Livros sobre o tema "Analysis protocol"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Analysis protocol".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Wellington, N.Z: Ministry for the Environment, 2002.
Encontre o texto completo da fonteBurns, Kevin. TCP/IP analysis and troubleshooting toolkit. Indianapolis: Wiley Pub., 2003.
Encontre o texto completo da fonteHodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.
Encontre o texto completo da fonte1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1992.
Encontre o texto completo da fonte1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1985.
Encontre o texto completo da fonteBoyle, Robert J. Engineering analysis using a web-based protocol. Cleveland, Ohio: National Aeronautics and Space Administration, Glenn Research Center, 2002.
Encontre o texto completo da fonteK, Luke Nancy, e Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. Washington, DC: The Foundation, 1993.
Encontre o texto completo da fonteSong, Wei, Peijian Ju e A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.
Texto completo da fonteOntario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Toronto: Ministry of the Environment, Laboratory Services Branch, 2003.
Encontre o texto completo da fonteBaker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Monterey, Calif: Naval Postgraduate School, 1992.
Encontre o texto completo da fonteNetwork monitoring and analysis: A protocol approach to troubleshooting. Upper Saddle River, N.J: Prentice Hall PTR, 2000.
Encontre o texto completo da fonteOruk, Tufan. Simulation and analysis of a wireless MAC protocol: MACAW. Monterey, Calif: Naval Postgraduate School, 1996.
Encontre o texto completo da fonteVerbal protocol analysis in language testing research: A handbook. Cambridge [England]: Cambridge University Press, 1998.
Encontre o texto completo da fonte1964-, Luo Junyong, e Cai Yanrong 1966-, eds. Wang luo xie yi fen xi: Network protocol analysis. Beijing: Ji xie gong ye chu ban she, 2009.
Encontre o texto completo da fonteResearch Institute for Advanced Computer Science (U.S.), ed. Performance analysis of FDDI. [Moffett Field, Calif.]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1988.
Encontre o texto completo da fonteRunkle, James Reade. Guidelines and sample protocol for sampling forest gaps. [Portland, Or.]: U.S. Dept. of Agriculture, Forest Service, Pacific Northwest Research Station, 1992.
Encontre o texto completo da fonteBrian, Whetten, e United States. National Aeronautics and Space Administration., eds. The reliable multicast protocol application programming interface. [Washington, DC]: National Aeronautics and Space Administration, 1995.
Encontre o texto completo da fonteChris, Peredney, e Washington (State). Dept. of Ecology., eds. Nematode bioassay protocol for soil toxicity screening. Olympia, Wash: Washington State Dept. of Ecology, 2004.
Encontre o texto completo da fonteCenter, NASA Glenn Research, ed. Trade-off analysis report. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2000.
Encontre o texto completo da fonteCenter, NASA Glenn Research, ed. Trade-off analysis report. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2000.
Encontre o texto completo da fonteOntario. Ministry of Environment and Energy. Protocol for the sampling and analysis of industrial/municipal wastewater. [Toronto]: The Ministry, 1994.
Encontre o texto completo da fonteRoesner, Larry A. Improved protocol for classification and analysis of stormwater-borne solids. Alexandria, VA: WERF, Water Environment Research Foundation, 2007.
Encontre o texto completo da fonteRaiche, Carl A. A specification and analysis of the IEEE token ring protocol. Monterey, Calif: Naval Postgraduate School, 1989.
Encontre o texto completo da fonteChris, Peredney, e Washington (State). Dept. of Ecology., eds. Nematode bioassay protocol for soil toxicity screening. Olympia, Wash: Washington State Dept. of Ecology, 2004.
Encontre o texto completo da fonteGeoff, Pierce, Beusse Rick e United States. Environmental Protection Agency. Office of the Inspector General, eds. EPA needs an oversight program for protocol gases. Washington, D.C: U.S. Environmental Protection Agency, Office of Inspector General, 2009.
Encontre o texto completo da fonteMarland, Eric, Grant Domke, Jason Hoyle, Gregg Marland, Laurel Bates, Alex Helms, Benjamin Jones, Tamara Kowalczyk, Tatyana B. Ruseva e Celina Szymanski. Understanding and Analysis: The California Air Resources Board Forest Offset Protocol. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52434-4.
