Добірка наукової літератури з теми "Conception de protocoles"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Conception de protocoles".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Conception de protocoles"
Alata, Eric, Vincent Nicomette, Julien Duch êne, Colas Le Guernic, and Mohamed Kaaniche. "Outils pour la rétro-conception de protocoles. Analyse et classification." Techniques et sciences informatiques 35, no. 6 (December 30, 2016): 609–40. http://dx.doi.org/10.3166/tsi.35.609-640.
Повний текст джерелаAmira, Derradji, and Verdier Christine. "Conception et évaluation d’un langage orienté patient pour la représentation de protocoles de soins." Ingénierie des systèmes d'information 21, no. 2 (April 28, 2016): 123–46. http://dx.doi.org/10.3166/isi.21.2.123-146.
Повний текст джерелаMasbernat, Raphaël, Églantine Bigot-Doll, Maxime Fouillat, Elisabeth Sulmont, François Pacquelet, Antoine Chevalier, Naomi Pereira, and Chloé Blanc. "Machines à voir, machines à penser : écosystème robotique situé pour la conception architecturale." SHS Web of Conferences 147 (2022): 06001. http://dx.doi.org/10.1051/shsconf/202214706001.
Повний текст джерелаCalixte, Xaviera, Karine Cuffi, and Pierre Leclercq. "Mise en place d’un outil pédagogique de documentation du processus de conception architecturale." SHS Web of Conferences 147 (2022): 03002. http://dx.doi.org/10.1051/shsconf/202214703002.
Повний текст джерелаMonod-Ansaldi, Réjane, Michèle Prieur, Isabelle Arbez, and Agnès Golay. "Étayer la conception de protocoles expérimentaux par des élèves de CM2 pour évaluer l’entrée d’eau dans la plante." RDST, no. 12 (November 15, 2015): 113–39. http://dx.doi.org/10.4000/rdst.1144.
Повний текст джерелаBennett, Fionn C. "Expliquer according to Jacques Derrida : explanation and critique." Recherches anglaises et nord-américaines 37, no. 1 (2004): 137–49. http://dx.doi.org/10.3406/ranam.2004.1729.
Повний текст джерелаChazalon, Jean-François. "Approche du traitement non chirurgical des supraclusions par la technique des aligneurs : quels protocoles de traitement et comment optimiser les résultats cliniques ?" Revue d'Orthopédie Dento-Faciale 56, no. 1 (February 2022): 51–70. http://dx.doi.org/10.1051/odf/2022006.
Повний текст джерелаSoulez, Antonia. "Otto Neurath : la force d’une pensée constructiviste du possible contre le déclinisme." Les cercles viennois de l'entre-deux-guerres 94 (2022): 187–209. http://dx.doi.org/10.4000/11vee.
Повний текст джерелаMelançon, Benoît. "Pour une lecture sociale de la correspondance de Saint-Denys Garneau." Dossier 20, no. 1 (August 29, 2006): 96–106. http://dx.doi.org/10.7202/201142ar.
Повний текст джерелаHÉRODIN, F. "Problèmes éthiques posés par la recherche duale sur les cellules souches menée par le Service de santé des armées." Revue Médecine et Armées, Volume 43, Numéro 3 (June 1, 2015): 240–45. http://dx.doi.org/10.17184/eac.6882.
Повний текст джерелаДисертації з теми "Conception de protocoles"
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Повний текст джерелаSeinturier, Lionel. "Conception d'algorithmes répartis et de protocoles réseaux en approche objet." Phd thesis, Paris, CNAM, 1997. http://tel.archives-ouvertes.fr/tel-00439136.
Повний текст джерелаEtrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Повний текст джерелаThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
SANTOSO, HARRY. "Conception et evaluation de protocoles de communication a haut debit." Paris 6, 1993. http://www.theses.fr/1993PA066238.
Повний текст джерелаDuchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification." Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Повний текст джерелаThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Tanter, Éric. "Des protocoles de métaobjets aux noyaux versatiles pour la programmation par aspects." Nantes, 2004. http://www.theses.fr/2004NANT2075.
Повний текст джерелаBendedouch, Fethi. "Conception et realisation d'un systeme d'apprentissage des protocoles de communication assiste par ordinateur : simulation et analyse des protocoles." Toulouse 3, 1987. http://www.theses.fr/1987TOU30033.
Повний текст джерелаBendedouch, Fethi. "Conception et réalisation d'un système d'apprentissage des protocoles de communication assisté par ordinateur simulation et analyse des protocoles /." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37602822c.
Повний текст джерелаSTEFFAN, LAURENT. "Conception et specification de protocoles de communication pour applications temps reel." Nantes, 1988. http://www.theses.fr/1988NANT2046.
Повний текст джерелаPlainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Повний текст джерелаRelaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Книги з теми "Conception de protocoles"
Liljeroth, Pia. Rädsla inför förlossningen: Ett uppenbart kliniskt problem? : konstruktionen av förlossningsrädsla som medicinsk kategori. Åbo: Åbo Akademis förlag, 2009.
Знайти повний текст джерелаQuirouette, R. L. Le mur à écran pare-pluie: Un protocole de mise en service. Ottawa, Ont: Société canadienne d'hypothèques et de logement, 1996.
Знайти повний текст джерелаBellavance, English Lisa, ed. Combinatorial library methods and protocols. Totowa, N.J: Humana Press, 2002.
Знайти повний текст джерелаWAHL, Sondi. Conception et Evaluation Protocole Rouhb: Conception et Evaluation de Protocole de Routage Ad Hoc. ISTE Editions Ltd., 2023.
Знайти повний текст джерелаSpecial Edition Using SOAP. Que, 2001.
Знайти повний текст джерелаGrijalba Carabali, Paola Andrea, Adriana Pérez Portocarrero, Jhon Fredy Salazar Riascos, and Jorge Humberto Restrepo Zapata. Guía de protocolo del síndrome de pie diabético. Editorial Universidad Santiago de Cali, 2019. http://dx.doi.org/10.35985/9789585248403.
Повний текст джерелаFaúndez C., Jorge, Marlene Verónica González González, Patricio Parra Sanhueza, and Juan Carlos Valencia Baier. Manual 38: Manual para la certificación sanitaria forestal. INFOR, 2001. http://dx.doi.org/10.52904/20.500.12220/6669.
Повний текст джерелаCatanesi, Cecilia Inés, and Egle Etel Villegas Castagnasso, eds. Elementos de Genética para estudiantes de Ciencias Biológicas. Editorial de la Universidad Nacional de La Plata (UNLP), 2021. http://dx.doi.org/10.35537/10915/129625.
Повний текст джерелаCustom CGI Scripting with Perl. John Wiley & Sons, 2001.
Знайти повний текст джерелаHanegan, Kevin. Custom CGI Scripting with Perl. Wiley & Sons, Incorporated, John, 2002.
Знайти повний текст джерелаЧастини книг з теми "Conception de protocoles"
Bentley, Joseph. "Neurath’s Conception of Protocol Statements." In Logical Empiricism and Naturalism, 67–96. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29328-3_3.
Повний текст джерелаWoodland, Sarah, and Kamarra Bell-Wykes. "Culturally Led, Culturally Safe Performance Making." In First Nations Australian Theatre for Health Equity, 61–83. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65506-7_4.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Évaluation des performances du protocole pour des applications coopératives." In Conception et évaluation de protocole de routage ad hoc, 155–211. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch4.
Повний текст джерелаIsel, M. "Conception et réalisation des orthèses." In Orthèses De la Main et du Poignet. Protocoles De Rééducation, 29–37. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71185-5.00005-9.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Enjeux autour des communications ad hoc sur la route." In Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Intégration des composantes ad hoc dans une infrastructure globale." In Conception et évaluation de protocole de routage ad hoc, 249–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch6.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Approche fonctionnelle de conception de protocole." In Conception et évaluation de protocole de routage ad hoc, 17–80. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch2.
Повний текст джерелаBentley, Joseph. "Conceptions of Protocol Sentences in Neurath and Carnap and the Bipartite Metatheory Conception." In Ways of the Scientific World-Conception. Rudolf Carnap and Otto Neurath, 152–79. BRILL, 2024. http://dx.doi.org/10.1163/9789004680203_008.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Modèle formel pour l’analyse de propriétés du protocole." In Conception et évaluation de protocole de routage ad hoc, 213–47. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch5.
Повний текст джерелаWAHL, Martine, and Patrick SONDI. "Modèles et simulations pour l’analyse de performance." In Conception et évaluation de protocole de routage ad hoc, 81–153. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch3.
Повний текст джерелаТези доповідей конференцій з теми "Conception de protocoles"
Frikha, Mounir, and Jamila Ben Slimane. "Conception and simulation of energy-efficient AODV protocol in ad hoc networks." In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292343.
