Artigos de revistas sobre o tema "Design of protocols"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Design of protocols".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang e Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms". International Journal of Applied Evolutionary Computation 1, n.º 1 (janeiro de 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Texto completo da fonteYu, Song Sen, Yun Peng e Jia Jing Zhang. "A Lightweight RFID Mechanism Design". Advanced Materials Research 216 (março de 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Texto completo da fonteTurilli, Matteo. "Ethical protocols design". Ethics and Information Technology 9, n.º 1 (8 de fevereiro de 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Texto completo da fonteSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu et al. "Practice and Consideration of Master Protocol in Clinical Trials". Tumor Discovery 2, n.º 2 (28 de abril de 2023): 342. http://dx.doi.org/10.36922/td.342.
Texto completo da fonteNguyen, Philon, Thanh An Nguyen e Yong Zeng. "Segmentation of design protocol using EEG". Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, n.º 1 (3 de abril de 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Texto completo da fonteHe, Jiayue, Jennifer Rexford e Mung Chiang. "Don't optimize existing protocols, design optimizable protocols". ACM SIGCOMM Computer Communication Review 37, n.º 3 (20 de julho de 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Texto completo da fonteN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Texto completo da fonteSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo e Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things". Information 12, n.º 8 (22 de julho de 2021): 292. http://dx.doi.org/10.3390/info12080292.
Texto completo da fonteAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges". Journal of Marine Science and Engineering 9, n.º 7 (4 de julho de 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Texto completo da fonteHayam A. Al-Yasiri e Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator". Diyala Journal of Engineering Sciences 7, n.º 4 (1 de dezembro de 2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Texto completo da fonteWytrębowicz, Jacek, Krzysztof Cabaj e Jerzy Krawiec. "Messaging Protocols for IoT Systems—A Pragmatic Comparison". Sensors 21, n.º 20 (18 de outubro de 2021): 6904. http://dx.doi.org/10.3390/s21206904.
Texto completo da fonteSyahputra, Ramdhani, Rahmadi Kurnia e Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols". Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, n.º 1 (8 de fevereiro de 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Texto completo da fonteChoi, Sangil, Wooksik Lee, Teukseob Song e Jong-Hoon Youn. "Block Design-Based Asynchronous Neighbor Discovery Protocol for Wireless Sensor Networks". Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/951652.
Texto completo da fonteZhang, Kai Lin, Da Hua Li, Shu Chen Shi, Xue Song Yang, Zhen Xiao e Qiang Gao. "Design and Implementation of Multi-Protocol Self-Adaptation Gateway". Applied Mechanics and Materials 687-691 (novembro de 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2108.
Texto completo da fonteIdeguchi, Tetsuo, Yuuji Koui, Nonmember, Mitsuru Tsuchida, Yukio Ushisako, Nonmember e Michihiro Ishizaka. "Design and implementation of protocol conversion equipment for layered protocols". Electronics and Communications in Japan (Part I: Communications) 73, n.º 3 (março de 1990): 14–23. http://dx.doi.org/10.1002/ecja.4410730302.
Texto completo da fonteKo, Hoo Sang, e Shimon Y. Nof. "Design of Protocols for Task Administration in Collaborative Production Systems". International Journal of Computers Communications & Control 5, n.º 1 (1 de março de 2010): 91. http://dx.doi.org/10.15837/ijccc.2010.1.2466.
Texto completo da fonteChen, Zhi, Ya Peng e Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks". Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.
Texto completo da fonteChuang, Yun-Hsin, Chin-Laung Lei e Hung-Jr Shiu. "How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security". Symmetry 13, n.º 9 (4 de setembro de 2021): 1629. http://dx.doi.org/10.3390/sym13091629.
Texto completo da fonteQiao, Chengzhen, Yanzhi Qiu, Chunhui Yang e Shaozhe Zhang. "Design and Implementation of EMU On-board Data Protocol Management System". Journal of Physics: Conference Series 2356, n.º 1 (1 de outubro de 2022): 012022. http://dx.doi.org/10.1088/1742-6596/2356/1/012022.
