Literatura científica selecionada sobre o tema "Conception de protocoles"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Conception de protocoles".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Conception de protocoles"
Alata, Eric, Vincent Nicomette, Julien Duch êne, Colas Le Guernic e Mohamed Kaaniche. "Outils pour la rétro-conception de protocoles. Analyse et classification". Techniques et sciences informatiques 35, n.º 6 (30 de dezembro de 2016): 609–40. http://dx.doi.org/10.3166/tsi.35.609-640.
Texto completo da fonteAmira, Derradji, e Verdier Christine. "Conception et évaluation d’un langage orienté patient pour la représentation de protocoles de soins". Ingénierie des systèmes d'information 21, n.º 2 (28 de abril de 2016): 123–46. http://dx.doi.org/10.3166/isi.21.2.123-146.
Texto completo da fonteMasbernat, Raphaël, Églantine Bigot-Doll, Maxime Fouillat, Elisabeth Sulmont, François Pacquelet, Antoine Chevalier, Naomi Pereira e Chloé Blanc. "Machines à voir, machines à penser : écosystème robotique situé pour la conception architecturale". SHS Web of Conferences 147 (2022): 06001. http://dx.doi.org/10.1051/shsconf/202214706001.
Texto completo da fonteCalixte, Xaviera, Karine Cuffi e Pierre Leclercq. "Mise en place d’un outil pédagogique de documentation du processus de conception architecturale". SHS Web of Conferences 147 (2022): 03002. http://dx.doi.org/10.1051/shsconf/202214703002.
Texto completo da fonteMonod-Ansaldi, Réjane, Michèle Prieur, Isabelle Arbez e Agnès Golay. "Étayer la conception de protocoles expérimentaux par des élèves de CM2 pour évaluer l’entrée d’eau dans la plante". RDST, n.º 12 (15 de novembro de 2015): 113–39. http://dx.doi.org/10.4000/rdst.1144.
Texto completo da fonteBennett, Fionn C. "Expliquer according to Jacques Derrida : explanation and critique". Recherches anglaises et nord-américaines 37, n.º 1 (2004): 137–49. http://dx.doi.org/10.3406/ranam.2004.1729.
Texto completo da fonteChazalon, Jean-François. "Approche du traitement non chirurgical des supraclusions par la technique des aligneurs : quels protocoles de traitement et comment optimiser les résultats cliniques ?" Revue d'Orthopédie Dento-Faciale 56, n.º 1 (fevereiro de 2022): 51–70. http://dx.doi.org/10.1051/odf/2022006.
Texto completo da fonteSoulez, Antonia. "Otto Neurath : la force d’une pensée constructiviste du possible contre le déclinisme". Les cercles viennois de l'entre-deux-guerres 94 (2022): 187–209. http://dx.doi.org/10.4000/11vee.
Texto completo da fonteMelançon, Benoît. "Pour une lecture sociale de la correspondance de Saint-Denys Garneau". Dossier 20, n.º 1 (29 de agosto de 2006): 96–106. http://dx.doi.org/10.7202/201142ar.
Texto completo da fonteHÉRODIN, F. "Problèmes éthiques posés par la recherche duale sur les cellules souches menée par le Service de santé des armées". Revue Médecine et Armées, Volume 43, Numéro 3 (1 de junho de 2015): 240–45. http://dx.doi.org/10.17184/eac.6882.
Texto completo da fonteTeses / dissertações sobre o assunto "Conception de protocoles"
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Texto completo da fonteSeinturier, Lionel. "Conception d'algorithmes répartis et de protocoles réseaux en approche objet". Phd thesis, Paris, CNAM, 1997. http://tel.archives-ouvertes.fr/tel-00439136.
Texto completo da fonteEtrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Texto completo da fonteThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
SANTOSO, HARRY. "Conception et evaluation de protocoles de communication a haut debit". Paris 6, 1993. http://www.theses.fr/1993PA066238.
Texto completo da fonteDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification". Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Texto completo da fonteThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Tanter, Éric. "Des protocoles de métaobjets aux noyaux versatiles pour la programmation par aspects". Nantes, 2004. http://www.theses.fr/2004NANT2075.
Texto completo da fonteBendedouch, Fethi. "Conception et realisation d'un systeme d'apprentissage des protocoles de communication assiste par ordinateur : simulation et analyse des protocoles". Toulouse 3, 1987. http://www.theses.fr/1987TOU30033.
