Literatura científica selecionada sobre o tema "Protocoles de communications"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protocoles de communications".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Protocoles de communications"
Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He e Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management". Systems 11, n.º 7 (24 de junho de 2023): 322. http://dx.doi.org/10.3390/systems11070322.
Texto completo da fonteSangam, Sahana V., Sahana S. Kulkarni e Asst Prof Chaitanya K. Jambotkar. "Smart Grid Communication Protocols". International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (28 de fevereiro de 2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.
Texto completo da fonteBoeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif e Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed". Energies 17, n.º 2 (11 de janeiro de 2024): 373. http://dx.doi.org/10.3390/en17020373.
Texto completo da fonteGee, K. "Communications network protocols". Computer Communications 8, n.º 5 (outubro de 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.
Texto completo da fonteGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, n.º 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.
Texto completo da fonteGossner, Olivier. "Protocoles de communication robustes". Revue économique 48, n.º 3 (maio de 1997): 685. http://dx.doi.org/10.2307/3502853.
Texto completo da fonteGossner, Olivier. "Protocoles de communication robustes." Revue économique 48, n.º 3 (1 de maio de 1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.
Texto completo da fonteSuleman, Danladi, Rania Shibl e Keyvan Ansari. "Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions". Smart Cities 6, n.º 5 (6 de outubro de 2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.
Texto completo da fonteSingh, Rameshwar, e Prof Gayatri Bhoyar. "Green Communications Using Ambient Backscattered: The Review Paper". International Journal for Research in Applied Science and Engineering Technology 10, n.º 8 (31 de agosto de 2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.
Texto completo da fonteBoczkowski, Lucas, Iordanis Kerenidis e Frédéric Magniez. "Streaming Communication Protocols". ACM Transactions on Computation Theory 10, n.º 4 (17 de outubro de 2018): 1–21. http://dx.doi.org/10.1145/3276748.
Texto completo da fonteTeses / dissertações sobre o assunto "Protocoles de communications"
Gerault, David. "Security analysis of contactless communication protocols". Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Texto completo da fonteMoulierac, Joanna. "Agrégation des communications multicast". Rennes 1, 2006. http://www.theses.fr/2006REN1S151.
Texto completo da fonteMoulierac, Joanna Rubino Gerardo. "Agrégation des communications multicast". [S.l.] : [s.n.], 2006. ftp://ftp.irisa.fr/techreports/theses/2006/moulierac.pdf.
Texto completo da fonteArnal, Fabrice. "Optimisation de la fiabilité pour des communications multipoints par satellite géostationnaire". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00001160.
Texto completo da fonteMota, Gonzalez Sara del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse, INPT, 2008. http://ethesis.inp-toulouse.fr/archive/00000628/.
Texto completo da fonteSystems that implement communications in the form of group multicast have increasingly raised security problems. The protection mechanisms applied to that communication rely on symmetrical and asymmetrical key exchanges, and the way these mechanisms are selected does influence the system’s efficiency. Following an in depth analysis of the needs captured by these systems, we defined a model for representing the dynamics of groups, as well as communication among group members. We defined one system architecture which focuses on key creation, exchange and management functions. The system was modeled in UML 2. 0 and checked against security and temporal properties. The approach we followed to investigate temporal requirements may be extended to a broad variety of distributed systems
Mota, Gonzalez Sara Del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2008. http://tel.archives-ouvertes.fr/tel-00309824.
Texto completo da fonteMota, Gonzalez Sara del Socorro Villemur Thierry Diaz Michel. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes". Toulouse : INP Toulouse, 2008. http://ethesis.inp-toulouse.fr/archive/00000628.
Texto completo da fonteTourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil". Nice, 2008. http://www.theses.fr/2008NICE4006.
Texto completo da fonteCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Guitton, Alexandre. "Communications multicast : contributions aux réseaux optiques et au passage à l'échelle". Rennes 1, 2005. https://hal-clermont-univ.archives-ouvertes.fr/tel-01448117.
Texto completo da fonteGuitton, Alexandre Marie Raymond Molnár Miklós. "Communications multicast contributions aux réseaux optiques et au passage à l'échelle /". [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/guitton.pdf.
Texto completo da fonteLivros sobre o assunto "Protocoles de communications"
Bulbrook, Dale. WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.
Encontre o texto completo da fonteHalsall, Fred. Introduction to data communications and computer networks. Wokingham, England: Addison-Wesley, 1985.
Encontre o texto completo da fonteHalsall, Fred. Data communications, computer networks, and OSI. 2a ed. Wokingham, England: Addison-Wesley, 1988.
Encontre o texto completo da fonteStevens, W. Richard. UNIX network programming: Interprocess communications. 2a ed. Noida (IN): Addison Wesley Longman Singapore Pte. Ltd., 1999.
Encontre o texto completo da fonteStallings, William. Data and Computer Communications. 5a ed. Upper Saddle River, N.J: Prentice Hall, 1997.
Encontre o texto completo da fonteStallings, William. Data and computer communications. 3a ed. Cowley: Maxwell Macmillan, 1991.
Encontre o texto completo da fonteWilliam, Stallings. Data and computer communications. 8a ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2007.
Encontre o texto completo da fonteStallings, William. Data and computer communications. 2a ed. New York: Macmillan Pub. Co., 1988.
Encontre o texto completo da fonteStallings, William. Data and computer communications. 3a ed. New York: Macmillan Pub. Co., 1991.
Encontre o texto completo da fonteWilliam, Stallings. Data and computer communications. New York: Macmillan Pub. Co., 1985.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Protocoles de communications"
Hercog, Drago. "Communication Service, Communication Protocol". In Communication Protocols, 45–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_4.
Texto completo da fonteJaved, Adeel. "Communication Protocols". In Building Arduino Projects for the Internet of Things, 35–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1940-9_3.
Texto completo da fonteSuhonen, Jukka, Mikko Kohvakka, Ville Kaseva, Timo D. Hämäläinen e Marko Hännikäinen. "Communication Protocols". In Low-Power Wireless Sensor Networks, 27–41. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2173-3_4.
Texto completo da fonteSubero, Armstrong. "Communication Protocols". In Programming Microcontrollers with Python, 185–208. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7058-5_7.
Texto completo da fonteĎud’ák, Juraj, e Gabriel Gaspar. "Communication Protocols". In Signals and Communication Technology, 1–76. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-30152-0_1.
Texto completo da fonteKanagachidambaresan, G. R., e Bharathi N. "Communication Protocols". In Sensors and Protocols for Industry 4.0, 73–112. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9007-1_3.
Texto completo da fonteYang, Ke, Meihua Xiao, Zifan Song e Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System". In Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Texto completo da fonteQin, Xudong, Yuxin Deng e Wenjie Du. "Verifying Quantum Communication Protocols with Ground Bisimulation". In Tools and Algorithms for the Construction and Analysis of Systems, 21–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_2.
Texto completo da fonteCowley, John. "Network Protocols". In Communications and Networking, 81–109. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_6.
Texto completo da fonteHercog, Drago. "Communication Protocol Performance". In Communication Protocols, 83–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_6.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Protocoles de communications"
Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri e Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things". In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Texto completo da fonteTan, Yang, e Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Texto completo da fonteGeromel, Paulo A., e Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet". In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.
Texto completo da fonteCruz, Tiago Rodrigo, Gustavo Cainelli, Max Feldman e Ivan Muller. "Towards handover in IWN: a fast data collection technique". In Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1172.
Texto completo da fonteLivesey, Joseph, e Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers". In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Texto completo da fonteBarcelos, Patrícia Pitthan A., Taisy Silva Weber e Roberto Jung Drebes. "Um Toolkit para Avaliação da Intrusão de Métodos de Injeção de Falhas". In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/wtf.2002.23398.
Texto completo da fonteFritzke Jr., Udo, Luiz Alberto F. Gomes, Denis L. Silva e Daniel M. Morais. "A Meta Protocol for Adaptable Mobile Replicated Databases". In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23247.
Texto completo da fonteLi, Kuang-Yu J., e B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems". In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.
Texto completo da fontePauli, Joakim. "Service Oriented Vehicle Diagnostic Communication and Regulations". In Automotive Technical Papers. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-5050.
Texto completo da fonteTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol". In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Texto completo da fonteRelatórios de organizações sobre o assunto "Protocoles de communications"
Brooks, Richard R. Detecting Hidden Communications Protocols. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2013. http://dx.doi.org/10.21236/ada581858.
Texto completo da fonteAdler, Micah, e Bruce M. Maggs. Protocols for Asymetric Communication Channels. Fort Belvoir, VA: Defense Technical Information Center, dezembro de 1997. http://dx.doi.org/10.21236/ada333259.
Texto completo da fonteCarroll, J. Ritchie, e F. Russell Robertson. A COMPARISON OF PHASOR COMMUNICATIONS PROTOCOLS. Office of Scientific and Technical Information (OSTI), março de 2019. http://dx.doi.org/10.2172/1504742.
Texto completo da fonteP., R., P. A., P. Sijben, S. Brim e M. Shore. Middlebox Communications (midcom) Protocol Requirements. RFC Editor, agosto de 2002. http://dx.doi.org/10.17487/rfc3304.
Texto completo da fonteStiemerling, M., J. Quittek e T. Taylor. Middlebox Communications (MIDCOM) Protocol Semantics. RFC Editor, fevereiro de 2005. http://dx.doi.org/10.17487/rfc3989.
Texto completo da fonteBarnes, M., ed. Middlebox Communications (MIDCOM) Protocol Evaluation. RFC Editor, junho de 2005. http://dx.doi.org/10.17487/rfc4097.
Texto completo da fonteLiu, Ming T. Protocol Engineering for Multimedia Communications. Fort Belvoir, VA: Defense Technical Information Center, outubro de 1995. http://dx.doi.org/10.21236/ada305077.
Texto completo da fonteEspinoza, J., P. Sholander e B, Van Leeuwen. Effective Protocols for Mobile Communications and Networking. Office of Scientific and Technical Information (OSTI), dezembro de 1998. http://dx.doi.org/10.2172/2758.
Texto completo da fonteMoser, Louise E., e P. M. Melliar-Smith. Secure Multicast Protocols for Group Communication. Fort Belvoir, VA: Defense Technical Information Center, junho de 2001. http://dx.doi.org/10.21236/ada388045.
Texto completo da fonteAwerbuch, Baruch, Alan Baratz e David Peleg. Cost-Sensitive Analysis of Communication Protocols. Fort Belvoir, VA: Defense Technical Information Center, junho de 1991. http://dx.doi.org/10.21236/ada237356.
Texto completo da fonte