Добірка наукової літератури з теми "Model-based protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Model-based protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Model-based protocol"
Mordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.
Повний текст джерелаKhan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.
Повний текст джерелаPan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Повний текст джерелаDeng, Guo Li, Tao He, Yong Wei, Hua Zhong Li, Shou Xiang Xu, and De Fen Zhang. "Model Based Protocol Conformance Test Study." Applied Mechanics and Materials 713-715 (January 2015): 466–70. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.466.
Повний текст джерелаFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.
Повний текст джерелаHuang, Xinyan. "A Data-Driven WSN Security Threat Analysis Model Based on Cognitive Computing." Journal of Sensors 2022 (January 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/5013905.
Повний текст джерелаFu, Yulong, and Ousmane Koné. "Model based security verification of protocol implementation." Journal of Information Security and Applications 22 (June 2015): 17–27. http://dx.doi.org/10.1016/j.jisa.2014.08.002.
Повний текст джерелаKang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Повний текст джерелаChen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.
Повний текст джерелаLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Повний текст джерелаДисертації з теми "Model-based protocol"
Blom, Johan. "Model-Based Protocol Testing in an Erlang Environment." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-279489.
Повний текст джерелаDe, Wet Nico. "Model driven communication protocol engineering and simulation based performance analysis using UML 2.0." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/6392.
Повний текст джерелаThe automated functional and performance analysis of communication systems specified with some Formal Description Technique has long been the goal of telecommunication engineers. In the past SDL and Petri nets have been the most popular FDT's for the purpose. With the growth in popularity of UML the most obvious question to ask is whether one can translate one or more UML diagrams describing a system to a performance model. Until the advent of UML 2.0, that has been an impossible task since the semantics were not clear. Even though the UML semantics are still not clear for the purpose, with UML 2.0 now released and using ITU recommendation Z.109, we describe in this dissertation a methodology and tool called proSPEX (protocol Software Performance Engineering using XMI), for the design and performance analysis of communication protocols specified with UML.
Laxmi, Vijaya. "Trust based QOS-aware packet forwarding model for ad hoc network independent of routing protocol." Thesis, Wichita State University, 2010. http://hdl.handle.net/10057/3732.
Повний текст джерелаThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
Santiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Повний текст джерелаSantiago Pinazo, S. (2015). Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/48527
TESIS
Nguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Повний текст джерелаDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.
Повний текст джерелаRowden, Elizabeth Szydlo. "Response to Intervention: A Case Study Documenting one Elementary School's Successful Implementation." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97953.
Повний текст джерелаDoctor of Education
As schools continue to face increasing demands, including how to meet the needs of students with diverse academic backgrounds, they have been charged with exploring new ways and methods of ensuring that students are successful in their attempts to access the general education curriculum. Response to Intervention, more commonly referred to as RTI, has become more widely used in school systems as they continue to work to ensure student success for all. RTI is seen as a tool to help accurately identify students who have a learning disability (Ciolfi and Ryan, 2011), however more research is needed in order to have a better understanding of how schools implement RTI, as well as how they utilize the data collected and monitor student progress. This qualitative case study analyzes how one subject elementary school implemented RTI, how they utilized data, as well as how they monitored the progress of their students.
Riese, Marc. "Model-based diagnosis of communication protocols /." [S.l.] : [s.n.], 1993. http://library.epfl.ch/theses/?nr=1173.
Повний текст джерелаPinheiro, Pedro Victor Pontes. "Teste baseado em modelos para serviços RESTful usando máquinas de estados de protocolos UML." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-14072014-165410/.
