Literatura científica selecionada sobre o tema "Design of protocols"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Design of protocols".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang e Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms". International Journal of Applied Evolutionary Computation 1, n.º 1 (janeiro de 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Texto completo da fonteYu, Song Sen, Yun Peng e Jia Jing Zhang. "A Lightweight RFID Mechanism Design". Advanced Materials Research 216 (março de 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Texto completo da fonteTurilli, Matteo. "Ethical protocols design". Ethics and Information Technology 9, n.º 1 (8 de fevereiro de 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Texto completo da fonteSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. "Practice and Consideration of Master Protocol in Clinical Trials". Tumor Discovery 2, n.º 2 (28 de abril de 2023): 342. http://dx.doi.org/10.36922/td.342.
Texto completo da fonteNguyen, Philon, Thanh An Nguyen e Yong Zeng. "Segmentation of design protocol using EEG". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, n.º 1 (3 de abril de 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Texto completo da fonteHe, Jiayue, Jennifer Rexford e Mung Chiang. "Don't optimize existing protocols, design optimizable protocols". ACM SIGCOMM Computer Communication Review 37, n.º 3 (20 de julho de 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Texto completo da fonteN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Texto completo da fonteSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo e Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things". Information 12, n.º 8 (22 de julho de 2021): 292. http://dx.doi.org/10.3390/info12080292.
Texto completo da fonteAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges". Journal of Marine Science and Engineering 9, n.º 7 (4 de julho de 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Texto completo da fonteHayam A. Al-Yasiri e Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator". Diyala Journal of Engineering Sciences 7, n.º 4 (1 de dezembro de 2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Texto completo da fonteTeses / dissertações sobre o assunto "Design of protocols"
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Texto completo da fonteThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Texto completo da fonteMüffke, Friedger. "A better way to design communication protocols". Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Texto completo da fonteHoran, Stephen, e Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Texto completo da fonteThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols". Thesis, Queensland University of Technology, 2001.
Encontre o texto completo da fonteRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Texto completo da fonteWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach". Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Texto completo da fonteLiu, Changlei, e 劉長雷. "Bluetooth network design". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Texto completo da fonteShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Texto completo da fonteSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /". The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Texto completo da fonteLivros sobre o assunto "Design of protocols"
name, No. Vaccine protocols. 2a ed. Totowa, NJ: Humana Press, 2003.
Encontre o texto completo da fonteAndrew, Robinson, Cranage Martin P e Hudson Michael, eds. Vaccine protocols. 2a ed. Totowa, N.J: Humana Press, 2003.
Encontre o texto completo da fonteL, Hammond Joseph, e Pawlikowski Krzysztof, eds. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.
Encontre o texto completo da fonteSharp, Robin. Principles of protocol design. Berlin: Springer, 2010.
Encontre o texto completo da fonteEhud, Gazit, e Nussinov Ruth, eds. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.
Encontre o texto completo da fonteLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Encontre o texto completo da fonte1947-, Robinson Andrew, Farrar Graham H e Wiblin Christopher N, eds. Vaccine protocols. Totowa, N.J: Human Press, 1996.
Encontre o texto completo da fonteKan, Jeff WT, e John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Texto completo da fonteHolzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.
Encontre o texto completo da fonteAmerican Telephone and Telegraph Company., ed. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Design of protocols"
Wilson, Greg. "Protocols". In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Texto completo da fonteHyndman, David L., e Masato Mitsuhashi. "PCR Primer Design". In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Texto completo da fonteHercog, Drago. "System Specification and Design". In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Texto completo da fonteHercog, Drago. "Protocol Specification and Design". In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Texto completo da fonteChoi, Joonwon, Adam Chlipala e Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols". In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Texto completo da fonteKůr, Jiří, Václav Matyáš e Petr Švenda. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Texto completo da fonteŠvenda, Petr. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Texto completo da fontede Muro, Marilena Aquino. "Probe Design, Production, and Applications". In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Texto completo da fonteSarkar, Mouli, e Naveen Kumar. "De Novo Peptide Design Tools". In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Texto completo da fonteYu, Su-Yang, e Jeff Yan. "Security Design in Human Computation Games". In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Design of protocols"
De Marchi, Mirco, e Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols". In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Texto completo da fonteDijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Texto completo da fonteDijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Texto completo da fonteChiu, I., e L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments". In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Texto completo da fonteDong, Ling, Kefei Chen, Mi Wen e Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design". In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Texto completo da fonteda Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli e J. Rabaey. "Wireless protocols design". In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Texto completo da fonteLubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway". In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Texto completo da fonteKoh, Immanuel, Paul Keel e Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Texto completo da fonteChiasserini, C. F., P. Nuggehalli e V. Srinivasan. "Energy-efficient communication protocols". In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Texto completo da fonteHaeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger e Jane Burry. "Furniture Design Using Custom-Optimised Structural Nodes". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.
Texto completo da fonteRelatórios de organizações sobre o assunto "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, novembro de 2001. http://dx.doi.org/10.17487/rfc3117.
Texto completo da fonteAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, outubro de 1994. http://dx.doi.org/10.21236/ada290584.
Texto completo da fonteSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1996. http://dx.doi.org/10.21236/ada465132.
Texto completo da fonteSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, julho de 2008. http://dx.doi.org/10.21236/ada484133.
Texto completo da fonteLebovitz, G., e M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, fevereiro de 2012. http://dx.doi.org/10.17487/rfc6518.
Texto completo da fonteGriffin, Timothy G., Aaron D. Jaggard e Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, abril de 2004. http://dx.doi.org/10.21236/ada461910.
Texto completo da fonteHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), agosto de 2022. http://dx.doi.org/10.21079/11681/45100.
Texto completo da fonteAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, outubro de 1999. http://dx.doi.org/10.21236/ada370116.
Texto completo da fonteKrunz, Marwan, e Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, novembro de 2013. http://dx.doi.org/10.21236/ada591559.
Texto completo da fonteAng, Chwee B., e Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2001. http://dx.doi.org/10.21236/ada405072.
Texto completo da fonte