Dissertationen zum Thema „Reuse and protocol exchange“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Reuse and protocol exchange" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Djaffardjy, Marine. "Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.
Der volle Inhalt der QuelleSoltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Der volle Inhalt der QuelleNilsson, Kim. "Reactive Networking using Dynamic Link Exchange Protocol." Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.
Der volle Inhalt der QuelleChandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.
Der volle Inhalt der QuelleSardana, Divya. "Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.
Der volle Inhalt der QuellePage, Shannon Charles. "Testing Protocol Development for a Proton Exchange Membrane Fuel Cell." Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.
Der volle Inhalt der QuelleNinet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Der volle Inhalt der QuelleThomson, Derek Stewart. "The development of packaged, reusable building services components : a pilot study in the UK national health service." Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.
Der volle Inhalt der QuelleBuck, Randall Jay. "WiFu Transport: A User-level Protocol Framework." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.
Der volle Inhalt der QuelleGustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Der volle Inhalt der QuelleChawla, Nitin. "Registration and authentication protocol for OCEAN (Open Computation Exchange and Auctioning Network) /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1001125.
Der volle Inhalt der QuelleMyadam, Nishkal Gupta, and Bhavith Patnam. "Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20665.
Der volle Inhalt der QuelleDahlén, Marcus. "Security Architecture and Technologies for the Electronic Document Exchange with SOAP as Communication Protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2835.
Der volle Inhalt der QuelleAlotaibi, Abdullah S. "Design and evaluate a fair exchange protocol based on online trusted third party (TTP)." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7879.
Der volle Inhalt der QuelleGeary, Aaron C. "Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocol." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FGeary.pdf.
Der volle Inhalt der QuelleWatkins, E. James. "Foulant adsorption onto ion exchange membranes." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/7062.
Der volle Inhalt der Quellevan, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Der volle Inhalt der QuelleStefik, Christopher J. "Effect of protocol mouthguard on VO₂ max in female hockey players using the skating treadmill." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79136.
Der volle Inhalt der QuelleLampinen, Björn. "Protocol optimization of the filter exchange imaging (FEXI) sequence and implications on group sizes : a test-retest study." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196327.
Der volle Inhalt der QuelleAlston, Katherine Yvette. "A heuristic on the rearrangeability of shuffle-exchange networks." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2521.
Der volle Inhalt der QuelleR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Der volle Inhalt der QuelleWang, Hao-Hsien. "Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1087.
Der volle Inhalt der QuelleAndreasson, Samuel, and Jesper Palmér. "OPC UA Field eXchange Prototyping : Enabling decentralized communication using Publish/Subscribe." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45029.
Der volle Inhalt der QuelleKUNDA, SAKETH RAM. "Methods to Reuse CAD Data in Tessellated Models for Efficient Visual Configurations : An Investigation for Tacton Systems AB." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281748.
Der volle Inhalt der QuelleDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Der volle Inhalt der QuelleLluch-Ariet, Magí. "Contributions to efficient and secure exchange of networked clinical data : the MOSAIC system." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/388037.
Der volle Inhalt der QuelleAguilar, Rodriguez Adriana. "Building networks in the Climate Change Convention : co-ordination failure in the establishment of Clean Development Mechanism (CDM) in Mexico." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/building-networks-in-the-climate-change-convention--coordination-failure-in-the-establishment-of-clean-development-mechanism-cdm-in-mexico(02f1f20b-914a-4ca0-8ce0-0423ab3e6100).html.
Der volle Inhalt der QuelleShoaib, Naveed. "A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.
Der volle Inhalt der QuellePfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.
Der volle Inhalt der QuellePitchai, Karthik Raja. "An executable meta-model for safety oriented software and systems development processes within the avionics domain in compliance with RTCA DO 178 B." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-19296.
Der volle Inhalt der QuelleRozsnyó, Tomáš. "Modular Multiple Liquidity Source Price Streams Aggregator." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236492.
Der volle Inhalt der QuelleGreene, Owen J., and P. Batchelor. "Information Exchange and Transparency: Key Elements of an International Action Programme on Small Arms." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4267.
Der volle Inhalt der QuelleDhavala, Kishore. "Essays on Emissions Trading Markets." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/733.
Der volle Inhalt der QuelleHussain, Dostdar, and Muhammad Ismail. "Requirement Engineering : A comparision between Traditional requirement elicitation techniqes with user story." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-70174.
Der volle Inhalt der QuelleOlejník, Tomáš. "Zpracování obchodních dat finančního trhu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412828.
Der volle Inhalt der QuelleBehnam, Bobby. "Modélisation d'échange d'informations de composants électroniques virtuels." Grenoble INPG, 1998. http://www.theses.fr/1998INPG0126.
Der volle Inhalt der QuelleWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Der volle Inhalt der QuelleValle, Edson Cordeiro do. "Minimização do uso de água e efluentes com considerações econômicas e operacionais via programação matemática." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2005. http://hdl.handle.net/10183/8170.
Der volle Inhalt der QuelleUematsu, Akira Arice de Moura Galvão. "Algoritmos de negociação com dados de alta frequência." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45133/tde-28042012-114138/.
Der volle Inhalt der QuelleCunha, Rafael de Souza. "Protocolo de Negociação Baseado em Aprendizagem-Q para Bolsa de Valores." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/501.
Der volle Inhalt der QuelleZekri, Dorsaf. "Agrégation et extraction des connaissances dans les réseaux inter-véhicules." Thesis, Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0001/document.
Der volle Inhalt der QuelleKuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.
Der volle Inhalt der QuelleFoo, Ernest. "Strategies for designing efficient electronic payment schemes." Thesis, Queensland University of Technology, 2000.
Den vollen Inhalt der Quelle findenKrontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.
Der volle Inhalt der Quelle"Channel reuse multiple access protocol for bidirectional bus networks." Massachusetts Institute of Technology, Laboratory for Information and Decision Systems], 1992. http://hdl.handle.net/1721.1/3254.
Der volle Inhalt der QuelleChen, Huai-Hsien. "Implementation of Internet Key Exchange Protocol." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200423262600.
Der volle Inhalt der QuelleChen, Huai-Hsien, and 陳懷先. "Implementation of Internet Key Exchange Protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/61507602852405847722.
Der volle Inhalt der QuelleHSU, LIN-CHIH, and 許令芷. "Password authentication and key exchange protocol." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/59451420718306413483.
Der volle Inhalt der QuelleLee, Wei-Cheng, and 李威成. "A Fair Exchange Protocol for Internet Auction." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/94696804468461683616.
Der volle Inhalt der QuelleLi, Wen-Hui, and 李文輝. "An Efficient Three-Party Key Exchange Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59665431311256984116.
Der volle Inhalt der Quelle