Повний текст джерелаService Oriented Architecture (SOA) is an architectural style consisting of a set of restrictions aimed at promoting the scalability and flexibility of a system, providing its functionalities as services. In recent years, an alternative style was proposed and widely adopted, which designs the system\'s functionalities as resources. This resource oriented architectural style is called REST. In general, the test of web services has several challenges due to its distributed nature, unreliable communication channel, low coupling and the lack of a user interface. Testing RESTful web services (services that use REST) share these same challenges and also need to obey the REST constraints. These challenges require a more systematic and formal testing approach. In this context, model based testing presents itself as a viable process for addressing those needs. The model that represents the system should be simple and precise enough to generate quality test cases. Based on this context, this work proposes a model based approach to test RESTful web services. The behavioral model used was the UML protocol state machine, which is capable to provide a formalization of the service interface, while hiding its internal behaviour. A tool was developed to automatically generate test cases using the state and transition coverage criteria to traverse the model
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Повний текст джерелаКниги з теми "Model-based protocol"
Einstein, Andrew J. Radiation Considerations. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199392094.003.0034.
Повний текст джерелаMorrell, Kevin, and Mark Learmonth. Evidence-Based Management. Edited by Adrian Wilkinson, Steven J. Armstrong, and Michael Lounsbury. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198708612.013.21.
Повний текст джерелаEhrenreich-May, Jill, and Sarah M. Kennedy, eds. Applications of the Unified Protocols for Transdiagnostic Treatment of Emotional Disorders in Children and Adolescents. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780197527931.001.0001.
Повний текст джерелаSirová, Dagmara, Jiří Bárta, Jakub Borovec, and Jaroslav Vrba. The Utricularia-associated microbiome: composition, function, and ecology. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198779841.003.0025.
Повний текст джерелаЧастини книг з теми "Model-based protocol"
You, Xine, and Lingfeng Zhang. "Improved Authentication Model Based on Kerberos Protocol." In Advances in Intelligent and Soft Computing, 593–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25989-0_95.
Повний текст джерелаYan, Guomin, Jiguo Yu, Congcong Chen, and Lili Jia. "Virtual Backbone Construction Algorithms Based on Protocol Interference Model." In Communications in Computer and Information Science, 31–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54522-1_4.
Повний текст джерелаKaliappan, Prabhu Shankar, Hartmut König, and Sebastian Schmerl. "Model-Driven Protocol Design Based on Component Oriented Modeling." In Formal Methods and Software Engineering, 613–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_40.
Повний текст джерелаSimonsen, Kent Inge Fagerland, and Lars Michael Kristensen. "Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models." In Model-Based Methodologies for Pervasive and Embedded Software, 106–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38209-3_7.
Повний текст джерелаLuukkala, Vesa, and Ian Oliver. "Model Based Testing of an Embedded Session and Transport Protocol." In Testing of Software and Communicating Systems, 212–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73066-8_15.
Повний текст джерелаZeng, Wandan, Guiran Chang, Xingwei Wang, Shoubin Wang, Guangjie Han, and Xubo Zhou. "A QoS Model for Grid Computing Based on DiffServ Protocol." In Grid and Cooperative Computing, 549–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24680-0_90.
Повний текст джерелаSaito, Takumi, Shigenari Nakamura, Tomoya Enokido, and Makoto Takizawa. "Topic-Based Processing Protocol in a Mobile Fog Computing Model." In Advances in Intelligent Systems and Computing, 43–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57811-4_5.
Повний текст джерелаLi, Changchun, Kangnian Wang, and Xingtao Zhu. "Formal Analysis of Authentication Protocol Based on Directed Graph Model." In Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, 829–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31698-2_117.
Повний текст джерелаTanabe, Kotaro, Yoshinori Tanabe, and Masami Hagiya. "Model-Based Testing for MQTT Applications." In Knowledge-Based Software Engineering: 2020, 47–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53949-8_5.
Повний текст джерелаLi, Xinyan, Huiying Zhang, and Chunxia Yin. "DHT-Based Cross-Transmission Protocol Peer-to-Peer Resource Sharing Model." In Communications in Computer and Information Science, 539–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_68.
Повний текст джерелаТези доповідей конференцій з теми "Model-based protocol"
Shaleva, A., and V. Korkhov. "EFFICIENT GOSSIP-BASED PROTOCOL IN THE NEO BLOCKCHAIN NETWORK." In 9th International Conference "Distributed Computing and Grid Technologies in Science and Education". Crossref, 2021. http://dx.doi.org/10.54546/mlit.2021.71.22.002.