Texto completo da fonteBendedouch, Fethi. "Conception et réalisation d'un système d'apprentissage des protocoles de communication assisté par ordinateur simulation et analyse des protocoles /". Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37602822c.
Texto completo da fonteSTEFFAN, LAURENT. "Conception et specification de protocoles de communication pour applications temps reel". Nantes, 1988. http://www.theses.fr/1988NANT2046.
Texto completo da fontePlainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Texto completo da fonteRelaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Livros sobre o assunto "Conception de protocoles"
Liljeroth, Pia. Rädsla inför förlossningen: Ett uppenbart kliniskt problem? : konstruktionen av förlossningsrädsla som medicinsk kategori. Åbo: Åbo Akademis förlag, 2009.
Encontre o texto completo da fonteQuirouette, R. L. Le mur à écran pare-pluie: Un protocole de mise en service. Ottawa, Ont: Société canadienne d'hypothèques et de logement, 1996.
Encontre o texto completo da fonteBellavance, English Lisa, ed. Combinatorial library methods and protocols. Totowa, N.J: Humana Press, 2002.
Encontre o texto completo da fonteWAHL, Sondi. Conception et Evaluation Protocole Rouhb: Conception et Evaluation de Protocole de Routage Ad Hoc. ISTE Editions Ltd., 2023.
Encontre o texto completo da fonteSpecial Edition Using SOAP. Que, 2001.
Encontre o texto completo da fonteGrijalba Carabali, Paola Andrea, Adriana Pérez Portocarrero, Jhon Fredy Salazar Riascos e Jorge Humberto Restrepo Zapata. Guía de protocolo del síndrome de pie diabético. Editorial Universidad Santiago de Cali, 2019. http://dx.doi.org/10.35985/9789585248403.
Texto completo da fonteFaúndez C., Jorge, Marlene Verónica González González, Patricio Parra Sanhueza e Juan Carlos Valencia Baier. Manual 38: Manual para la certificación sanitaria forestal. INFOR, 2001. http://dx.doi.org/10.52904/20.500.12220/6669.
Texto completo da fonteCatanesi, Cecilia Inés, e Egle Etel Villegas Castagnasso, eds. Elementos de Genética para estudiantes de Ciencias Biológicas. Editorial de la Universidad Nacional de La Plata (UNLP), 2021. http://dx.doi.org/10.35537/10915/129625.
Texto completo da fonteCustom CGI Scripting with Perl. John Wiley & Sons, 2001.
Encontre o texto completo da fonteHanegan, Kevin. Custom CGI Scripting with Perl. Wiley & Sons, Incorporated, John, 2002.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Conception de protocoles"
Bentley, Joseph. "Neurath’s Conception of Protocol Statements". In Logical Empiricism and Naturalism, 67–96. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29328-3_3.
Texto completo da fonteWoodland, Sarah, e Kamarra Bell-Wykes. "Culturally Led, Culturally Safe Performance Making". In First Nations Australian Theatre for Health Equity, 61–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65506-7_4.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Évaluation des performances du protocole pour des applications coopératives". In Conception et évaluation de protocole de routage ad hoc, 155–211. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch4.
Texto completo da fonteIsel, M. "Conception et réalisation des orthèses". In Orthèses De la Main et du Poignet. Protocoles De Rééducation, 29–37. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71185-5.00005-9.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Enjeux autour des communications ad hoc sur la route". In Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Intégration des composantes ad hoc dans une infrastructure globale". In Conception et évaluation de protocole de routage ad hoc, 249–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch6.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Approche fonctionnelle de conception de protocole". In Conception et évaluation de protocole de routage ad hoc, 17–80. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch2.
Texto completo da fonteBentley, Joseph. "Conceptions of Protocol Sentences in Neurath and Carnap and the Bipartite Metatheory Conception". In Ways of the Scientific World-Conception. Rudolf Carnap and Otto Neurath, 152–79. BRILL, 2024. http://dx.doi.org/10.1163/9789004680203_008.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Modèle formel pour l’analyse de propriétés du protocole". In Conception et évaluation de protocole de routage ad hoc, 213–47. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch5.
Texto completo da fonteWAHL, Martine, e Patrick SONDI. "Modèles et simulations pour l’analyse de performance". In Conception et évaluation de protocole de routage ad hoc, 81–153. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Conception de protocoles"
Frikha, Mounir, e Jamila Ben Slimane. "Conception and simulation of energy-efficient AODV protocol in ad hoc networks". In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292343.
