Literatura científica selecionada sobre o tema "Design of protocols"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Design of protocols".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Design of protocols"

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang e Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms". International Journal of Applied Evolutionary Computation 1, n.º 1 (janeiro de 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Texto completo da fonte
Resumo:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self Evolvable Transaction Protocol (SETP) with a GA executor embedded. We then use the Network Simulator (NS2) to evaluate this evolvable protocol module to demonstrate the feasibility of our new design approach.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Yu, Song Sen, Yun Peng e Jia Jing Zhang. "A Lightweight RFID Mechanism Design". Advanced Materials Research 216 (março de 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Texto completo da fonte
Resumo:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Turilli, Matteo. "Ethical protocols design". Ethics and Information Technology 9, n.º 1 (8 de fevereiro de 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Song, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. "Practice and Consideration of Master Protocol in Clinical Trials". Tumor Discovery 2, n.º 2 (28 de abril de 2023): 342. http://dx.doi.org/10.36922/td.342.

Texto completo da fonte
Resumo:
There is great interest in accelerating late-stage therapy development by efficiently performing a trial design with multiple therapies or multiple subpopulations simultaneously under a single protocol. The master protocols are termed to describe the design of such trials, with a variety of terms such as umbrella, basket, or platform describing specific designs, which are, in contrast to the traditional trial designs, full of complexity. What should we consider in designing a trial ensuring the safety of human subjects and demonstrating the efficacy of new therapy? This paper overviews the master protocol framework, comprehensively unifies the definitions and illustrates essential design elements of representative example trials conducted in drugs and medical devices. Besides, to understand the master protocols deeply, it is also a need to summarize the commonly-used types of master protocols in various disease and treatment fields, along with the reasons for these phenomena by analyzing the characteristics of the diseases, the mechanism of therapeutic products, and the principles of various types of master protocols. Finally, we also propose practical considerations, including the design, ethical, statistics, and funding considerations that arise from implementing complex master protocols to help practitioners better design and identify potential valuable therapies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Nguyen, Philon, Thanh An Nguyen e Yong Zeng. "Segmentation of design protocol using EEG". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, n.º 1 (3 de abril de 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Texto completo da fonte
Resumo:
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistance in solving this problem. Such problems are typical inverse problems that occur in the line of research. A thought process needs to be reconstructed from its output, an EEG signal. We propose an EEG-based method for design protocol coding and segmentation. We provide experimental validation of our methods and compare manual segmentation by domain experts to algorithmic segmentation using EEG. The best performing automated segmentation method (when manual segmentation is the baseline) is found to have an average deviation from manual segmentations of 2 s. Furthermore, EEG-based segmentation can identify cognitive structures that simple observation of design protocols cannot. EEG-based segmentation does not replace complex domain expert segmentation but rather complements it. Techniques such as verbal protocols are known to fail in some circumstances. EEG-based segmentation has the added feature that it is fully automated and can be readily integrated in engineering systems and subsystems. It is effectively a window into the mind.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

He, Jiayue, Jennifer Rexford e Mung Chiang. "Don't optimize existing protocols, design optimizable protocols". ACM SIGCOMM Computer Communication Review 37, n.º 3 (20 de julho de 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

N, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.

Texto completo da fonte
Resumo:
Abstract: The present modern bus protocols used for communication between different functional blocks on a System-on-Chip (Soc) designs face many different challenges among which complexity and communication management are the most important factors. These on-chip communications directly impact performance and functionality, hence depending on the application where the bus protocol is to be used, a perfect communication protocol is chosen. AMBA (Advanced Microcontroller Bus Architecture) provides various types of protocols to be used as IP, of which AXI4 (Advance Extensible Interface), is one of the widely used protocols for SoC designs. Out of its three different interconnect protocols: lite, stream and burst, AXI4-lite has the simplest architecture design that best suits to be used in applications where power, area and performance play a vital role. This paper briefs about using AMBA AXI4-lite bus protocol with more bus efficiency and performance in an SoC design for proper communication between various functional blocks present. The RTL is verified using UVM (Universal Verification Methodology) and various designing process is carried out using cadence tools.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo e Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things". Information 12, n.º 8 (22 de julho de 2021): 292. http://dx.doi.org/10.3390/info12080292.

