and today there are a number ofoptions available bringing new and common features alike to the market. The SMTPprotocol, extended with the MIME standard, is currently a widely used alternative tothe pure file transfer protocols due to the user familiarity and past experiences withthese mail services. Sending and receiving files through e-mail does however implysome limitations together with the fact that some security aspects need to be takeninto consideration, particularly for company users handling sensitive data. In thisthesis, three different file transfer protocols (SMTP, SFTP and HTTP) have all beenevaluated in account of their user friendliness as well as their security features. Theresults indicate that HTTP(S) combined with the WebDAV extension can be considereda viable alternative for organizations due to its user friendliness and security.The remaining protocols, SMTP and SFTP, also have their uses where SFTP wouldseem to be an appealing option for advanced users and where SMTP remains a passablealternative for private usage by regular users under the right conditions.
Bersack, Evelyn Louise. "Implementation of a hypertext transfer protocol server on a high assurance multilevel secure platform." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386364.
Full textSCHNEIDER, RAYMOND. "Un protocole de diffusion pour un service de transfert fiable et ordonne." Université Louis Pasteur (Strasbourg) (1971-2008), 1995. http://www.theses.fr/1995STR13029.
Full textElza, Dethe. "Browser evolution document access on the World Wide Web." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1176833339.
Full textKalibjian, Jeffrey R. "Group Telemetry Analysis Using the World Wide Web." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/607611.
Full textToday it is not uncommon to have large contractor teams involved in the design and deployment of even small satellite systems. The larger (and more geographically remote) the team members, the more difficult it becomes to efficiently manage the disbursement of telemetry data for evaluation and analysis. Further complications are introduced if some of the telemetry data is sensitive. An application is described which can facilitate telemetry data sharing utilizing the National Information Infrastructure (Internet).
Masmoudi, Wahid. "Contribution à l'étude fondamentale du séchage des matériaux capillaro-poreux : critique de la modélisation macroscopique et du protocole expérimental de validation." Toulouse, INPT, 1990. http://www.theses.fr/1990INPT016H.
Full textMichálek, Branislav. "Aktualizace programu v zařízení s obvody Zynq." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400680.
Full textAllard, Fabien. "Le transfert de contexte : atout pour la mobilité et outil de réduction de coûts pour la sécurité." Télécom Bretagne, 2009. http://www.theses.fr/2008TELB0090.
Full textBooks on the topic "Protocole de transfert hypertexte"
HTTP: Pocket Reference. O'Reilly, 2000.
Find full textHypertext Transfer Protocol HTTP 1.0 Specifications. Iuniverse Inc, 1999.
Find full textOnvural, Raif. Data Communications and their Performance (IFIP International Federation for Information Processing). Springer, 1995.
Find full textBook chapters on the topic "Protocole de transfert hypertexte"
Weik, Martin H. "hypertext transfer protocol." In Computer Science and Communications Dictionary, 742. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8552.
Full textWeik, Martin H. "Hypertext Transfer Protocol." In Computer Science and Communications Dictionary, 742. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8553.
Full textWilde, Erik. "Hypertext Transfer Protocol (HTTP)." In World Wide Web, 53–149. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59944-6_4.
Full textBressoud, Thomas, and David White. "The HyperText Transfer Protocol." In Introduction to Data Systems, 609–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54371-6_20.
Full textGorski, Peter Leo, Luigi Lo Iacono, and Hoai Viet Nguyen. "HTTP: Hypertext Transfer Protocol." In WebSockets, 5–24. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446444386.002.
Full textKumar, Akshi. "Hypertext Transfer Protocol (HTTP)." In Web Technology, 47–64. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2019.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781351029902-4.
Full textWilde, Erik. "Hypertext Transfer Protocol (HTTP)." In Wilde’s WWW, 53–135. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-95855-7_4.
Full textMeinel, Christoph, and Harald Sack. "Zustelldienst im Web — HTTP: Hypertext Transfer Protocol." In WWW, 735–804. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-642-18963-0_11.
Full textGecse, Roland. "Conformance testing methodology of Internet protocols Internet application-layer protocol testing — the Hypertext Transfer Protocol." In Testing of Communicating Systems, 35–48. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35381-4_3.