Повний текст джерелаHe, Yunhua, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, and Limin Sun. "A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149040.
Повний текст джерелаJin, Kaichun, Xingyuan Chen, Xuehui Du, Yibao Bao, and Hongxu Wang. "Reconfigurable Network Protocol Model Based on Process Algebra." In 2014 7th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2014. http://dx.doi.org/10.1109/iscid.2014.254.
Повний текст джерелаAbd El-Haleem, Ahmed M., Ihab A. Ali, Ibrahim I. Ibrahim, and Abdel Rahman H. El-Sawy. "Trust model for TRIDNT trust based routing Protocol." In 2010 2nd International Conference on Computer Technology and Development (ICCTD). IEEE, 2010. http://dx.doi.org/10.1109/icctd.2010.5645954.
Повний текст джерелаRan, Juan, and Xiaoyu Li. "Mobile Database Model Based on Secret Sharing Protocol." In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/meic-15.2015.160.
Повний текст джерелаOtrok, Hadi, Azzam Mourad, Jean-Marc Robert, Nadia Moati, and Hiba Sanadiki. "A cluster-based model for QoS-OLSR protocol." In 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011). IEEE, 2011. http://dx.doi.org/10.1109/iwcmc.2011.5982694.
Повний текст джерелаGrieskamp, Wolfgang, Nico Kicillof, Dave MacDonald, Alok Nandan, Keith Stobie, and Fred Wurden. "Model-Based Quality Assurance of Windows Protocol Documentation." In 2008 International Conference on Software Testing, Verification, and Validation. IEEE, 2008. http://dx.doi.org/10.1109/icst.2008.50.
Повний текст джерелаChaker, Hamza, Loïc Cudennec, Safae Dahmani, Guy Gogniat, and Martha Johanna Sepúlveda. "Cycle-based Model to Evaluate Consistency Protocols within a Multi-protocol Compilation Tool-chain." In COSMIC '15: International Workshop on Code Optimisation for Multi and Many Cores. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2723772.2723779.
Повний текст джерелаMegyesi, D., J. Lesko, and M. Schreiner. "Evaluation of multihop UAV communication model based on protocol-independent and protocol-dependent methods." In 2019 Modern Safety Technologies in Transportation (MOSATT). IEEE, 2019. http://dx.doi.org/10.1109/mosatt48908.2019.8944102.
Повний текст джерелаGrieskamp, Wolfgang, Nicolas Kicillof, Dave MacDonald, Alok Nandan, Keith Stobie, Fred Wurden, and Danpo Zhang. "Model-Based Quality Assurance of the SMB2 Protocol Documentation." In 2008 Eighth International Conference on Quality Software (QSIC). IEEE, 2008. http://dx.doi.org/10.1109/qsic.2008.34.
Повний текст джерелаЗвіти організацій з теми "Model-based protocol"
Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2265.
Повний текст джерелаWijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2275.
Повний текст джерелаWijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, April 1999. http://dx.doi.org/10.17487/rfc2575.
Повний текст джерелаWijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3415.
Повний текст джерелаBlumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2264.
Повний текст джерелаBlumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2274.
Повний текст джерелаBlumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, April 1999. http://dx.doi.org/10.17487/rfc2574.
Повний текст джерелаBlumenthal, U., and B. Wijnen. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3414.
Повний текст джерелаJames, Natasha A. Using agent-based models to examine implications of introducing conservation auctions in Costa Rica: overview, design concepts, and details (ODD) protocol for a conservation auction agent-based model (CA-ABM). Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2019. http://dx.doi.org/10.2737/srs-gtr-245.
Повний текст джерелаJames, Natasha A. Using agent-based models to examine implications of introducing conservation auctions in Costa Rica: overview, design concepts, and details (ODD) protocol for a conservation auction agent-based model (CA-ABM). Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2019. http://dx.doi.org/10.2737/srs-gtr-245.
Повний текст джерела