Academic literature on the topic 'Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protocols"
Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textCameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (January 9, 2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.
Full textPeixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (December 23, 2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.
Full textLi, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (May 30, 2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.
Full textGuo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.
Full textSaunders, Diana. "The Protocol of Protocols." Practice Nursing 9, no. 10 (June 2, 1998): 3. http://dx.doi.org/10.12968/pnur.1998.9.10.3.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.
Full textReges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, Talison Augusto Correia de Melo, Felipe Denis Mendonça de Oliveira, Daniel Holanda Noronha, Antônio Eduardo de Morais Silva, André Laurindo Maitelli, and Andrés Ortiz Salazar. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.
Full textBeattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (October 2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.
Full textDissertations / Theses on the topic "Protocols"
Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Full textDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textYang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.
Full textMaria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.
Full textThe purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.
Full textIn a world strongly dependent on distributed data communication, the design of secure infrastructures is a crucial task. Distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal
坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.
Full textJaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.
Full textBooks on the topic "Protocols"
TCP/IP and related protocols. New York: McGraw-Hill, 1992.
Find full textSpiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.
Find full textG, Naugle Matthew, ed. Network protocols. New York: McGraw-Hill, 1999.
Find full textBlack, Uyless D. TCP/IP and related protocols. 2nd ed. New York: McGraw-Hill, 1995.
Find full textTCP/IP and related protocols. 3rd ed. New York: McGraw-Hill, 1998.
Find full text1971-, Jinmei Tatuya, and Shima Keiichi 1970-, eds. IPv6 advanced protocols implementation. Boston: Morgan Kaufmann Publishers, 2007.
Find full textDestefano, Anna. Chaperonin protocols. [Place of publication not identified]: Humana, 2010.
Find full textPCR protocols. 3rd ed. New York, N.Y: Humana Press, 2011.
Find full textde, Ley Marc, ed. Cytokine protocols. Totowa, N.J: Humana Press, 2004.
Find full textManson, Margaret M. Immunochemical Protocols. New Jersey: Humana Press, 1992. http://dx.doi.org/10.1385/0896032043.
Full textBook chapters on the topic "Protocols"
Malik, Waqar. "Protocols." In Learn Swift 2 on the Mac, 157–65. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_17.
Full textMesplié, Grégory. "Protocols." In Hand and Wrist Rehabilitation, 471–85. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16318-5_18.
Full textMalik, Waqar. "Protocols." In Learn Swift on the Mac, 141–48. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_15.
Full textCampbell, Matthew. "Protocols." In Swift Quick Syntax Reference, 133–35. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0439-9_46.
Full textCampbell, Matthew. "Protocols." In Objective-C Quick Syntax Reference, 81–83. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6488-0_23.
Full textMoustaira, Elina. "Protocols." In International Insolvency Law, 107–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04450-3_6.
Full textDalrymple, Mark, and Scott Knaster. "Protocols." In Learn Objective-C on the Mac, 235–47. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1816-6_13.
Full textWood, Linda Fossati. "Protocols." In Targeted Regulatory Writing Techniques: Clinical Documents for Drugs and Biologics, 53–68. Basel: Birkhäuser Basel, 2009. http://dx.doi.org/10.1007/978-3-7643-8362-6_5.
Full textSchoenmakers, Berry. "∑-Protocols." In Encyclopedia of Cryptography and Security, 1206–8. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_12.
Full textHummel, Susanne. "Protocols." In Ancient DNA Typing, 225–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05050-7_8.
Full textConference papers on the topic "Protocols"
Livesey, Joseph, and Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Full textTan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textPiva, Fabio R., José R. M. Monteiro, Augusto J. Devegili, and Ricardo Dahab. "Applying Strand Spaces to Certified Delivery Proofs." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2006. http://dx.doi.org/10.5753/sbseg.2006.20940.
Full textShu, J. C., and M. T. Liu. "Protocol conversion between complex protocols." In Ninth Annual International Phoenix Conference on Computers and Communications. 1990 Conference Proceedings. IEEE, 1990. http://dx.doi.org/10.1109/pccc.1990.101673.
Full textLamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri, and Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Full textSuprano, Alessia, Emanuele Polino, Danilo Zia, Davide Poderini, Giovanni Rodari, Taira Giordani, Luca Innocenti, et al. "Black-box optimization in quantum information protocols." In CLEO: Fundamental Science. Washington, D.C.: Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.fm4a.7.
Full textApt, Krzysztof R., Eryk Kopczyński, and Dominik Wojtczak. "On the Computational Complexity of Gossip Protocols." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/106.
Full textChiu, I., and L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Full textDornelas, Eduardo Carnier, Linei Augusta Brolini Dellê Urban, Carolina de Lima Bolzon, Iris Rabinovich, and Selene Elifio Esposito. "ABBREVIATED MRI PROTOCOL TO EVALUATE RESPONSE TO BREAST CANCER NEOADJUVANT CHEMOTHERAPY." In XXIV Congresso Brasileiro de Mastologia. Mastology, 2022. http://dx.doi.org/10.29289/259453942022v32s1002.
Full textDong, Ling, Kefei Chen, Mi Wen, and Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Full textReports on the topic "Protocols"
Williams, C., P. F. Reynolds, and B. de Supinoki. Delta Coherence Protocols: The Home Update Protocol. Office of Scientific and Technical Information (OSTI), July 2000. http://dx.doi.org/10.2172/793578.
Full textTubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), May 2021. http://dx.doi.org/10.2172/1783513.
Full textRaikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300648.
Full textRaikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300662.
Full textReynolds, J. K., and J. Postel. Official Internet protocols. RFC Editor, May 1987. http://dx.doi.org/10.17487/rfc1011.
Full textLloyd, B., and W. Simpson. PPP Authentication Protocols. RFC Editor, October 1992. http://dx.doi.org/10.17487/rfc1334.
Full textGalvin, J., K. McCloghrie, and J. Davin. SNMP Security Protocols. RFC Editor, July 1992. http://dx.doi.org/10.17487/rfc1352.
Full textAllen, J., P. Leach, and R. Hedberg. CIP Transport Protocols. RFC Editor, August 1999. http://dx.doi.org/10.17487/rfc2653.
Full textMilitao, Filipe, Jonathan Aldrich, and Luis Caires. Rely-Guarantee Protocols. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada605817.
Full textAnderson, Tom E., and David J. Wetherall. Enforceable Network Protocols. Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada425347.
Full text