Texto completo da fonte
Resumo:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of the key technologies for the Internet of Things. The identified autonomic properties are self-organization, self-optimization, and self-protection. We review some protocols with the objective of energy consumption reduction and energy harvesting awareness, as it can support the self-energy-awareness property. As the result, the protocol designs are mapped according to each autonomic property supported, including protocols for MAC layer, protocols for clustering, protocols for routing, and protocols for security. This can be used to map the advances of communication protocol research for the autonomic Internet of Things and to identify the opportunities for future research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges". Journal of Marine Science and Engineering 9, n.º 7 (4 de julho de 2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Texto completo da fonte
Resumo:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Hayam A. Al-Yasiri e Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator". Diyala Journal of Engineering Sciences 7, n.º 4 (1 de dezembro de 2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.

Texto completo da fonte
Resumo:
The Rapid progress in communications and wireless technology, especially in mobile computing, resulted in wide area of development in design, control and simulation of protocols that manage the wireless network. In this paper, a software simulator package has been designed, implemented and analyzed to simulate Internet Mobile Host Protocol (IMHP), Multicast Routing Protocol (MRP) and Handoff operation, which feature both route optimization and integrated authentication of all management packets.The simulator coverage area includes three extendable subnets (LANs) with ten mobile hosts moving either randomly or manually over the network. The moving hosts have the ability of entering or leaving the network at any time. The designed simulator simulates all the predicted events that practically associated with mobile computing operation. In addition, the simulator stands for other events such as the rebooting or crashing in the network elements.The simulated protocols are tested in terms of the speed of implementation, which computed throughout the designed simulator operation for both IMHP and MRP protocols. Also the effect of Handoff process on the mobile protocols implementation has been tested. The obtained results showed that the short cut route exhibits the fastest speed of implementation. Visual Basic programming language has been used in the design of this simulator.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Design of protocols"

1

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Texto completo da fonte
Resumo:
Thesis (M.S.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Texto completo da fonte
Resumo:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagrams to a group of interested receivers in one transmission.Core-based trees major concerns are core selection and core as single point of failure.The problem of core selection is to choose the best core or cores in the network toimprove the network performance.In this dissertation we propose 1) a multiple core selection approach for core-based tree multicasting, senders can select different cores to have an efficient loadbalanced multicore multicasting. It will overcome any core failure as well. 2) Novel andefficient schemes for load shared multicore multicasting are presented. Multiple coresare selected statically, that is, independent of any existing multicast groups and also theselection process is independent of any underlying unicast protocol. Some of theselected cores can be used for fault- tolerant purpose also to guard against any possible core failures. 3) We have presented two novel and efficient schemes forgroup-based load shared multicore multicasting in which members of a multicast groupuse the same core tree for their multicasting. 4) We also presented two schemes aim atachieving low latency multicasting along with load sharing for delay sensitive multicastapplications. Besides, we have presented a unique approach for core migration, whichuses two very important parameters, namely, depth of a core tree and pseudo diameterof a core. One noteworthy point from the viewpoint of fault tolerance is that the degreeof fault-tolerance can be enhanced from covering single point-failure to any number ofcore failures.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Müffke, Friedger. "A better way to design communication protocols". Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Horan, Stephen, e Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.

Texto completo da fonte
Resumo:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
The design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols". Thesis, Queensland University of Technology, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Rouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.

