Academic literature on the topic 'Binary protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Binary protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Binary protocols"
Zhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.
Full textRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Full textThapliyal, Kishore, Rishi Dutt Sharma, and Anirban Pathak. "Protocols for quantum binary voting." International Journal of Quantum Information 15, no. 01 (February 2017): 1750007. http://dx.doi.org/10.1142/s0219749917500071.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textKim, Jongwan. "Hybrid Dynamic-Binary ALOHA Anti-Collision Protocol in RFID Systems." International Journal of Engineering & Technology 7, no. 2.15 (April 6, 2018): 171. http://dx.doi.org/10.14419/ijet.v7i2.15.12566.
Full textPuspitasari, Armyta, and Sapto Priyanto. "Kecenderungan Penumpang Menggunakan Moda Kereta Api Antar Kota Dengan Penerapan Protokol Kesehatan Di Era New Normal." Jurnal Perkeretaapian Indonesia (Indonesian Railway Journal) 6, no. 1 (May 19, 2022): 24–30. http://dx.doi.org/10.37367/jpi.v6i1.167.
Full textGurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (March 20, 2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.
Full textHussein, Isam, Basil Jasim, and Ramzy Ali. "A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems." Future Internet 10, no. 10 (October 1, 2018): 96. http://dx.doi.org/10.3390/fi10100096.
Full textChen, Gang, and Frank L. Lewis. "Synchronizing Networked Lagrangian Systems via Binary Control Protocols." IFAC Proceedings Volumes 44, no. 1 (January 2011): 1225–30. http://dx.doi.org/10.3182/20110828-6-it-1002.01573.
Full textChen, Gang, Frank L. Lewis, and Lihua Xie. "Finite-time distributed consensus via binary control protocols." Automatica 47, no. 9 (September 2011): 1962–68. http://dx.doi.org/10.1016/j.automatica.2011.05.013.
Full textDissertations / Theses on the topic "Binary protocols"
Khanafer, Mounib. "Design of Efficient MAC Protocols for IEEE 802.15.4-based Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22816.
Full textGreau-Hamard, Pierre-Samuel. "Contribution à l’apprentissage non supervisé de protocoles pour la couche de Liaison de données dans les systèmes communicants, à l'aide des Réseaux Bayésiens." Thesis, CentraleSupélec, 2021. http://www.theses.fr/2021CSUP0009.
Full textThe world of telecommunications is rapidly developing, especially in the area of the Internet of Things; in such a context, it would be useful to be able to analyze any unknown protocol one might encounter. For this purpose, obtaining the state machine and frame formats of the target protocol is essential. These two elements can be extracted from network traces and/or execution traces using Protocol Reverse Engineering (PRE) techniques.By analyzing the performance of three algorithms used in PRE systems, we discovered the potential of models based on Bayesian networks. We then developed Bayesian Network Frame Format Finder (BaNet3F), our own frame format learning model based on Bayesian networks, and showed that its performance is significantly better than the state of the art. BaNet3F also includes an optimized version of the Viterbi algorithm, applicable to any Bayesian network, thanks to its ability to generate the necessary Markov boundaries itself
Alcober, Jesús. "Aportación al estudio de protocolos de acceso múltiple: El protocolo ALOHA estabilizado de ventana." Doctoral thesis, Universitat Politècnica de Catalunya, 1997. http://hdl.handle.net/10803/7035.
Full textDe partida, s'ha conjuntat la idea simple dels protocols ALOHA, amb l'eficiència dels protocols de resolució de col·lisions amb accés bloquejat, resultant una nova família de protocols que tenen unes prestacions millorades respecte als existents amb el mateix model de sistema.
Aquests protocols presentats i analitzats són una variant millorada del protocol Slotted-ALOHA estabilitzat, proposat per nombrosos autors, que aconseguien d'aquesta forma que l'algorisme arribés de forma estable a aconseguir un throughput de 0,36.
El càlcul analític dels seus paràmetres: throughput i retard, permet quantificar la bondat d'aquests algorismes i comparar-los amb els ja existents.
Els algorismes presentats aquí aconsegueixen un throughput de 0,4335 per al cas del feedback binari, 0,4365 per al cas del feedback ternario, i de 0,5052 per a un feedback òptim.
Esta tesis presenta una nueva familia de protocolos basados en contienda, los algoritmos ALOHA estabilizados de ventana (window stabilized ALOHA, WSA). Estos protocolos de acceso aleatorio tienen resolución dinámica y probabilística y se pueden seguir aplicando aún cuando el modelo de Poisson para el proceso de llegadas no sea válido.
De partida, se ha aunado la idea simple de los protocolos ALOHA, con la eficiencia de los protocolos de resolución de colisiones con acceso bloqueado, resultando una nueva familia de protocolos que tienen unas prestaciones mejoradas respecto a los existentes con el mismo modelo de sistema.
