Добірка наукової літератури з теми "Protocoles de communications"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Protocoles de communications".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Protocoles de communications":
Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He, and Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management." Systems 11, no. 7 (June 24, 2023): 322. http://dx.doi.org/10.3390/systems11070322.
Sangam, Sahana V., Sahana S. Kulkarni, and Asst Prof Chaitanya K. Jambotkar. "Smart Grid Communication Protocols." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 335–37. http://dx.doi.org/10.31142/ijtsrd21344.
Boeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif, and Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed." Energies 17, no. 2 (January 11, 2024): 373. http://dx.doi.org/10.3390/en17020373.
Gee, K. "Communications network protocols." Computer Communications 8, no. 5 (October 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.
Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (1997): 685–95. http://dx.doi.org/10.3406/reco.1997.409907.
Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (May 1997): 685. http://dx.doi.org/10.2307/3502853.
Gossner, Olivier. "Protocoles de communication robustes." Revue économique 48, no. 3 (May 1, 1997): 685–95. http://dx.doi.org/10.3917/reco.p1997.48n3.0685.
Suleman, Danladi, Rania Shibl, and Keyvan Ansari. "Investigation of Data Quality Assurance across IoT Protocol Stack for V2I Interactions." Smart Cities 6, no. 5 (October 6, 2023): 2680–705. http://dx.doi.org/10.3390/smartcities6050121.
Singh, Rameshwar, and Prof Gayatri Bhoyar. "Green Communications Using Ambient Backscattered: The Review Paper." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1184–87. http://dx.doi.org/10.22214/ijraset.2022.46392.
Boczkowski, Lucas, Iordanis Kerenidis, and Frédéric Magniez. "Streaming Communication Protocols." ACM Transactions on Computation Theory 10, no. 4 (October 17, 2018): 1–21. http://dx.doi.org/10.1145/3276748.
Дисертації з теми "Protocoles de communications":
Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Moulierac, Joanna. "Agrégation des communications multicast." Rennes 1, 2006. http://www.theses.fr/2006REN1S151.
Moulierac, Joanna Rubino Gerardo. "Agrégation des communications multicast." [S.l.] : [s.n.], 2006. ftp://ftp.irisa.fr/techreports/theses/2006/moulierac.pdf.
Arnal, Fabrice. "Optimisation de la fiabilité pour des communications multipoints par satellite géostationnaire." Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00001160.
Mota, Gonzalez Sara del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes." Toulouse, INPT, 2008. http://ethesis.inp-toulouse.fr/archive/00000628/.
Systems that implement communications in the form of group multicast have increasingly raised security problems. The protection mechanisms applied to that communication rely on symmetrical and asymmetrical key exchanges, and the way these mechanisms are selected does influence the system’s efficiency. Following an in depth analysis of the needs captured by these systems, we defined a model for representing the dynamics of groups, as well as communication among group members. We defined one system architecture which focuses on key creation, exchange and management functions. The system was modeled in UML 2. 0 and checked against security and temporal properties. The approach we followed to investigate temporal requirements may be extended to a broad variety of distributed systems
Mota, Gonzalez Sara Del Socorro. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2008. http://tel.archives-ouvertes.fr/tel-00309824.
Mota, Gonzalez Sara del Socorro Villemur Thierry Diaz Michel. "Modélisation et vérification de protocoles pour des communications sécurisées de groupes." Toulouse : INP Toulouse, 2008. http://ethesis.inp-toulouse.fr/archive/00000628.
Tourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil." Nice, 2008. http://www.theses.fr/2008NICE4006.
Cooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Guitton, Alexandre. "Communications multicast : contributions aux réseaux optiques et au passage à l'échelle." Rennes 1, 2005. https://hal-clermont-univ.archives-ouvertes.fr/tel-01448117.
Guitton, Alexandre Marie Raymond Molnár Miklós. "Communications multicast contributions aux réseaux optiques et au passage à l'échelle /." [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/guitton.pdf.
Книги з теми "Protocoles de communications":
Bulbrook, Dale. WAP: A beginner's guide. New York: Osborne/McGraw-Hill, 2001.
Halsall, Fred. Introduction to data communications and computer networks. Wokingham, England: Addison-Wesley, 1985.
Halsall, Fred. Data communications, computer networks, and OSI. 2nd ed. Wokingham, England: Addison-Wesley, 1988.
Stevens, W. Richard. UNIX network programming: Interprocess communications. 2nd ed. Noida (IN): Addison Wesley Longman Singapore Pte. Ltd., 1999.
Stallings, William. Data and Computer Communications. 5th ed. Upper Saddle River, N.J: Prentice Hall, 1997.
Stallings, William. Data and computer communications. 3rd ed. Cowley: Maxwell Macmillan, 1991.
Stallings, William. Data and computer communications. 8th ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2007.