Повний текст джерелаDel Junco González, Juan José. "Conexiones disciplinarias en una práctica "mestiza”. El caso de la “ornitología emocional”." In V Congreso Internacional de Investigacion en Artes Visuales ANIAV 2022. RE/DES Conectar. València: Editorial Universitat Politècnica de València, 2022. http://dx.doi.org/10.4995/aniav2022.2022.15501.
Повний текст джерелаMichaud, Martin, Daniel Forgues, Julien Meyer, and Claudiane Ouellet- Plamondon. "A Case Study on Improving Standardization in the Conception Phase by Developing Tools and Protocols." In 27th Annual Conference of the International Group for Lean Construction (IGLC). International Group for Lean Construction, 2019. http://dx.doi.org/10.24928/2019/0176.
Повний текст джерелаFlorensa Ferrando, Ignasi, Iria Fraga Rivas, and Víctor Martínez Junza. "Mathematics education in engineering: a triple discontinuity?" In SEFI 50th Annual conference of The European Society for Engineering Education. Barcelona: Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788412322262.1144.
Повний текст джерелаMauricio, María Dolores, Eva Serna, Soraya Lilian Vallés, Martín Aldasoro, and José María Vila. "Aprendiendo de forma cooperativa a través del método científico." In In-Red 2016 - Congreso de Innovación Educativa y Docencia en Red de la Universitat Politècnica de València. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/inred2016.2016.4289.
Повний текст джерелаSouza, Wander Pereira de, Artur de Souza Moret, Sandro Adalberto, Gleimiria Batista da Costa Matos, Haroldo de Sá Medeiros, and Dércio Bernardes de Souza. "Sustainable tourism and public policies in the Amazon: Scientific invisibility." In III SEVEN INTERNATIONAL MULTIDISCIPLINARY CONGRESS. Seven Congress, 2023. http://dx.doi.org/10.56238/seveniiimulti2023-220.
Повний текст джерелаCaballero, Victor, David Vernet, Agustín Zaballos, and Guiomar Corral. "Web of Energy: hacia la integración inteligente para las redes de sensores en Smart Grids." In XIII Jornadas de Ingenieria Telematica - JITEL2017. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6499.
Повний текст джерелаLuca, Andreea iuliana, and Ioana roxana Podina. "ETHIC MODELS SHAPING (IM)MORAL IDENTITY IN (POST)PANDEMIC TIMES: A PROPOSAL FOR A LONGITUDINAL STUDY PROTOCOL." In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-176.
Повний текст джерелаMarín Ramos, Ruben. "En el Parque." In II Congreso Internacional Estéticas Híbridas de la Imagen en Movimiento: Identidad y Patrimonio. Valencia: Universitat Politàcnica de València, 2021. http://dx.doi.org/10.4995/eshid2021.2021.13240.
Повний текст джерелаAparicio Pico, Lilia Edith, and Patrick Francois Tarquino Aparicio. "TELESALUD UN MODELO DE CONVERGENCIA ENTRE TECNOLOGÍA, MEDICINA Y EDUCACIÓN." In La formación de ingenieros: un compromiso para el desarrollo y la sostenibilidad. Asociación Colombiana de Facultades de Ingeniería - ACOFI, 2020. http://dx.doi.org/10.26507/ponencia.813.
Повний текст джерелаЗвіти організацій з теми "Conception de protocoles"
Wolfenson, David, William W. Thatcher, and James E. Kinder. Regulation of LH Secretion in the Periovulatory Period as a Strategy to Enhance Ovarian Function and Fertility in Dairy and Beef Cows. United States Department of Agriculture, December 2003. http://dx.doi.org/10.32747/2003.7586458.bard.
Повний текст джерелаOsejo, Alejandra, Ana María Garrido, Juana Alvarez, Santiago Martínez, Diana Lara, Omar Ruiz, and Bernardo Posada. Guía para la caracterización de la gobernanza en paisajes rurales. Edited by Alejandra Osejo. Instituto de Investigación de Recursos Biológicos Alexander von Humboldt, December 2019. http://dx.doi.org/10.21068/cssbgobernanza2019.
Повний текст джерелаBritt, Jack, Miriam Rosenberg, Steven Washburn, and Moshe Kaim. Development and Evaluation of a Method of Hormonal Treatment to Increase Fertility in Dairy Cows. United States Department of Agriculture, December 1995. http://dx.doi.org/10.32747/1995.7612833.bard.
Повний текст джерела