Gotowa bibliografia na temat „Protocoles de communications”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Protocoles de communications”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Protocoles de communications"
Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He i Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management". Systems 11, nr 7 (24.06.2023): 322. http://dx.doi.org/10.3390/systems11070322.
Pełny tekst źródłaSangam, Sahana V., Sahana S. Kulkarni i Asst Prof Chaitanya K. Jambotkar. "Smart Grid Communication Protocols". International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (28.02.2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.
Pełny tekst źródłaBoeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif i Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed". Energies 17, nr 2 (11.01.2024): 373. http://dx.doi.org/10.3390/en17020373.
Pełny tekst źródłaGee, K. "Communications network protocols". Computer Communications 8, nr 5 (październik 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.
Pełny tekst źródłaGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, nr 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.
Pełny tekst źródłaGossner, Olivier. "Protocoles de communication robustes". Revue économique 48, nr 3 (maj 1997): 685. http://dx.doi.org/10.2307/3502853.
Pełny tekst źródłaGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, nr 3 (1.05.1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.
Pełny tekst źródłaSuleman, Danladi, Rania Shibl i Keyvan Ansari. "Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions". Smart Cities 6, nr 5 (6.10.2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.
Pełny tekst źródłaSingh, Rameshwar, i Prof Gayatri Bhoyar. "Green Communications Using Ambient Backscattered: The Review Paper". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.
Pełny tekst źródłaBoczkowski, Lucas, Iordanis Kerenidis i Frédéric Magniez. "Streaming Communication Protocols". ACM Transactions on Computation Theory 10, nr 4 (17.10.2018): 1–21. http://dx.doi.org/10.1145/3276748.
Pełny tekst źródłaRozprawy doktorskie na temat "Protocoles de communications"
Gerault, David. "Security analysis of contactless communication protocols". Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Pełny tekst źródłaMoulierac, Joanna. "Agrégation des communications multicast". Rennes 1, 2006. http://www.theses.fr/2006REN1S151.
Pełny tekst źródłaMoulierac, Joanna Rubino Gerardo. "Agrégation des communications multicast". [S.l.] : [s.n.], 2006. ftp://ftp.irisa.fr/techreports/theses/2006/moulierac.pdf.
Pełny tekst źródłaArnal, Fabrice. "Optimisation de la fiabilité pour des communications multipoints par satellite géostationnaire". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00001160.
Pełny tekst źródłaMota, Gonzalez Sara del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse, INPT, 2008. http://ethesis.inp-toulouse.fr/archive/00000628/.
Pełny tekst źródłaSystems that implement communications in the form of group multicast have increasingly raised security problems. The protection mechanisms applied to that communication rely on symmetrical and asymmetrical key exchanges, and the way these mechanisms are selected does influence the system’s efficiency. Following an in depth analysis of the needs captured by these systems, we defined a model for representing the dynamics of groups, as well as communication among group members. We defined one system architecture which focuses on key creation, exchange and management functions. The system was modeled in UML 2. 0 and checked against security and temporal properties. The approach we followed to investigate temporal requirements may be extended to a broad variety of distributed systems
Mota, Gonzalez Sara Del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2008. http://tel.archives-ouvertes.fr/tel-00309824.
Pełny tekst źródłaMota, Gonzalez Sara del Socorro Villemur Thierry Diaz Michel. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse : INP Toulouse, 2008. http://ethesis.inp-toulouse.fr/archive/00000628.
Pełny tekst źródłaTourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil". Nice, 2008. http://www.theses.fr/2008NICE4006.
Pełny tekst źródłaCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Guitton, Alexandre. "Communications multicast : contributions aux réseaux optiques et au passage à l'échelle". Rennes 1, 2005. https://hal-clermont-univ.archives-ouvertes.fr/tel-01448117.
Pełny tekst źródłaGuitton, Alexandre Marie Raymond Molnár Miklós. "Communications multicast contributions aux réseaux optiques et au passage à l'échelle /". [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/guitton.pdf.
Pełny tekst źródłaKsiążki na temat "Protocoles de communications"
Bulbrook, Dale. WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.
Znajdź pełny tekst źródłaHalsall, Fred. Introduction to data communications and computer networks. Wokingham, England: Addison-Wesley, 1985.
Znajdź pełny tekst źródłaHalsall, Fred. Data communications, computer networks, and OSI. Wyd. 2. Wokingham, England: Addison-Wesley, 1988.
Znajdź pełny tekst źródłaStevens, W. Richard. UNIX network programming: Interprocess communications. Wyd. 2. Noida (IN): Addison Wesley Longman Singapore Pte. Ltd., 1999.
Znajdź pełny tekst źródłaStallings, William. Data and Computer Communications. Wyd. 5. Upper Saddle River, N.J: Prentice Hall, 1997.
Znajdź pełny tekst źródłaStallings, William. Data and computer communications. Wyd. 3. Cowley: Maxwell Macmillan, 1991.
Znajdź pełny tekst źródłaWilliam, Stallings. Data and computer communications. Wyd. 8. Upper Saddle River, N.J: Pearson/Prentice Hall, 2007.
Znajdź pełny tekst źródłaStallings, William. Data and computer communications. Wyd. 2. New York: Macmillan Pub. Co., 1988.
Znajdź pełny tekst źródłaStallings, William. Data and computer communications. Wyd. 3. New York: Macmillan Pub. Co., 1991.
Znajdź pełny tekst źródłaWilliam, Stallings. Data and computer communications. New York: Macmillan Pub. Co., 1985.