Texto completo da fonteGrossetete, Patrick. Global IPV6 strategies: From business analysis to operational planning. Indianapolis, IN: Cisco Press, 2008.
Encontre o texto completo da fonteIngels, Franklin M. Spacelab system analysis: The modified free access protocol : an access protocol for communication systems with periodic and poisson traffic. [Washington, DC: National Aeronautics and Space Administration, 1989.
Encontre o texto completo da fonteUnited States. Environmental Protection Agency. Office of Ground Water and Drinking Water., ed. Virus monitoring protocol for the information collection requirements rule. Cincinnati, OH (26 West Martin Luther King Drive): U.S. Environmental Protection Agency, 1995.
Encontre o texto completo da fonteL, Montgomery Todd, e United States. National Aeronautics and Space Administration., eds. Verification and validation of a reliable multicast protocol. [Washington, D.C.]: National Aeronautics and Space Administration, 1995.
Encontre o texto completo da fonteBangladesh. Dept. of Public Health Engineering., ed. Water quality monitoring and surveillance protocol for rural water supply system in Bangladesh. Dhaka: Dept. of Public Health Engineering, 2005.
Encontre o texto completo da fonteNegotiating the Kyoto Protocol: An analysis of negotiation dynamics in international negotiations. Münster: Lit, 2001.
Encontre o texto completo da fonteReese, William David. A technical review of cellular radio and analysis of a possible protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Encontre o texto completo da fonteJensen, Patricia B. Historical overview of data communication with analysis of a selective repeat protocol. Monterey, Calif: Naval Postgraduate School, 1992.
Encontre o texto completo da fonteArmed Forces Radiobiology Research Institute (U.S.), ed. Protocol for monitoring Gulf war veterans with imbedded depleted uranium fragments. Bethesda, Md: Armed Forces Radiobiology Research Institute, 1993.
Encontre o texto completo da fonteArmed Forces Radiobiology Research Institute (U.S.)., ed. Protocol for monitoring Gulf war veterans with imbedded depleted uranium fragments. Bethesda, Md: Armed Forces Radiobiology Research Institute, 1993.
Encontre o texto completo da fontePaul, Kathleen. Protocol analysis: Design verbalisations of year 9 pupils as data for cognitive mapping. Wolverhampton: University of Wolverhampton, 1993.
Encontre o texto completo da fonteArmando, Alessandro, e Gavin Lowe, eds. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5.
Texto completo da fonteOwens, Mark H. Development of VOST sample analysis protocol for water-soluble volatile POHCs and PICs. Research Triangle Park, NC: U.S. Environmental Protection Agency, Air and Energy Engineering Research Laboratory, 1987.
Encontre o texto completo da fonteGrace, Hall Mary, e United States. National Aeronautics and Space Administration., eds. Performance analysis of local area networks: Final report. [Santa Clara, Calif.]: Santa Clara University, Dept. of Electrical Engineering and Comuter [sic] Science, 1990.
Encontre o texto completo da fonteHein, Michael Scott. A swimming protocol for determination of individual anaerobicthreshold. Eugene: Microform Publications, College of Health, Physical Education and Recreation, University of Oregon, 1990.
Encontre o texto completo da fonteOffice, General Accounting. Climate change: Analysis of two studies of estimated costs of implementing the Kyoto Protocol. Washington, D.C: GAO, 2004.
Encontre o texto completo da fonteSimon, Herbert A., e K. Anders Ericsson. Protocol Analysis. The MIT Press, 1985.
Encontre o texto completo da fonteProtocol Analysis. 2a ed. WestNet Learning, 2001.
Encontre o texto completo da fonteAutomating Security Protocol Analysis. Storming Media, 2004.
Encontre o texto completo da fonteSecure Transaction Protocol Analysis. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85074-8.
Texto completo da fonteMobile Internet Protocol Analysis. Storming Media, 1999.
Encontre o texto completo da fonteGPRS - Signaling & Protocol Analysis. Artech House Publishers , 2002.
Encontre o texto completo da fonteChengqi Zhang,Shichao Zhang,Qingfeng Chen. Secure Transaction Protocol Analysis. Springer, 2009.
Encontre o texto completo da fonteTasaka, Shuji. Performance Analysis of Multiple Access Protocol. MIT Press, 2008.
Encontre o texto completo da fonte