Texto completo da fonte
Resumo:
Avec l’essor de l'Industrie 4.0, de nombreuses infrastructures ont été contraintes d’ouvrir leurs réseaux à Internet, principalement pour répondre au besoin croissant de supervision et de contrôle à distance. Mais là où ces infrastructures étaient auparavant isolées, épargnées par les menaces extérieures, leur ouverture a provoqué l’émergence de nouveaux risques, en particulier à travers le réseau, potentiellement sérieux et qui ne sont pas couverts.Les solutions de cybersécurité, comme les pare-feux, les systèmes de détection d’intrusion ou les systèmes de protection contre les intrusions, sont couramment utilisés pour répondre aux préoccupations liées à la cybersécurité des infrastructures industrielles. Cependant, la tendance à se fier aux systèmes logiciels pour assurer la protection du réseau a mis en lumière les vulnérabilités de ces systèmes, en raison de leurs implémentations logicielles inhérentes. En outre, l’industrie est liée à ses propres spécificités (faible latence, support de protocoles réseaux spécifiques), qui sont rarement couvertes par les solutions informatiques communes.L’objectif principal de cette thèse est d’étudier l’utilisation de dispositifs FPGA appliqués à la cybersécurité pour les réseaux industriels, soit comme support pour des applications de sécurité logicielle, soit pour effectuer des opérations critiques d’analyse réseau. Ce travail présente d’abord le contexte industriel, avec les systèmes de contrôle, leurs architectures, leurs besoins, les règles de mise en œuvre, les protocoles spécifiques et donne également deux exemples de systèmes de contrôle comme on peut en trouver dans l’industrie. Il met ensuite en lumière les problèmes de sécurité, avec une description des menaces les plus courantes, des études de cas sur leurs applications et leurs impacts dans un système de contrôle, et des discussions sur les contre-mesures de pointe disponibles sur le marché. Suite à l'établissement d'une cible de sécurité, nous mettrons en évidence la vulnérabilité des éléments logiciels et des systèmes d’exploitation. Nous verrons aussi comment l’absence d’analyse de sécurité tenant compte de l’état des processus peut mener à certaines vulnérabilités.Pour pallier à ces problèmes, nous proposons, par une première contribution, de renforcer la sécurité des systèmes logiciels en tirant parti des mécanismes de protection existants du FPGA. Enfin, pour répondre à des menaces applicatives spécifiques, nous proposons la mise en œuvre d’une architecture de reconnaissance de motifs, sur FPGA, prenant en considération le cadre temporel et l'état du procédé industriel. Cette thèse a été réalisée en collaboration avec le Laboratoire d'Informatique, de Robotique et de Microélectronique de Montpellier (LIRMM) et la société SECLAB
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach". Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.

Texto completo da fonte
Resumo:
This thesis presents Algorithmic State Machine (ASM) designs that follow the One Cycle Demand Driven Convention (OCDDC) of three cryptographic protocols: Secure Distributed Multiplication (SDM), Pi Secure Distributed Multiplication (PiSDM, or secure distributed multiplication of a sequence), and Secure Comparison (SC), all of which achieve maximum throughput of 1/32, 1/(32(l - 1)), and 1/(32(l - 1)), respectively, for l-bit numbers. In addition, these protocols where implemented in VHDL and tested using ModelSim-Altera, verifying their correct functionality. Noting that the difference between a scheme and a protocol is that protocols involve message exchanging between two or more parties, to the author's knowledge, these hardware designs are the first ever implementations of any kind of cryptographic protocol, and because of that reason, a general method is proposed to implement protocols in hardware. The SC protocol implementation is also shown to have a 300,000+ speed up over its Python implementation counterpart.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Liu, Changlei, e 劉長雷. "Bluetooth network design". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Shen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Subramanian, Srividhya. "Design and verification of secure E-commerce protocols /". The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Design of protocols"

1

name, No. Vaccine protocols. 2a ed. Totowa, NJ: Humana Press, 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Andrew, Robinson, Cranage Martin P e Hudson Michael, eds. Vaccine protocols. 2a ed. Totowa, N.J: Humana Press, 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

L, Hammond Joseph, e Pawlikowski Krzysztof, eds. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Sharp, Robin. Principles of protocol design. Berlin: Springer, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ehud, Gazit, e Nussinov Ruth, eds. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

1947-, Robinson Andrew, Farrar Graham H e Wiblin Christopher N, eds. Vaccine protocols. Totowa, N.J: Human Press, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kan, Jeff WT, e John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Holzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

American Telephone and Telegraph Company., ed. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Design of protocols"

1

Wilson, Greg. "Protocols". In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Hyndman, David L., e Masato Mitsuhashi. "PCR Primer Design". In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hercog, Drago. "System Specification and Design". In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hercog, Drago. "Protocol Specification and Design". In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Choi, Joonwon, Adam Chlipala e Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols". In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.

Texto completo da fonte
Resumo:
AbstractCache-coherence protocols have been one of the greatest challenges in formal verification of hardware, due to their central complication of executing multiple memory-access transactions concurrently within a distributed message-passing system. In this paper, we introduce Hemiola, a framework embedded in Coq that guides the user to design protocols that never experience inconsistent interleavings while handling transactions concurrently. The framework provides a DSL, where any protocol designed in the DSL always satisfies the serializability property, allowing a user to verify the protocol assuming that transactions are executed one-at-a-time. Hemiola also provides a novel invariant proof method, for protocols designed in Hemiola, that only requires considering execution histories without interleaved memory accesses. We used Hemiola to design and prove hierarchical MSI and MESI protocols as case studies. We also demonstrated that the case-study protocols are hardware-synthesizable, by using a compilation/synthesis toolchain targeting FPGAs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kůr, Jiří, Václav Matyáš e Petr Švenda. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Švenda, Petr. "Evolutionary Design of Attack Strategies". In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

de Muro, Marilena Aquino. "Probe Design, Production, and Applications". In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Sarkar, Mouli, e Naveen Kumar. "De Novo Peptide Design Tools". In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Yu, Su-Yang, e Jeff Yan. "Security Design in Human Computation Games". In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Design of protocols"

1

De Marchi, Mirco, e Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols". In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Dijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Dijk, Marten van, e Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures". In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Chiu, I., e L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments". In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.