Stallings, William. Data and computer communications. 2nd ed. New York: Macmillan Pub. Co., 1988.
Stallings, William. Data and computer communications. 3rd ed. New York: Macmillan Pub. Co., 1991.
Stallings, William. Data and computer communications. New York: Macmillan Pub. Co., 1985.
Частини книг з теми "Protocoles de communications":
Hercog, Drago. "Communication Service, Communication Protocol." In Communication Protocols, 45–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_4.
Javed, Adeel. "Communication Protocols." In Building Arduino Projects for the Internet of Things, 35–48. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1940-9_3.
Suhonen, Jukka, Mikko Kohvakka, Ville Kaseva, Timo D. Hämäläinen, and Marko Hännikäinen. "Communication Protocols." In Low-Power Wireless Sensor Networks, 27–41. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2173-3_4.
Subero, Armstrong. "Communication Protocols." In Programming Microcontrollers with Python, 185–208. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7058-5_7.
Ďud’ák, Juraj, and Gabriel Gaspar. "Communication Protocols." In Signals and Communication Technology, 1–76. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-30152-0_1.
Kanagachidambaresan, G. R., and Bharathi N. "Communication Protocols." In Sensors and Protocols for Industry 4.0, 73–112. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9007-1_3.
Yang, Ke, Meihua Xiao, Zifan Song, and Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System." In Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Qin, Xudong, Yuxin Deng, and Wenjie Du. "Verifying Quantum Communication Protocols with Ground Bisimulation." In Tools and Algorithms for the Construction and Analysis of Systems, 21–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_2.
Cowley, John. "Network Protocols." In Communications and Networking, 81–109. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_6.
Hercog, Drago. "Communication Protocol Performance." In Communication Protocols, 83–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_6.
Тези доповідей конференцій з теми "Protocoles de communications":
Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri, and Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Geromel, Paulo A., and Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet." In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.
Cruz, Tiago Rodrigo, Gustavo Cainelli, Max Feldman, and Ivan Muller. "Towards handover in IWN: a fast data collection technique." In Congresso Brasileiro de Automática - 2020. sbabra, 2020. http://dx.doi.org/10.48011/asba.v2i1.1172.
Livesey, Joseph, and Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Barcelos, Patrícia Pitthan A., Taisy Silva Weber, and Roberto Jung Drebes. "Um Toolkit para Avaliação da Intrusão de Métodos de Injeção de Falhas." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2002. http://dx.doi.org/10.5753/wtf.2002.23398.
Fritzke Jr., Udo, Luiz Alberto F. Gomes, Denis L. Silva, and Daniel M. Morais. "A Meta Protocol for Adaptable Mobile Replicated Databases." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/wtf.2007.23247.
Li, Kuang-Yu J., and B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems." In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.
Pauli, Joakim. "Service Oriented Vehicle Diagnostic Communication and Regulations." In Automotive Technical Papers. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-5050.
Tiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Звіти організацій з теми "Protocoles de communications":
Brooks, Richard R. Detecting Hidden Communications Protocols. Fort Belvoir, VA: Defense Technical Information Center, February 2013. http://dx.doi.org/10.21236/ada581858.
Adler, Micah, and Bruce M. Maggs. Protocols for Asymetric Communication Channels. Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada333259.
Carroll, J. Ritchie, and F. Russell Robertson. A COMPARISON OF PHASOR COMMUNICATIONS PROTOCOLS. Office of Scientific and Technical Information (OSTI), March 2019. http://dx.doi.org/10.2172/1504742.
P., R., P. A., P. Sijben, S. Brim, and M. Shore. Middlebox Communications (midcom) Protocol Requirements. RFC Editor, August 2002. http://dx.doi.org/10.17487/rfc3304.
Stiemerling, M., J. Quittek, and T. Taylor. Middlebox Communications (MIDCOM) Protocol Semantics. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc3989.
Barnes, M., ed. Middlebox Communications (MIDCOM) Protocol Evaluation. RFC Editor, June 2005. http://dx.doi.org/10.17487/rfc4097.
Liu, Ming T. Protocol Engineering for Multimedia Communications. Fort Belvoir, VA: Defense Technical Information Center, October 1995. http://dx.doi.org/10.21236/ada305077.
Espinoza, J., P. Sholander, and B, Van Leeuwen. Effective Protocols for Mobile Communications and Networking. Office of Scientific and Technical Information (OSTI), December 1998. http://dx.doi.org/10.2172/2758.
Moser, Louise E., and P. M. Melliar-Smith. Secure Multicast Protocols for Group Communication. Fort Belvoir, VA: Defense Technical Information Center, June 2001. http://dx.doi.org/10.21236/ada388045.
Awerbuch, Baruch, Alan Baratz, and David Peleg. Cost-Sensitive Analysis of Communication Protocols. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada237356.