Estos protocolos presentados y analizados son una variante mejorada del protocolo Slotted-ALOHA estabilizado, propuesto por numerosos autores, que conseguían de esta forma que el algoritmo llegara de forma estable a conseguir un throughput de 0,36.
El cálculo analítico de sus parámetros: throughput y retardo, permite cuantificar la bondad de estos algoritmos y compararlos con los ya existentes.
Los algoritmos presentados aquí consiguen un throughput de 0,4335 para el caso del feedback binario, 0,4365 para el caso del feedback ternario, y de 0,5052 para un feedback óptimo.
This thesis introduces a new family of content-based protocols , the window stabilized ALOHA algorithms (WSA). These random access protocols have dynamic and probabilistic resolution and they can be applied even when the Poisson model for the arrival process would not be valid.
Initially, it has brought together the simple idea of ALOHA protocols , with the efficiency of the collision resolution protocols with blocked access , resulting in a new family of protocols that have improved performance with respect to the existing ones with the same system model.
These protocols are a improved variant protocol of Slotted-stabilized ALOHA , proposed by many authors, who get in this way that the algorithm arrive at the stable throughput of 0.36.
The analytical calculation of parameters, throughput and delay, allows quantify the goodness of these algorithms and compare them with existing ones.
The algorithms presented here provide a throughput of 0.4335 to the case of binary feedback, 0.4365 to the case of ternary feedback, and 0.5052 to optimal feedback.
Yélémou, Tiguiane. "Utilisation du taux d'erreur binaire pour améliorer la qualité de service dans les réseaux ad hoc." Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT2317/document.
Full textIn ad hoc wireless networks, links are error-prone. In this context, routing plays a decisive role inimproving transmission performances. In our studies, by a cross-layer approach, we take intoaccount the reliability of links in route choice. For this, first, we concept two new metrics, onebased on bit error rate (at physical layer) and the other, more suitable for the measurement, onnumber of retransmissions (at MAC layer). Then, to exploit these metrics when determining routes,we adapt the algorithms based routing protocols.The three families of routing protocols have been addressed: proactive protocols where eachnode has a global view of the network through periodic exchanges of topology control messages;reactive protocols where, before starting data transmission, each node must initiate a routediscovery process; hybrid protocols which mix the two approaches.To test the effectiveness of our enhancements, we use the simulator NS.2 enhanced by arealistic propagation model and a realistic mobility model. Performance parameters such as delay,packets delivery ratio and routing load are measured in several scenarios including mobility andmulti-communication. The results show a significant improvement of standard protocols in thequality of service context
Lopes, Cardozo David. "Finite size scaling and the critical Casimir force : Ising magnets and binary fluids." Thesis, Lyon, École normale supérieure, 2015. http://www.theses.fr/2015ENSL1025/document.
Full textApproaching a critical point, the divergence of the correlation length of fluctuations can be cut-off by a confinement of the system. This truncation fosters finite size effects with universal features in a class of continuous phase transitions. We are particularly interested in the Ising universality class, regrouping transitions such as the ferromagnetic/paramagnetic transition for uniaxial magnetic systems, the liquid/gas tran- sition and the demixing of binary mixtures. We will first present an introduction to critical phenomena, universality, finite-size scaling and Monte Carlo simulations of the Ising model, on which a major part of this work relies.A finite size effect that has particularly drawn attention in the past decades is the critical Casimir force. On the one hand, theoretical and numerical works on the subject have almost systematically been performed in magnetic model systems, such as the Ising or XY models. On the other hand, experimental approaches were all realized in fluid systems, such as binary mixtures or helium IV close to the superfluid transition.A motivation of this work was to bridge this gap by proposing, firstly, an experimental protocol for measuring the critical Casimir force in a magnetic layer and, secondly, a numerical approach in a Lennard-Jones binary mixture. The latter is of particular interest as it could lead the way to studying fluctuations of the Casimir force or out-of-equilibrium phenomena
Robert, Jean-Marc. "Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asymétrique, algorithmes et implantations." Thesis, Perpignan, 2015. http://www.theses.fr/2015PERP0039/document.
Full textThe development of online communications and the Internet have made encrypted data exchange fast growing. This has been possible with the development of asymmetric cryptographic protocols, which make use of arithmetic computations such as modular exponentiation of large integer or elliptic curve scalar multiplication. These computations are performed by various platforms, including smart-cards as well as large and powerful servers. The platforms are subject to attacks taking advantage of information leaked through side channels, such as instantaneous power consumption or electromagnetic radiations.In this thesis, we improve the performance of cryptographic computations resistant to Simple Power Analysis. On modular exponentiation, we propose to use multiple multiplications sharing a common operand to achieve this goal. On elliptic curve scalar multiplication, we suggest three different improvements : over binary fields, we make use of improved combined operation AB,AC and AB+CD applied to Double-and-add, Halve-and-add and Double/halve-and-add approaches, and to the Montgomery ladder ; over binary field, we propose a parallel Montgomery ladder ; we make an implementation of a parallel approach based on the Right-to-left Double-and-add algorithm over binary and prime fields, and extend this implementation to the Halve-and-add and Double/halve-and-add over binary fields
Matloob, Haghanikar Mojgan. "Exploring students’ patterns of reasoning." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/13646.
