Gotowa bibliografia na temat „Design of protocols”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Design of protocols”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang i Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms". International Journal of Applied Evolutionary Computation 1, nr 1 (styczeń 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Pełny tekst źródłaYu, Song Sen, Yun Peng i Jia Jing Zhang. "A Lightweight RFID Mechanism Design". Advanced Materials Research 216 (marzec 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Pełny tekst źródłaTurilli, Matteo. "Ethical protocols design". Ethics and Information Technology 9, nr 1 (8.02.2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Pełny tekst źródłaSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu i in. "Practice and Consideration of Master Protocol in Clinical Trials". Tumor Discovery 2, nr 2 (28.04.2023): 342. http://dx.doi.org/10.36922/td.342.
Pełny tekst źródłaNguyen, Philon, Thanh An Nguyen i Yong Zeng. "Segmentation of design protocol using EEG". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, nr 1 (3.04.2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Pełny tekst źródłaHe, Jiayue, Jennifer Rexford i Mung Chiang. "Don't optimize existing protocols, design optimizable protocols". ACM SIGCOMM Computer Communication Review 37, nr 3 (20.07.2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Pełny tekst źródłaN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Pełny tekst źródłaSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo i Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things". Information 12, nr 8 (22.07.2021): 292. http://dx.doi.org/10.3390/info12080292.
Pełny tekst źródłaAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges". Journal of Marine Science and Engineering 9, nr 7 (4.07.2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Pełny tekst źródłaHayam A. Al-Yasiri i Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator". Diyala Journal of Engineering Sciences 7, nr 4 (1.12.2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Pełny tekst źródłaRozprawy doktorskie na temat "Design of protocols"
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Pełny tekst źródłaThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Pełny tekst źródłaMüffke, Friedger. "A better way to design communication protocols". Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Pełny tekst źródłaHoran, Stephen, i Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Pełny tekst źródłaThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols". Thesis, Queensland University of Technology, 2001.
Znajdź pełny tekst źródłaRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Pełny tekst źródłaWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach". Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Pełny tekst źródłaLiu, Changlei, i 劉長雷. "Bluetooth network design". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Pełny tekst źródłaShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Pełny tekst źródłaSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /". The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Pełny tekst źródłaKsiążki na temat "Design of protocols"
Andrew, Robinson, Cranage Martin P i Hudson Michael, red. Vaccine protocols. Wyd. 2. Totowa, N.J: Humana Press, 2003.
Znajdź pełny tekst źródłaL, Hammond Joseph, i Pawlikowski Krzysztof, red. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.
Znajdź pełny tekst źródłaEhud, Gazit, i Nussinov Ruth, red. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.
Znajdź pełny tekst źródłaLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Znajdź pełny tekst źródła1947-, Robinson Andrew, Farrar Graham H i Wiblin Christopher N, red. Vaccine protocols. Totowa, N.J: Human Press, 1996.
Znajdź pełny tekst źródłaKan, Jeff WT, i John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Pełny tekst źródłaHolzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.
Znajdź pełny tekst źródłaAmerican Telephone and Telegraph Company., red. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.
Znajdź pełny tekst źródłaCzęści książek na temat "Design of protocols"
Wilson, Greg. "Protocols". W Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Pełny tekst źródłaHyndman, David L., i Masato Mitsuhashi. "PCR Primer Design". W PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Pełny tekst źródłaHercog, Drago. "System Specification and Design". W Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Pełny tekst źródłaHercog, Drago. "Protocol Specification and Design". W Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Pełny tekst źródłaChoi, Joonwon, Adam Chlipala i Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols". W Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Pełny tekst źródłaKůr, Jiří, Václav Matyáš i Petr Švenda. "Evolutionary Design of Attack Strategies". W Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Pełny tekst źródłaŠvenda, Petr. "Evolutionary Design of Attack Strategies". W Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Pełny tekst źródłade Muro, Marilena Aquino. "Probe Design, Production, and Applications". W Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Pełny tekst źródłaSarkar, Mouli, i Naveen Kumar. "De Novo Peptide Design Tools". W Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Pełny tekst źródłaYu, Su-Yang, i Jeff Yan. "Security Design in Human Computation Games". W Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Pełny tekst źródłaStreszczenia konferencji na temat "Design of protocols"
De Marchi, Mirco, i Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols". W 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Pełny tekst źródłaDijk, Marten van, i Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". W Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Pełny tekst źródłaDijk, Marten van, i Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". W Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Pełny tekst źródłaChiu, I., i L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments". W ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Pełny tekst źródłaDong, Ling, Kefei Chen, Mi Wen i Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design". W Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Pełny tekst źródłada Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli i J. Rabaey. "Wireless protocols design". W the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Pełny tekst źródłaLubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway". W ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Pełny tekst źródłaKoh, Immanuel, Paul Keel i Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix". W CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Pełny tekst źródłaChiasserini, C. F., P. Nuggehalli i V. Srinivasan. "Energy-efficient communication protocols". W Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Pełny tekst źródłaHaeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger i Jane Burry. "Furniture Design Using Custom-Optimised Structural Nodes". W CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.
Pełny tekst źródłaRaporty organizacyjne na temat "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, listopad 2001. http://dx.doi.org/10.17487/rfc3117.
Pełny tekst źródłaAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, październik 1994. http://dx.doi.org/10.21236/ada290584.
Pełny tekst źródłaSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1996. http://dx.doi.org/10.21236/ada465132.
Pełny tekst źródłaSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2008. http://dx.doi.org/10.21236/ada484133.
Pełny tekst źródłaLebovitz, G., i M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, luty 2012. http://dx.doi.org/10.17487/rfc6518.
Pełny tekst źródłaGriffin, Timothy G., Aaron D. Jaggard i Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2004. http://dx.doi.org/10.21236/ada461910.
Pełny tekst źródłaHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), sierpień 2022. http://dx.doi.org/10.21079/11681/45100.
Pełny tekst źródłaAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, październik 1999. http://dx.doi.org/10.21236/ada370116.
Pełny tekst źródłaKrunz, Marwan, i Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, listopad 2013. http://dx.doi.org/10.21236/ada591559.
Pełny tekst źródłaAng, Chwee B., i Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, luty 2001. http://dx.doi.org/10.21236/ada405072.
Pełny tekst źródła