Texto completo da fonte
Resumo:
Contradictory results of a recent design stimulation and creativity experiment prompted us to re-examine our chosen methodological approach, namely the use of verbal protocols. We used verbal protocols to study design cognition associated with stimulus use. Our results showed that use of stimuli did not increase concept creativity, contradicting much of the design literature. After eliminating other possible errors, we re-examined the experimental methodology to identify potential design-specific limitations associated with verbal protocols. Many researchers have used verbal protocol experiments, also known as talk-out-loud experiments, to study cognitive processes, as there are few other methods to study internal cognition. While verbal protocols are a widely debated method, research has been done to validate them, and precautions can be taken to mitigate associated risks. Based on reviewing the literature and our own experiences, we have developed design-specific guidelines for the use of verbal protocols. We also outline future work required to explore and understand the suitability of verbal protocols for design studies. Despite potential limitations, verbal protocols remain a valuable and practical tool for studying design cognition and therefore should not be discarded.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Dong, Ling, Kefei Chen, Mi Wen e Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design". In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

da Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli e J. Rabaey. "Wireless protocols design". In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Lubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway". In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.

Texto completo da fonte
Resumo:
Abstract The Application Protocol Information Base (APIB) is an on-line repository of documents for the Standard for the Exchange of Product model data (STEP, officially ISO 10303 — Product Data Representation and Exchange). Document types in the APIB include STEP Application Protocols and Integrated Resources. Application Protocols are standards that are intended to be implemented in software systems, and Integrated Resources are used by them as building blocks. Application Protocols and Integrated Resources are represented in the Standard Generalized Markup Language (SGML) in the APIB in order to facilitate efficient information search and retrieval. This paper describes a World Wide Web gateway to the APIB, implemented using the Common Gateway Interface (CGI) standard. The APIB gateway allows STEP developers to efficiently search for ISO 10303 standards and supporting information. The only client software required to use the APIB gateway is a third party web browser.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Koh, Immanuel, Paul Keel e Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Chiasserini, C. F., P. Nuggehalli e V. Srinivasan. "Energy-efficient communication protocols". In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Haeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger e Jane Burry. "Furniture Design Using Custom-Optimised Structural Nodes". In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Design of protocols"

1

Rose, M. On the Design of Application Protocols. RFC Editor, novembro de 2001. http://dx.doi.org/10.17487/rfc3117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Amer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, outubro de 1994. http://dx.doi.org/10.21236/ada290584.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Syverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1996. http://dx.doi.org/10.21236/ada465132.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Serpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, julho de 2008. http://dx.doi.org/10.21236/ada484133.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Lebovitz, G., e M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, fevereiro de 2012. http://dx.doi.org/10.17487/rfc6518.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Griffin, Timothy G., Aaron D. Jaggard e Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, abril de 2004. http://dx.doi.org/10.21236/ada461910.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Herman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), agosto de 2022. http://dx.doi.org/10.21079/11681/45100.

Texto completo da fonte
Resumo:
This special report seeks to advance the field of ecological restoration by reviewing selected reports on the processes, procedures, and protocols associated with monitoring of ecological restoration projects. Specifically, this report identifies selected published herbaceous vegetation monitoring protocols at the national, regional, and local levels and then evaluates the recommended sampling design and methods from these identified protocols. Finally, the report analyzes the sampling designs and methods in the context of monitoring restored herbaceous vegetation at US Army Corps of Engineers (USACE) ecosystem restoration sites. By providing this information and the accompanying analyses in one document, this special report aids the current effort to standardize data-collection methods in monitoring ecosystem restoration projects.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Amer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, outubro de 1999. http://dx.doi.org/10.21236/ada370116.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Krunz, Marwan, e Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, novembro de 2013. http://dx.doi.org/10.21236/ada591559.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Ang, Chwee B., e Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2001. http://dx.doi.org/10.21236/ada405072.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia