Gotowa bibliografia na temat „Conception de protocoles”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Conception de protocoles”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Conception de protocoles"
Alata, Eric, Vincent Nicomette, Julien Duch êne, Colas Le Guernic i Mohamed Kaaniche. "Outils pour la rétro-conception de protocoles. Analyse et classification". Techniques et sciences informatiques 35, nr 6 (30.12.2016): 609–40. http://dx.doi.org/10.3166/tsi.35.609-640.
Pełny tekst źródłaAmira, Derradji, i Verdier Christine. "Conception et évaluation d’un langage orienté patient pour la représentation de protocoles de soins". Ingénierie des systèmes d'information 21, nr 2 (28.04.2016): 123–46. http://dx.doi.org/10.3166/isi.21.2.123-146.
Pełny tekst źródłaMasbernat, Raphaël, Églantine Bigot-Doll, Maxime Fouillat, Elisabeth Sulmont, François Pacquelet, Antoine Chevalier, Naomi Pereira i Chloé Blanc. "Machines à voir, machines à penser : écosystème robotique situé pour la conception architecturale". SHS Web of Conferences 147 (2022): 06001. http://dx.doi.org/10.1051/shsconf/202214706001.
Pełny tekst źródłaCalixte, Xaviera, Karine Cuffi i Pierre Leclercq. "Mise en place d’un outil pédagogique de documentation du processus de conception architecturale". SHS Web of Conferences 147 (2022): 03002. http://dx.doi.org/10.1051/shsconf/202214703002.
Pełny tekst źródłaMonod-Ansaldi, Réjane, Michèle Prieur, Isabelle Arbez i Agnès Golay. "Étayer la conception de protocoles expérimentaux par des élèves de CM2 pour évaluer l’entrée d’eau dans la plante". RDST, nr 12 (15.11.2015): 113–39. http://dx.doi.org/10.4000/rdst.1144.
Pełny tekst źródłaBennett, Fionn C. "Expliquer according to Jacques Derrida : explanation and critique". Recherches anglaises et nord-américaines 37, nr 1 (2004): 137–49. http://dx.doi.org/10.3406/ranam.2004.1729.
Pełny tekst źródłaChazalon, Jean-François. "Approche du traitement non chirurgical des supraclusions par la technique des aligneurs : quels protocoles de traitement et comment optimiser les résultats cliniques ?" Revue d'Orthopédie Dento-Faciale 56, nr 1 (luty 2022): 51–70. http://dx.doi.org/10.1051/odf/2022006.
Pełny tekst źródłaSoulez, Antonia. "Otto Neurath : la force d’une pensée constructiviste du possible contre le déclinisme". Les cercles viennois de l'entre-deux-guerres 94 (2022): 187–209. http://dx.doi.org/10.4000/11vee.
Pełny tekst źródłaMelançon, Benoît. "Pour une lecture sociale de la correspondance de Saint-Denys Garneau". Dossier 20, nr 1 (29.08.2006): 96–106. http://dx.doi.org/10.7202/201142ar.
Pełny tekst źródłaHÉRODIN, F. "Problèmes éthiques posés par la recherche duale sur les cellules souches menée par le Service de santé des armées". Revue Médecine et Armées, Volume 43, Numéro 3 (1.06.2015): 240–45. http://dx.doi.org/10.17184/eac.6882.
Pełny tekst źródłaRozprawy doktorskie na temat "Conception de protocoles"
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Pełny tekst źródłaSeinturier, Lionel. "Conception d'algorithmes répartis et de protocoles réseaux en approche objet". Phd thesis, Paris, CNAM, 1997. http://tel.archives-ouvertes.fr/tel-00439136.
Pełny tekst źródłaEtrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Pełny tekst źródłaThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
SANTOSO, HARRY. "Conception et evaluation de protocoles de communication a haut debit". Paris 6, 1993. http://www.theses.fr/1993PA066238.
Pełny tekst źródłaDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification". Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Pełny tekst źródłaThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Tanter, Éric. "Des protocoles de métaobjets aux noyaux versatiles pour la programmation par aspects". Nantes, 2004. http://www.theses.fr/2004NANT2075.
Pełny tekst źródłaBendedouch, Fethi. "Conception et realisation d'un systeme d'apprentissage des protocoles de communication assiste par ordinateur : simulation et analyse des protocoles". Toulouse 3, 1987. http://www.theses.fr/1987TOU30033.
Pełny tekst źródłaBendedouch, Fethi. "Conception et réalisation d'un système d'apprentissage des protocoles de communication assisté par ordinateur simulation et analyse des protocoles /". Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37602822c.
