Добірка наукової літератури з теми "Design of protocols"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Design of protocols".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (January 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Повний текст джерелаYu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Повний текст джерелаTurilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (February 8, 2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Повний текст джерелаSong, Jiali, Zhiwei Rong, Xinwen Zhong, Yuhong Lu, Jike Huang, Yipei Yu, Zhilin Liu, et al. "Practice and Consideration of Master Protocol in Clinical Trials." Tumor Discovery 2, no. 2 (April 28, 2023): 342. http://dx.doi.org/10.36922/td.342.
Повний текст джерелаNguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (April 3, 2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Повний текст джерелаHe, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (July 20, 2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Повний текст джерелаN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Повний текст джерелаSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (July 22, 2021): 292. http://dx.doi.org/10.3390/info12080292.
Повний текст джерелаAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Повний текст джерелаHayam A. Al-Yasiri and Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator." Diyala Journal of Engineering Sciences 7, no. 4 (December 1, 2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Повний текст джерелаДисертації з теми "Design of protocols"
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Повний текст джерелаThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Повний текст джерелаMüffke, Friedger. "A better way to design communication protocols." Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Повний текст джерелаHoran, Stephen, and Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Повний текст джерелаThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.
Знайти повний текст джерелаRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Повний текст джерелаWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach." Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Повний текст джерелаLiu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Повний текст джерелаShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Повний текст джерелаSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Повний текст джерелаКниги з теми "Design of protocols"
name, No. Vaccine protocols. 2nd ed. Totowa, NJ: Humana Press, 2003.
Знайти повний текст джерелаAndrew, Robinson, Cranage Martin P, and Hudson Michael, eds. Vaccine protocols. 2nd ed. Totowa, N.J: Humana Press, 2003.
Знайти повний текст джерелаL, Hammond Joseph, and Pawlikowski Krzysztof, eds. Telecommunications: Protocols and design. Reading, Mass: Addison-Wesley Pub. Co., 1991.
Знайти повний текст джерелаSharp, Robin. Principles of protocol design. Berlin: Springer, 2010.
Знайти повний текст джерелаEhud, Gazit, and Nussinov Ruth, eds. Nanostructure design: Methods and protocols. Totowa, N.J: Humana, 2008.
Знайти повний текст джерелаLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Знайти повний текст джерела1947-, Robinson Andrew, Farrar Graham H, and Wiblin Christopher N, eds. Vaccine protocols. Totowa, N.J: Human Press, 1996.
Знайти повний текст джерелаKan, Jeff WT, and John S. Gero. Quantitative Methods for Studying Design Protocols. Dordrecht: Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Повний текст джерелаHolzmann, Gerard J. Design and validation of computer protocols. London: Prentice-Hall International, 1991.
Знайти повний текст джерелаAmerican Telephone and Telegraph Company., ed. Design and validation of computer protocols. Englewood Cliffs, N.J: Prentice Hall, 1991.
Знайти повний текст джерелаЧастини книг з теми "Design of protocols"
Wilson, Greg. "Protocols." In Software Design by Example, 69–80. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Повний текст джерелаHyndman, David L., and Masato Mitsuhashi. "PCR Primer Design." In PCR Protocols, 81–88. Totowa, NJ: Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Повний текст джерелаHercog, Drago. "System Specification and Design." In Communication Protocols, 3–13. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Повний текст джерелаHercog, Drago. "Protocol Specification and Design." In Communication Protocols, 15–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Повний текст джерелаChoi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Повний текст джерелаKůr, Jiří, Václav Matyáš, and Petr Švenda. "Evolutionary Design of Attack Strategies." In Security Protocols XVII, 3–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Повний текст джерелаŠvenda, Petr. "Evolutionary Design of Attack Strategies." In Security Protocols XVII, 18–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Повний текст джерелаde Muro, Marilena Aquino. "Probe Design, Production, and Applications." In Springer Protocols Handbooks, 41–53. Totowa, NJ: Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Повний текст джерелаSarkar, Mouli, and Naveen Kumar. "De Novo Peptide Design Tools." In Springer Protocols Handbooks, 1–6. New York, NY: Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Повний текст джерелаYu, Su-Yang, and Jeff Yan. "Security Design in Human Computation Games." In Security Protocols XVIII, 142–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Повний текст джерелаТези доповідей конференцій з теми "Design of protocols"
De Marchi, Mirco, and Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1–6. IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Повний текст джерелаDijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Повний текст джерелаDijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Повний текст джерелаChiu, I., and L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Повний текст джерелаDong, Ling, Kefei Chen, Mi Wen, and Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Повний текст джерелаda Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli, and J. Rabaey. "Wireless protocols design." In the eighth international workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Повний текст джерелаLubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Повний текст джерелаKoh, Immanuel, Paul Keel, and Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix." In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Повний текст джерелаChiasserini, C. F., P. Nuggehalli, and V. Srinivasan. "Energy-efficient communication protocols." In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Повний текст джерелаHaeusler, Hank, Manuel Muehlbauer, Sascha Bohnenberger, and Jane Burry. "Furniture Design Using Custom-Optimised Structural Nodes." In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.841.
Повний текст джерелаЗвіти організацій з теми "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3117.
Повний текст джерелаAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Fort Belvoir, VA: Defense Technical Information Center, October 1994. http://dx.doi.org/10.21236/ada290584.
Повний текст джерелаSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada465132.
Повний текст джерелаSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2008. http://dx.doi.org/10.21236/ada484133.
Повний текст джерелаLebovitz, G., and M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6518.
Повний текст джерелаGriffin, Timothy G., Aaron D. Jaggard, and Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Fort Belvoir, VA: Defense Technical Information Center, April 2004. http://dx.doi.org/10.21236/ada461910.
Повний текст джерелаHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45100.
Повний текст джерелаAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Fort Belvoir, VA: Defense Technical Information Center, October 1999. http://dx.doi.org/10.21236/ada370116.
Повний текст джерелаKrunz, Marwan, and Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada591559.
Повний текст джерелаAng, Chwee B., and Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Fort Belvoir, VA: Defense Technical Information Center, February 2001. http://dx.doi.org/10.21236/ada405072.
Повний текст джерела