Literatura académica sobre el tema "Protocoles de communications"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Protocoles de communications".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Protocoles de communications"
Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He y Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management". Systems 11, n.º 7 (24 de junio de 2023): 322. http://dx.doi.org/10.3390/systems11070322.
Texto completoSangam, Sahana V., Sahana S. Kulkarni y Asst Prof Chaitanya K. Jambotkar. "Smart Grid Communication Protocols". International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (28 de febrero de 2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.
Texto completoBoeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif y Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed". Energies 17, n.º 2 (11 de enero de 2024): 373. http://dx.doi.org/10.3390/en17020373.
Texto completoGee, K. "Communications network protocols". Computer Communications 8, n.º 5 (octubre de 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.
Texto completoGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, n.º 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.
Texto completoGossner, Olivier. "Protocoles de communication robustes". Revue économique 48, n.º 3 (mayo de 1997): 685. http://dx.doi.org/10.2307/3502853.
Texto completoGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, n.º 3 (1 de mayo de 1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.
Texto completoSuleman, Danladi, Rania Shibl y Keyvan Ansari. "Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions". Smart Cities 6, n.º 5 (6 de octubre de 2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.
Texto completoSingh, Rameshwar y Prof Gayatri Bhoyar. "Green Communications Using Ambient Backscattered: The Review Paper". International Journal for Research in Applied Science and Engineering Technology 10, n.º 8 (31 de agosto de 2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.
Texto completoBoczkowski, Lucas, Iordanis Kerenidis y Frédéric Magniez. "Streaming Communication Protocols". ACM Transactions on Computation Theory 10, n.º 4 (17 de octubre de 2018): 1–21. http://dx.doi.org/10.1145/3276748.
Texto completoTesis sobre el tema "Protocoles de communications"
Gerault, David. "Security analysis of contactless communication protocols". Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Texto completoMoulierac, Joanna. "Agrégation des communications multicast". Rennes 1, 2006. http://www.theses.fr/2006REN1S151.
Texto completoMoulierac, Joanna Rubino Gerardo. "Agrégation des communications multicast". [S.l.] : [s.n.], 2006. ftp://ftp.irisa.fr/techreports/theses/2006/moulierac.pdf.
Texto completoArnal, Fabrice. "Optimisation de la fiabilité pour des communications multipoints par satellite géostationnaire". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00001160.
Texto completoMota, Gonzalez Sara del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse, INPT, 2008. http://ethesis.inp-toulouse.fr/archive/00000628/.
Texto completoSystems that implement communications in the form of group multicast have increasingly raised security problems. The protection mechanisms applied to that communication rely on symmetrical and asymmetrical key exchanges, and the way these mechanisms are selected does influence the system’s efficiency. Following an in depth analysis of the needs captured by these systems, we defined a model for representing the dynamics of groups, as well as communication among group members. We defined one system architecture which focuses on key creation, exchange and management functions. The system was modeled in UML 2. 0 and checked against security and temporal properties. The approach we followed to investigate temporal requirements may be extended to a broad variety of distributed systems
Mota, Gonzalez Sara Del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2008. http://tel.archives-ouvertes.fr/tel-00309824.
Texto completoMota, Gonzalez Sara del Socorro Villemur Thierry Diaz Michel. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse : INP Toulouse, 2008. http://ethesis.inp-toulouse.fr/archive/00000628.
Texto completoTourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil". Nice, 2008. http://www.theses.fr/2008NICE4006.
Texto completoCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Guitton, Alexandre. "Communications multicast : contributions aux réseaux optiques et au passage à l'échelle". Rennes 1, 2005. https://hal-clermont-univ.archives-ouvertes.fr/tel-01448117.
Texto completoGuitton, Alexandre Marie Raymond Molnár Miklós. "Communications multicast contributions aux réseaux optiques et au passage à l'échelle /". [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/guitton.pdf.
Texto completoLibros sobre el tema "Protocoles de communications"
Bulbrook, Dale. WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.
Buscar texto completoHalsall, Fred. Introduction to data communications and computer networks. Wokingham, England: Addison-Wesley, 1985.
Buscar texto completoHalsall, Fred. Data communications, computer networks, and OSI. 2a ed. Wokingham, England: Addison-Wesley, 1988.
Buscar texto completoStevens, W. Richard. UNIX network programming: Interprocess communications. 2a ed. Noida (IN): Addison Wesley Longman Singapore Pte. Ltd., 1999.
Buscar texto completoStallings, William. Data and Computer Communications. 5a ed. Upper Saddle River, N.J: Prentice Hall, 1997.
Buscar texto completoStallings, William. Data and computer communications. 3a ed. Cowley: Maxwell Macmillan, 1991.
Buscar texto completoWilliam, Stallings. Data and computer communications. 8a ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2007.
Buscar texto completoWilliam, Stallings. Data and computer communications. 2a ed. New York: Macmillan Pub. Co., 1988.
Buscar texto completoWilliam, Stallings. Data and computer communications. 3a ed. New York: Macmillan Pub. Co., 1991.