Pełny tekst źródłaSTEFFAN, LAURENT. "Conception et specification de protocoles de communication pour applications temps reel". Nantes, 1988. http://www.theses.fr/1988NANT2046.
Pełny tekst źródłaPlainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Pełny tekst źródłaRelaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Książki na temat "Conception de protocoles"
Liljeroth, Pia. Rädsla inför förlossningen: Ett uppenbart kliniskt problem? : konstruktionen av förlossningsrädsla som medicinsk kategori. Åbo: Åbo Akademis förlag, 2009.
Znajdź pełny tekst źródłaQuirouette, R. L. Le mur à écran pare-pluie: Un protocole de mise en service. Ottawa, Ont: Société canadienne d'hypothèques et de logement, 1996.
Znajdź pełny tekst źródłaBellavance, English Lisa, red. Combinatorial library methods and protocols. Totowa, N.J: Humana Press, 2002.
Znajdź pełny tekst źródłaWAHL, Sondi. Conception et Evaluation Protocole Rouhb: Conception et Evaluation de Protocole de Routage Ad Hoc. ISTE Editions Ltd., 2023.
Znajdź pełny tekst źródłaSpecial Edition Using SOAP. Que, 2001.
Znajdź pełny tekst źródłaGrijalba Carabali, Paola Andrea, Adriana Pérez Portocarrero, Jhon Fredy Salazar Riascos i Jorge Humberto Restrepo Zapata. Guía de protocolo del síndrome de pie diabético. Editorial Universidad Santiago de Cali, 2019. http://dx.doi.org/10.35985/9789585248403.
Pełny tekst źródłaFaúndez C., Jorge, Marlene Verónica González González, Patricio Parra Sanhueza i Juan Carlos Valencia Baier. Manual 38: Manual para la certificación sanitaria forestal. INFOR, 2001. http://dx.doi.org/10.52904/20.500.12220/6669.
Pełny tekst źródłaCatanesi, Cecilia Inés, i Egle Etel Villegas Castagnasso, red. Elementos de Genética para estudiantes de Ciencias Biológicas. Editorial de la Universidad Nacional de La Plata (UNLP), 2021. http://dx.doi.org/10.35537/10915/129625.
Pełny tekst źródłaCustom CGI Scripting with Perl. John Wiley & Sons, 2001.
Znajdź pełny tekst źródłaHanegan, Kevin. Custom CGI Scripting with Perl. Wiley & Sons, Incorporated, John, 2002.
Znajdź pełny tekst źródłaCzęści książek na temat "Conception de protocoles"
Bentley, Joseph. "Neurath’s Conception of Protocol Statements". W Logical Empiricism and Naturalism, 67–96. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29328-3_3.
Pełny tekst źródłaWoodland, Sarah, i Kamarra Bell-Wykes. "Culturally Led, Culturally Safe Performance Making". W First Nations Australian Theatre for Health Equity, 61–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65506-7_4.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Évaluation des performances du protocole pour des applications coopératives". W Conception et évaluation de protocole de routage ad hoc, 155–211. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch4.
Pełny tekst źródłaIsel, M. "Conception et réalisation des orthèses". W Orthèses De la Main et du Poignet. Protocoles De Rééducation, 29–37. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71185-5.00005-9.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Enjeux autour des communications ad hoc sur la route". W Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Intégration des composantes ad hoc dans une infrastructure globale". W Conception et évaluation de protocole de routage ad hoc, 249–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch6.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Approche fonctionnelle de conception de protocole". W Conception et évaluation de protocole de routage ad hoc, 17–80. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch2.
Pełny tekst źródłaBentley, Joseph. "Conceptions of Protocol Sentences in Neurath and Carnap and the Bipartite Metatheory Conception". W Ways of the Scientific World-Conception. Rudolf Carnap and Otto Neurath, 152–79. BRILL, 2024. http://dx.doi.org/10.1163/9789004680203_008.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Modèle formel pour l’analyse de propriétés du protocole". W Conception et évaluation de protocole de routage ad hoc, 213–47. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch5.
Pełny tekst źródłaWAHL, Martine, i Patrick SONDI. "Modèles et simulations pour l’analyse de performance". W Conception et évaluation de protocole de routage ad hoc, 81–153. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch3.
Pełny tekst źródłaStreszczenia konferencji na temat "Conception de protocoles"
Frikha, Mounir, i Jamila Ben Slimane. "Conception and simulation of energy-efficient AODV protocol in ad hoc networks". W the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292343.
Pełny tekst źródłaDel Junco González, Juan José. "Conexiones disciplinarias en una práctica "mestiza”. El caso de la “ornitología emocional”". W V Congreso Internacional de Investigacion en Artes Visuales ANIAV 2022. RE/DES Conectar. València: Editorial Universitat Politècnica de València, 2022. http://dx.doi.org/10.4995/aniav2022.2022.15501.
Pełny tekst źródłaMichaud, Martin, Daniel Forgues, Julien Meyer i Claudiane Ouellet- Plamondon. "A Case Study on Improving Standardization in the Conception Phase by Developing Tools and Protocols". W 27th Annual Conference of the International Group for Lean Construction (IGLC). International Group for Lean Construction, 2019. http://dx.doi.org/10.24928/2019/0176.
Pełny tekst źródłaFlorensa Ferrando, Ignasi, Iria Fraga Rivas i Víctor Martínez Junza. "Mathematics education in engineering: a triple discontinuity?" W SEFI 50th Annual conference of The European Society for Engineering Education. Barcelona: Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788412322262.1144.
Pełny tekst źródłaMauricio, María Dolores, Eva Serna, Soraya Lilian Vallés, Martín Aldasoro i José María Vila. "Aprendiendo de forma cooperativa a través del método científico". W In-Red 2016 - Congreso de Innovación Educativa y Docencia en Red de la Universitat Politècnica de València. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/inred2016.2016.4289.
Pełny tekst źródłaSouza, Wander Pereira de, Artur de Souza Moret, Sandro Adalberto, Gleimiria Batista da Costa Matos, Haroldo de Sá Medeiros i Dércio Bernardes de Souza. "Sustainable tourism and public policies in the Amazon: Scientific invisibility". W III SEVEN INTERNATIONAL MULTIDISCIPLINARY CONGRESS. Seven Congress, 2023. http://dx.doi.org/10.56238/seveniiimulti2023-220.
Pełny tekst źródłaCaballero, Victor, David Vernet, Agustín Zaballos i Guiomar Corral. "Web of Energy: hacia la integración inteligente para las redes de sensores en Smart Grids". W XIII Jornadas de Ingenieria Telematica - JITEL2017. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6499.
Pełny tekst źródłaLuca, Andreea iuliana, i Ioana roxana Podina. "ETHIC MODELS SHAPING (IM)MORAL IDENTITY IN (POST)PANDEMIC TIMES: A PROPOSAL FOR A LONGITUDINAL STUDY PROTOCOL". W eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-176.
Pełny tekst źródłaMarín Ramos, Ruben. "En el Parque". W II Congreso Internacional Estéticas Híbridas de la Imagen en Movimiento: Identidad y Patrimonio. Valencia: Universitat Politàcnica de València, 2021. http://dx.doi.org/10.4995/eshid2021.2021.13240.
Pełny tekst źródłaAparicio Pico, Lilia Edith, i Patrick Francois Tarquino Aparicio. "TELESALUD UN MODELO DE CONVERGENCIA ENTRE TECNOLOGÍA, MEDICINA Y EDUCACIÓN". W La formación de ingenieros: un compromiso para el desarrollo y la sostenibilidad. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2020. http://dx.doi.org/10.26507/ponencia.813.
Pełny tekst źródłaRaporty organizacyjne na temat "Conception de protocoles"
Wolfenson, David, William W. Thatcher i James E. Kinder. Regulation of LH Secretion in the Periovulatory Period as a Strategy to Enhance Ovarian Function and Fertility in Dairy and Beef Cows. United States Department of Agriculture, grudzień 2003. http://dx.doi.org/10.32747/2003.7586458.bard.
Pełny tekst źródłaOsejo, Alejandra, Ana María Garrido, Juana Alvarez, Santiago Martínez, Diana Lara, Omar Ruiz i Bernardo Posada. Guía para la caracterización de la gobernanza en paisajes rurales. Redaktor Alejandra Osejo. Instituto de Investigación de Recursos Biológicos Alexander von Humboldt, grudzień 2019. http://dx.doi.org/10.21068/cssbgobernanza2019.
Pełny tekst źródłaBritt, Jack, Miriam Rosenberg, Steven Washburn i Moshe Kaim. Development and Evaluation of a Method of Hormonal Treatment to Increase Fertility in Dairy Cows. United States Department of Agriculture, grudzień 1995. http://dx.doi.org/10.32747/1995.7612833.bard.
Pełny tekst źródła