Texto completo da fonteDeepak Malik e Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation". International Research Journal on Advanced Engineering Hub (IRJAEH) 2, n.º 06 (25 de junho de 2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.
Texto completo da fonteLiu, Wei Dong, Xiang Yu Li e Li'e Gao. "Design of a Gateway for Remotely Underwater Vehicles". Applied Mechanics and Materials 209-211 (outubro de 2012): 2138–41. http://dx.doi.org/10.4028/www.scientific.net/amm.209-211.2138.
Texto completo da fonteHope, Emily S., Ben Filewod, Daniel W. McKenney e Tony C. Lemprière. "A financial analysis of four carbon offset accounting protocols for a representative afforestation project (southern Ontario, Canada)". Canadian Journal of Forest Research 51, n.º 7 (julho de 2021): 1015–28. http://dx.doi.org/10.1139/cjfr-2020-0183.
Texto completo da fonteLiu, Dong, e Huilin Cai. "Design of multi-protocol conversion module". Journal of Physics: Conference Series 2303, n.º 1 (1 de julho de 2022): 012059. http://dx.doi.org/10.1088/1742-6596/2303/1/012059.
Texto completo da fonteOh, Soo-Yeon, Yong-Joon Lee e Sung-Ho Hwang. "Design and Implementation of IoT Gateway with MQTT and IEC 61850 MMS Protocol". International Journal of Membrane Science and Technology 10, n.º 1 (22 de junho de 2023): 64–71. http://dx.doi.org/10.15379/ijmst.v10i1.1430.
Texto completo da fonteAmin, Md Ruhul, Md Shohrab Hossain e Mohammed Atiquzzaman. "In-Band Full Duplex Wireless LANs: Medium Access Control Protocols, Design Issues and Their Challenges". Information 11, n.º 4 (16 de abril de 2020): 216. http://dx.doi.org/10.3390/info11040216.
Texto completo da fonteHao, Chen, John A. Clark e Jeremy L. Jacob. "Automated Design of Security Protocols". Computational Intelligence 20, n.º 3 (agosto de 2004): 503–16. http://dx.doi.org/10.1111/j.0824-7935.2004.00249.x.
Texto completo da fonteRamarao, K. V. S. "Design of transaction commitment protocols". Information Sciences 55, n.º 1-3 (junho de 1991): 129–49. http://dx.doi.org/10.1016/0020-0255(91)90010-r.
Texto completo da fonteBunch, David S., David M. Rocke e Robert O. Harrison. "Statistical design of ELISA protocols". Journal of Immunological Methods 132, n.º 2 (setembro de 1990): 247–54. http://dx.doi.org/10.1016/0022-1759(90)90036-u.
Texto completo da fonteKozak, P., e W. M. Wonham. "Design of transaction management protocols". IEEE Transactions on Automatic Control 41, n.º 9 (1996): 1330–35. http://dx.doi.org/10.1109/9.536503.
Texto completo da fonteGong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay". Advanced Materials Research 936 (junho de 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.
Texto completo da fonteTsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido e Makoto Takizawa. "Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups". International Journal of Distributed Systems and Technologies 2, n.º 3 (julho de 2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.
Texto completo da fonteKristić, Ante, Julije Ožegović e Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities". Wireless Communications and Mobile Computing 2018 (12 de setembro de 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.
Texto completo da fonteAlmuhaideb, Abdullah M., e Huda A. Alghamdi. "Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment". Big Data and Cognitive Computing 6, n.º 4 (24 de outubro de 2022): 124. http://dx.doi.org/10.3390/bdcc6040124.
Texto completo da fonteS, Arockiaraj, Krishnamoorthi Makkithaya e Harishchandra Hebbar N. "Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks". International Journal of Interactive Mobile Technologies (iJIM) 16, n.º 20 (31 de outubro de 2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.
Texto completo da fonteWei, Jun Chao, Guo Yuan Zhang, Yao Chen e Xiu Tian Yan. "Design of a Communication Interface between the Controller and the Galvanometer". Applied Mechanics and Materials 527 (fevereiro de 2014): 269–72. http://dx.doi.org/10.4028/www.scientific.net/amm.527.269.