Texto completo da fonteDel Junco González, Juan José. "Conexiones disciplinarias en una práctica "mestiza”. El caso de la “ornitología emocional”". In V Congreso Internacional de Investigacion en Artes Visuales ANIAV 2022. RE/DES Conectar. València: Editorial Universitat Politècnica de València, 2022. http://dx.doi.org/10.4995/aniav2022.2022.15501.
Texto completo da fonteMichaud, Martin, Daniel Forgues, Julien Meyer e Claudiane Ouellet- Plamondon. "A Case Study on Improving Standardization in the Conception Phase by Developing Tools and Protocols". In 27th Annual Conference of the International Group for Lean Construction (IGLC). International Group for Lean Construction, 2019. http://dx.doi.org/10.24928/2019/0176.
Texto completo da fonteFlorensa Ferrando, Ignasi, Iria Fraga Rivas e Víctor Martínez Junza. "Mathematics education in engineering: a triple discontinuity?" In SEFI 50th Annual conference of The European Society for Engineering Education. Barcelona: Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788412322262.1144.
Texto completo da fonteMauricio, María Dolores, Eva Serna, Soraya Lilian Vallés, Martín Aldasoro e José María Vila. "Aprendiendo de forma cooperativa a través del método científico". In In-Red 2016 - Congreso de Innovación Educativa y Docencia en Red de la Universitat Politècnica de València. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/inred2016.2016.4289.
Texto completo da fonteSouza, Wander Pereira de, Artur de Souza Moret, Sandro Adalberto, Gleimiria Batista da Costa Matos, Haroldo de Sá Medeiros e Dércio Bernardes de Souza. "Sustainable tourism and public policies in the Amazon: Scientific invisibility". In III SEVEN INTERNATIONAL MULTIDISCIPLINARY CONGRESS. Seven Congress, 2023. http://dx.doi.org/10.56238/seveniiimulti2023-220.
Texto completo da fonteCaballero, Victor, David Vernet, Agustín Zaballos e Guiomar Corral. "Web of Energy: hacia la integración inteligente para las redes de sensores en Smart Grids". In XIII Jornadas de Ingenieria Telematica - JITEL2017. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6499.
Texto completo da fonteLuca, Andreea iuliana, e Ioana roxana Podina. "ETHIC MODELS SHAPING (IM)MORAL IDENTITY IN (POST)PANDEMIC TIMES: A PROPOSAL FOR A LONGITUDINAL STUDY PROTOCOL". In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-176.
Texto completo da fonteMarín Ramos, Ruben. "En el Parque". In II Congreso Internacional Estéticas Híbridas de la Imagen en Movimiento: Identidad y Patrimonio. Valencia: Universitat Politàcnica de València, 2021. http://dx.doi.org/10.4995/eshid2021.2021.13240.
Texto completo da fonteAparicio Pico, Lilia Edith, e Patrick Francois Tarquino Aparicio. "TELESALUD UN MODELO DE CONVERGENCIA ENTRE TECNOLOGÍA, MEDICINA Y EDUCACIÓN". In La formación de ingenieros: un compromiso para el desarrollo y la sostenibilidad. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2020. http://dx.doi.org/10.26507/ponencia.813.
Texto completo da fonteRelatórios de organizações sobre o assunto "Conception de protocoles"
Wolfenson, David, William W. Thatcher e James E. Kinder. Regulation of LH Secretion in the Periovulatory Period as a Strategy to Enhance Ovarian Function and Fertility in Dairy and Beef Cows. United States Department of Agriculture, dezembro de 2003. http://dx.doi.org/10.32747/2003.7586458.bard.
Texto completo da fonteOsejo, Alejandra, Ana María Garrido, Juana Alvarez, Santiago Martínez, Diana Lara, Omar Ruiz e Bernardo Posada. Guía para la caracterización de la gobernanza en paisajes rurales. Editado por Alejandra Osejo. Instituto de Investigación de Recursos Biológicos Alexander von Humboldt, dezembro de 2019. http://dx.doi.org/10.21068/cssbgobernanza2019.
Texto completo da fonteBritt, Jack, Miriam Rosenberg, Steven Washburn e Moshe Kaim. Development and Evaluation of a Method of Hormonal Treatment to Increase Fertility in Dairy Cows. United States Department of Agriculture, dezembro de 1995. http://dx.doi.org/10.32747/1995.7612833.bard.
Texto completo da fonte