Znajdź pełny tekst źródłaCzęści książek na temat "Protocoles de communications"
Hercog, Drago. "Communication Service, Communication Protocol". W Communication Protocols, 45–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_4.
Pełny tekst źródłaJaved, Adeel. "Communication Protocols". W Building Arduino Projects for the Internet of Things, 35–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1940-9_3.
Pełny tekst źródłaSuhonen, Jukka, Mikko Kohvakka, Ville Kaseva, Timo D. Hämäläinen i Marko Hännikäinen. "Communication Protocols". W Low-Power Wireless Sensor Networks, 27–41. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2173-3_4.
Pełny tekst źródłaSubero, Armstrong. "Communication Protocols". W Programming Microcontrollers with Python, 185–208. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7058-5_7.
Pełny tekst źródłaĎud’ák, Juraj, i Gabriel Gaspar. "Communication Protocols". W Signals and Communication Technology, 1–76. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-30152-0_1.
Pełny tekst źródłaKanagachidambaresan, G. R., i Bharathi N. "Communication Protocols". W Sensors and Protocols for Industry 4.0, 73–112. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9007-1_3.
Pełny tekst źródłaYang, Ke, Meihua Xiao, Zifan Song i Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System". W Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Pełny tekst źródłaQin, Xudong, Yuxin Deng i Wenjie Du. "Verifying Quantum Communication Protocols with Ground Bisimulation". W Tools and Algorithms for the Construction and Analysis of Systems, 21–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_2.
Pełny tekst źródłaCowley, John. "Network Protocols". W Communications and Networking, 81–109. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_6.
Pełny tekst źródłaHercog, Drago. "Communication Protocol Performance". W Communication Protocols, 83–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_6.
Pełny tekst źródłaStreszczenia konferencji na temat "Protocoles de communications"
Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri i Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things". W Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Pełny tekst źródłaTan, Yang, i Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". W 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Pełny tekst źródłaGeromel, Paulo A., i Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet". W Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.
Pełny tekst źródłaCruz, Tiago Rodrigo, Gustavo Cainelli, Max Feldman i Ivan Muller. "Towards handover in IWN: a fast data collection technique". W Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1172.
Pełny tekst źródłaLivesey, Joseph, i Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Pełny tekst źródłaBarcelos, Patrícia Pitthan A., Taisy Silva Weber i Roberto Jung Drebes. "Um Toolkit para Avaliação da Intrusão de Métodos de Injeção de Falhas". W Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/wtf.2002.23398.
Pełny tekst źródłaFritzke Jr., Udo, Luiz Alberto F. Gomes, Denis L. Silva i Daniel M. Morais. "A Meta Protocol for Adaptable Mobile Replicated Databases". W Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23247.
Pełny tekst źródłaLi, Kuang-Yu J., i B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems". W Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.
Pełny tekst źródłaPauli, Joakim. "Service Oriented Vehicle Diagnostic Communication and Regulations". W Automotive Technical Papers. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-5050.
Pełny tekst źródłaTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol". W 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Pełny tekst źródłaRaporty organizacyjne na temat "Protocoles de communications"
Brooks, Richard R. Detecting Hidden Communications Protocols. Fort Belvoir, VA: Defense Technical Information Center, luty 2013. http://dx.doi.org/10.21236/ada581858.
Pełny tekst źródłaAdler, Micah, i Bruce M. Maggs. Protocols for Asymetric Communication Channels. Fort Belvoir, VA: Defense Technical Information Center, grudzień 1997. http://dx.doi.org/10.21236/ada333259.
Pełny tekst źródłaCarroll, J. Ritchie, i F. Russell Robertson. A COMPARISON OF PHASOR COMMUNICATIONS PROTOCOLS. Office of Scientific and Technical Information (OSTI), marzec 2019. http://dx.doi.org/10.2172/1504742.
Pełny tekst źródłaP., R., P. A., P. Sijben, S. Brim i M. Shore. Middlebox Communications (midcom) Protocol Requirements. RFC Editor, sierpień 2002. http://dx.doi.org/10.17487/rfc3304.
Pełny tekst źródłaStiemerling, M., J. Quittek i T. Taylor. Middlebox Communications (MIDCOM) Protocol Semantics. RFC Editor, luty 2005. http://dx.doi.org/10.17487/rfc3989.
Pełny tekst źródłaBarnes, M., red. Middlebox Communications (MIDCOM) Protocol Evaluation. RFC Editor, czerwiec 2005. http://dx.doi.org/10.17487/rfc4097.
Pełny tekst źródłaLiu, Ming T. Protocol Engineering for Multimedia Communications. Fort Belvoir, VA: Defense Technical Information Center, październik 1995. http://dx.doi.org/10.21236/ada305077.
Pełny tekst źródłaEspinoza, J., P. Sholander i B, Van Leeuwen. Effective Protocols for Mobile Communications and Networking. Office of Scientific and Technical Information (OSTI), grudzień 1998. http://dx.doi.org/10.2172/2758.
Pełny tekst źródłaMoser, Louise E., i P. M. Melliar-Smith. Secure Multicast Protocols for Group Communication. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2001. http://dx.doi.org/10.21236/ada388045.
Pełny tekst źródłaAwerbuch, Baruch, Alan Baratz i David Peleg. Cost-Sensitive Analysis of Communication Protocols. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1991. http://dx.doi.org/10.21236/ada237356.
Pełny tekst źródła