Texto completo da fonteLongo, Bernadette, Craig Weinert e T. Kenny Fountain. "Implementation of Medical Research Findings through Insulin Protocols: Initial Findings from an Ongoing Study of Document Design and Visual Display". Journal of Technical Writing and Communication 37, n.º 4 (outubro de 2007): 435–52. http://dx.doi.org/10.2190/v986-k02v-519t-721j.
Texto completo da fonteLiu, Hai Yan, Yue Zhao e Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols". Applied Mechanics and Materials 556-562 (maio de 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.
Texto completo da fonteSingh, Kamred Udham. "Design Of Energy Efficient and Secure Routing Protocol for Wsn in Iot". Mathematical Statistician and Engineering Applications 70, n.º 2 (26 de fevereiro de 2021): 1434–41. http://dx.doi.org/10.17762/msea.v70i2.2336.
Texto completo da fonteSrivastava, Pallavi, Edwin Chung e Stepan Ozana. "Asynchronous Floating-Point Adders and Communication Protocols: A Survey". Electronics 9, n.º 10 (15 de outubro de 2020): 1687. http://dx.doi.org/10.3390/electronics9101687.
Texto completo da fonteZUO, JING, XUEFEN CHI, LIN GUAN, HONGXIA LI e IRFAN AWAN. "DESIGN OF FUZZY BASED MULTI-CONSTRAINED ROUTING PROTOCOL AND THE PERFORMANCE EVALUATION". Journal of Interconnection Networks 09, n.º 04 (dezembro de 2008): 369–87. http://dx.doi.org/10.1142/s0219265908002333.
Texto completo da fonteSankhyan, Bhanu, Anupam Baliyan e Abhishek Kumar. "Design of a Hybrid Security Protocol based on Cryptographic Algorithms". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 2240–47. http://dx.doi.org/10.22214/ijraset.2024.59335.
Texto completo da fontePaul, Surjit, Sanjay Kumar e Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security". International Journal of Information Security and Privacy 13, n.º 4 (outubro de 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Texto completo da fontePatel, Ahmed, Kenan Kalajdzic, Laleh Golafshan e Mona Taghavi. "Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card". International Journal of Information Security and Privacy 5, n.º 3 (julho de 2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.
Texto completo da fonteWang, Wei, Long Qing Zou, Hua Xu, You Wei An, Pei Fa Jia, Bo Li e Yuan Luo. "A Design Method of Multiple Protocols Communication Module in Semiconductor Equipment Simulation Platform". Advanced Materials Research 462 (fevereiro de 2012): 516–23. http://dx.doi.org/10.4028/www.scientific.net/amr.462.516.
Texto completo da fonteMüller-Török, Robert, Domenica Bagnato e Alexander Prosser. "Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design". Masaryk University Journal of Law and Technology 14, n.º 2 (23 de setembro de 2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.
Texto completo da fonteDeeptha, R. "Survey on Opportunistic Routing Protocols in Multihop Wireless Networks". Webology 18, Special Issue 04 (30 de setembro de 2021): 752–64. http://dx.doi.org/10.14704/web/v18si04/web18162.
Texto completo da fonteStamps, Arthur E. "Evaluating Architectural Design Review". Perceptual and Motor Skills 90, n.º 1 (fevereiro de 2000): 265–71. http://dx.doi.org/10.2466/pms.2000.90.1.265.
Texto completo da fonteKaminska, Olena, e Peter Lynn. "The Implications of Alternative Allocation Criteria in Adaptive Design for Panel Surveys". Journal of Official Statistics 33, n.º 3 (1 de setembro de 2017): 781–99. http://dx.doi.org/10.1515/jos-2017-0036.
Texto completo da fonteGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols". it - Information Technology 62, n.º 5-6 (16 de dezembro de 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Texto completo da fonteZhou, Qi Shu, Jie Luo e Yan Lin Ji. "Design of DC Motor Speed Control System Based on FlexRay Network". Applied Mechanics and Materials 543-547 (março de 2014): 1373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1373.
Texto completo da fonte