Letteratura scientifica selezionata sul tema "Design of protocols"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Design of protocols".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang e Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms". International Journal of Applied Evolutionary Computation 1, n. 1 (gennaio 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Testo completoYu, Song Sen, Yun Peng e Jia Jing Zhang. "A Lightweight RFID Mechanism Design". Advanced Materials Research 216 (marzo 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Testo completoTurilli, Matteo. "Ethical protocols design". Ethics and Information Technology 9, n. 1 (8 febbraio 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Testo completoSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. "Practice and Consideration of Master Protocol in Clinical Trials". Tumor Discovery 2, n. 2 (28 aprile 2023): 342. http://dx.doi.org/10.36922/td.342.
Testo completoNguyen, Philon, Thanh An Nguyen e Yong Zeng. "Segmentation of design protocol using EEG". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, n. 1 (3 aprile 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Testo completoHe, Jiayue, Jennifer Rexford e Mung Chiang. "Don't optimize existing protocols, design optimizable protocols". ACM SIGCOMM Computer Communication Review 37, n. 3 (20 luglio 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Testo completoN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Testo completoSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo e Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things". Information 12, n. 8 (22 luglio 2021): 292. http://dx.doi.org/10.3390/info12080292.
Testo completoAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges". Journal of Marine Science and Engineering 9, n. 7 (4 luglio 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Testo completoHayam A. Al-Yasiri e Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator". Diyala Journal of Engineering Sciences 7, n. 4 (1 dicembre 2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Testo completoTesi sul tema "Design of protocols"
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Testo completoThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Testo completoMüffke, Friedger. "A better way to design communication protocols". Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Testo completoHoran, Stephen, e Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Testo completoThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols". Thesis, Queensland University of Technology, 2001.
Cerca il testo completoRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Testo completoWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach". Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Testo completoLiu, Changlei, e 劉長雷. "Bluetooth network design". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Testo completoShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Testo completoSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /". The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Testo completoLibri sul tema "Design of protocols"
name, No. Vaccine protocols. 2a ed. Totowa, NJ: Humana Press, 2003.
Cerca il testo completoAndrew, Robinson, Cranage Martin P e Hudson Michael, a cura di. Vaccine protocols. 2a ed. Totowa, N.J: Humana Press, 2003.
Cerca il testo completoL, Hammond Joseph, e Pawlikowski Krzysztof, a cura di. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.
Cerca il testo completoSharp, Robin. Principles of protocol design. Berlin: Springer, 2010.
Cerca il testo completoEhud, Gazit, e Nussinov Ruth, a cura di. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.
Cerca il testo completoLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Cerca il testo completo1947-, Robinson Andrew, Farrar Graham H e Wiblin Christopher N, a cura di. Vaccine protocols. Totowa, N.J: Human Press, 1996.
Cerca il testo completoKan, Jeff WT, e John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Testo completoHolzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.
Cerca il testo completoAmerican Telephone and Telegraph Company., a cura di. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.
Cerca il testo completoCapitoli di libri sul tema "Design of protocols"
Wilson, Greg. "Protocols". In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Testo completoHyndman, David L., e Masato Mitsuhashi. "PCR Primer Design". In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Testo completoHercog, Drago. "System Specification and Design". In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Testo completoHercog, Drago. "Protocol Specification and Design". In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Testo completoChoi, Joonwon, Adam Chlipala e Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols". In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Testo completoKůr, Jiří, Václav Matyáš e Petr Švenda. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Testo completoŠvenda, Petr. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Testo completode Muro, Marilena Aquino. "Probe Design, Production, and Applications". In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Testo completoSarkar, Mouli, e Naveen Kumar. "De Novo Peptide Design Tools". In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Testo completoYu, Su-Yang, e Jeff Yan. "Security Design in Human Computation Games". In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Testo completoAtti di convegni sul tema "Design of protocols"
De Marchi, Mirco, e Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols". In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Testo completoDijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Testo completoDijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Testo completoChiu, I., e L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments". In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Testo completoDong, Ling, Kefei Chen, Mi Wen e Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design". In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Testo completoda Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli e J. Rabaey. "Wireless protocols design". In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Testo completoLubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway". In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Testo completoKoh, Immanuel, Paul Keel e Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Testo completoChiasserini, C. F., P. Nuggehalli e V. Srinivasan. "Energy-efficient communication protocols". In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Testo completoHaeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger e Jane Burry. "Furniture Design Using Custom-Optimised Structural Nodes". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.
Testo completoRapporti di organizzazioni sul tema "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, novembre 2001. http://dx.doi.org/10.17487/rfc3117.
Testo completoAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, ottobre 1994. http://dx.doi.org/10.21236/ada290584.
Testo completoSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1996. http://dx.doi.org/10.21236/ada465132.
Testo completoSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, luglio 2008. http://dx.doi.org/10.21236/ada484133.
Testo completoLebovitz, G., e M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, febbraio 2012. http://dx.doi.org/10.17487/rfc6518.
Testo completoGriffin, Timothy G., Aaron D. Jaggard e Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, aprile 2004. http://dx.doi.org/10.21236/ada461910.
Testo completoHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), agosto 2022. http://dx.doi.org/10.21079/11681/45100.
Testo completoAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, ottobre 1999. http://dx.doi.org/10.21236/ada370116.
Testo completoKrunz, Marwan, e Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, novembre 2013. http://dx.doi.org/10.21236/ada591559.
Testo completoAng, Chwee B., e Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, febbraio 2001. http://dx.doi.org/10.21236/ada405072.
Testo completo