Full textAakanksha, Bhawna Jain, Dinika Saxena, Disha Sahni, and Pooja Sharma. "Analysis of Hypertext Transfer Protocol and Its Variants." In Smart Innovations in Communication and Computational Sciences, 171–88. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8971-8_17.
Full textConference papers on the topic "Protocole de transfert hypertexte"
Shah, Rushank, and Stevina Correia. "Encryption of Data over HTTP (Hypertext Transfer Protocol)/HTTPS (Hypertext Transfer Protocol Secure) Requests for Secure Data transfers over the Internet." In 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 2021. http://dx.doi.org/10.1109/rteict52294.2021.9573978.
Full textDeshpande, Sachin, and Wenjun Zeng. "Scalable streaming of JPEG2000 images using hypertext transfer protocol." In the ninth ACM international conference. New York, New York, USA: ACM Press, 2001. http://dx.doi.org/10.1145/500141.500197.
Full textAbisoye, Opeyemi Aderiike, Oluwatobi Shadrach Akanji, Blessing Olatunde Abisoye, and Joseph Awotunde. "Slow Hypertext Transfer Protocol Mitigation Model in Software Defined Networks." In 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI). IEEE, 2020. http://dx.doi.org/10.1109/icdabi51230.2020.9325601.
Full textMATTSON, R. L. R., and S. GHOSH. "HTTP-MPLEX: AN APPLICATION LAYER MULTIPLEXING PROTOCOL FOR THE HYPERTEXT TRANSFER PROTOCOL (HTTP)." In New Trends in Computer Networks - 20th International Symposium on Computer and Information Sciences (ISCIS'05). IMPERIAL COLLEGE PRESS, 2005. http://dx.doi.org/10.1142/9781860947308_0019.
Full textAsgary, Ali, Alireza Ghaffari, and Albert Kong. "Automated Intelligent Emergency Assessment of GTA Pipeline Events." In 2010 8th International Pipeline Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/ipc2010-31006.
Full textUmar, Rukayya, Morufu Olalere, Ismaila Idris, Raji Abdullahi Egigogo, and G. Bolarin. "Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection." In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO). IEEE, 2019. http://dx.doi.org/10.1109/icecco48375.2019.9043262.
Full textHale, Mark A., James I. Craig, and Dimitri N. Mavris. "A Lean-Server Approach to Enabling Collaboration Using Advanced Design Methods." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dac-8597.
Full textReports on the topic "Protocole de transfert hypertexte"
Fielding, R., J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol -- HTTP/1.1. RFC Editor, June 1999. http://dx.doi.org/10.17487/rfc2616.
Full textRescorla, E., and A. Schiffman. The Secure HyperText Transfer Protocol. RFC Editor, August 1999. http://dx.doi.org/10.17487/rfc2660.
Full textBerners-Lee, T., R. Fielding, and H. Frystyk. Hypertext Transfer Protocol -- HTTP/1.0. RFC Editor, May 1996. http://dx.doi.org/10.17487/rfc1945.
Full textFielding, R., J. Gettys, J. Mogul, H. Frystyk, and T. Berners-Lee. Hypertext Transfer Protocol -- HTTP/1.1. RFC Editor, January 1997. http://dx.doi.org/10.17487/rfc2068.
Full textFielding, R., M. Nottingham, and J. Reschke, eds. Hypertext Transfer Protocol (HTTP/1.1): Caching. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7234.
Full textFielding, R., and J. Reschke, eds. Hypertext Transfer Protocol (HTTP/1.1): Authentication. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7235.
Full textFielding, R., and J. Reschke, eds. Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7232.
Full textFielding, R., Y. Lafon, and J. Reschke, eds. Hypertext Transfer Protocol (HTTP/1.1): Range Requests. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7233.
Full textReschke, J. Initial Hypertext Transfer Protocol (HTTP) Method Registrations. RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7237.
Full textBelshe, M., and R. Peon. Hypertext Transfer Protocol Version 2 (HTTP/2). Edited by M. Thomson. RFC Editor, May 2015. http://dx.doi.org/10.17487/rfc7540.
Full text