Buscar texto completoWilliam, Stallings. Data and computer communications. New York: Macmillan Pub. Co., 1985.
Buscar texto completoCapítulos de libros sobre el tema "Protocoles de communications"
Hercog, Drago. "Communication Service, Communication Protocol". En Communication Protocols, 45–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_4.
Texto completoJaved, Adeel. "Communication Protocols". En Building Arduino Projects for the Internet of Things, 35–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1940-9_3.
Texto completoSuhonen, Jukka, Mikko Kohvakka, Ville Kaseva, Timo D. Hämäläinen y Marko Hännikäinen. "Communication Protocols". En Low-Power Wireless Sensor Networks, 27–41. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2173-3_4.
Texto completoSubero, Armstrong. "Communication Protocols". En Programming Microcontrollers with Python, 185–208. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7058-5_7.
Texto completoĎud’ák, Juraj y Gabriel Gaspar. "Communication Protocols". En Signals and Communication Technology, 1–76. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-30152-0_1.
Texto completoKanagachidambaresan, G. R. y Bharathi N. "Communication Protocols". En Sensors and Protocols for Industry 4.0, 73–112. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9007-1_3.
Texto completoYang, Ke, Meihua Xiao, Zifan Song y Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System". En Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Texto completoQin, Xudong, Yuxin Deng y Wenjie Du. "Verifying Quantum Communication Protocols with Ground Bisimulation". En Tools and Algorithms for the Construction and Analysis of Systems, 21–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_2.
Texto completoCowley, John. "Network Protocols". En Communications and Networking, 81–109. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_6.
Texto completoHercog, Drago. "Communication Protocol Performance". En Communication Protocols, 83–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_6.
Texto completoActas de conferencias sobre el tema "Protocoles de communications"
Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri y Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things". En Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Texto completoTan, Yang y Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". En 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Texto completoGeromel, Paulo A. y Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet". En Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.
Texto completoCruz, Tiago Rodrigo, Gustavo Cainelli, Max Feldman y Ivan Muller. "Towards handover in IWN: a fast data collection technique". En Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1172.
Texto completoLivesey, Joseph y Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers". En Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Texto completoBarcelos, Patrícia Pitthan A., Taisy Silva Weber y Roberto Jung Drebes. "Um Toolkit para Avaliação da Intrusão de Métodos de Injeção de Falhas". En Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/wtf.2002.23398.
Texto completoFritzke Jr., Udo, Luiz Alberto F. Gomes, Denis L. Silva y Daniel M. Morais. "A Meta Protocol for Adaptable Mobile Replicated Databases". En Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23247.
Texto completoLi, Kuang-Yu J. y B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems". En Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.
Texto completoPauli, Joakim. "Service Oriented Vehicle Diagnostic Communication and Regulations". En Automotive Technical Papers. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-5050.
Texto completoTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol". En 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Texto completoInformes sobre el tema "Protocoles de communications"
Brooks, Richard R. Detecting Hidden Communications Protocols. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2013. http://dx.doi.org/10.21236/ada581858.
Texto completoAdler, Micah y Bruce M. Maggs. Protocols for Asymetric Communication Channels. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 1997. http://dx.doi.org/10.21236/ada333259.
Texto completoCarroll, J. Ritchie y F. Russell Robertson. A COMPARISON OF PHASOR COMMUNICATIONS PROTOCOLS. Office of Scientific and Technical Information (OSTI), marzo de 2019. http://dx.doi.org/10.2172/1504742.
Texto completoP., R., P. A., P. Sijben, S. Brim y M. Shore. Middlebox Communications (midcom) Protocol Requirements. RFC Editor, agosto de 2002. http://dx.doi.org/10.17487/rfc3304.
Texto completoStiemerling, M., J. Quittek y T. Taylor. Middlebox Communications (MIDCOM) Protocol Semantics. RFC Editor, febrero de 2005. http://dx.doi.org/10.17487/rfc3989.
Texto completoBarnes, M., ed. Middlebox Communications (MIDCOM) Protocol Evaluation. RFC Editor, junio de 2005. http://dx.doi.org/10.17487/rfc4097.
Texto completoLiu, Ming T. Protocol Engineering for Multimedia Communications. Fort Belvoir, VA: Defense Technical Information Center, octubre de 1995. http://dx.doi.org/10.21236/ada305077.
Texto completoEspinoza, J., P. Sholander y B, Van Leeuwen. Effective Protocols for Mobile Communications and Networking. Office of Scientific and Technical Information (OSTI), diciembre de 1998. http://dx.doi.org/10.2172/2758.
Texto completoMoser, Louise E. y P. M. Melliar-Smith. Secure Multicast Protocols for Group Communication. Fort Belvoir, VA: Defense Technical Information Center, junio de 2001. http://dx.doi.org/10.21236/ada388045.
Texto completoAwerbuch, Baruch, Alan Baratz y David Peleg. Cost-Sensitive Analysis of Communication Protocols. Fort Belvoir, VA: Defense Technical Information Center, junio de 1991. http://dx.doi.org/10.21236/ada237356.
Texto completo