Full textDepartment of Physics
Dean Zollman
As part of a collaborative study of the science preparation of elementary school teachers, we investigated the quality of students’ reasoning and explored the relationship between sophistication of reasoning and the degree to which the courses were considered inquiry oriented. To probe students’ reasoning, we developed open-ended written content questions with the distinguishing feature of applying recently learned concepts in a new context. We devised a protocol for developing written content questions that provided a common structure for probing and classifying students’ sophistication level of reasoning. In designing our protocol, we considered several distinct criteria, and classified students’ responses based on their performance for each criterion. First, we classified concepts into three types: Descriptive, Hypothetical, and Theoretical and categorized the abstraction levels of the responses in terms of the types of concepts and the inter-relationship between the concepts. Second, we devised a rubric based on Bloom’s revised taxonomy with seven traits (both knowledge types and cognitive processes) and a defined set of criteria to evaluate each trait. Along with analyzing students’ reasoning, we visited universities and observed the courses in which the students were enrolled. We used the Reformed Teaching Observation Protocol (RTOP) to rank the courses with respect to characteristics that are valued for the inquiry courses. We conducted logistic regression for a sample of 18 courses with about 900 students and reported the results for performing logistic regression to estimate the relationship between traits of reasoning and RTOP score. In addition, we analyzed conceptual structure of students’ responses, based on conceptual classification schemes, and clustered students’ responses into six categories. We derived regression model, to estimate the relationship between the sophistication of the categories of conceptual structure and RTOP scores. However, the outcome variable with six categories required a more complicated regression model, known as multinomial logistic regression, generalized from binary logistic regression. With the large amount of collected data, we found that the likelihood of the higher cognitive processes were in favor of classes with higher measures on inquiry. However, the usage of more abstract concepts with higher order conceptual structures was less prevalent in higher RTOP courses.
Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textVenugopalakrishna, Y. R. "Data Fusion Based Physical Layer Protocols for Cognitive Radio Applications." Thesis, 2016. http://etd.iisc.ernet.in/handle/2005/2683.
Full textBook chapters on the topic "Binary protocols"
Wallis, Corrin V., and Margaret I. Boulton. "Preparation of Coat Protein-Containing Binary Vectors for Use in Agrobacterium-Mediated Transformation." In Plant Virology Protocols, 341–52. Totowa, NJ: Humana Press, 1998. http://dx.doi.org/10.1385/0-89603-385-6:341.
Full textCocchetti, Carlotta, Mario Maggi, and Alessandra Daphne Fisher. "The Transgender: Endocrinological Assessment." In Practical Clinical Andrology, 273–82. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_21.
Full textChoi, Seungoh, Yeop Chang, Jeong-Han Yun, and Woonyon Kim. "Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System." In Information Security Applications, 345–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_27.
Full textPandey, Pavan Kumar, and G. P. Biswas. "Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS." In Advances in Computer Science and Information Technology, 397–408. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13577-4_35.
Full textHadžiosmanović, Dina, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, and Sandro Etalle. "N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols." In Research in Attacks, Intrusions, and Defenses, 354–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_18.
Full textAblayev, Farid, Andris Ambainis, Kamil Khadiev, and Aliya Khadieva. "Lower Bounds and Hierarchies for Quantum Memoryless Communication Protocols and Quantum Ordered Binary Decision Diagrams with Repeated Test." In SOFSEM 2018: Theory and Practice of Computer Science, 197–211. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-73117-9_14.
Full textYang, Chenglong, Cai Fu, Yekui Qian, Yao Hong, Guanyun Feng, and Lansheng Han. "Deep Learning-Based Reverse Method of Binary Protocol." In Communications in Computer and Information Science, 606–24. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9129-7_42.
Full textLee, Choongin, Jeonghan Bae, and Heejo Lee. "PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces." In ICT Systems Security and Privacy Protection, 141–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2_11.
Full textYu, Tingyue, Shen Wang, and Xiangzhan Yu. "A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes." In Advances in Intelligent Information Hiding and Multimedia Signal Processing, 318–26. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63859-1_39.
Full textHur, Sun, Jeong Kee Kim, and Dong Chun Lee. "Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm." In Computational Science and Its Applications – ICCSA 2005, 714–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424826_75.
Full textConference papers on the topic "Binary protocols"
Dowsley, Rafael, Jörn Müller-Quade, and Anderson C. A. Nascimento. "On Possibility of Universally Composable Commitments Based on Noisy Channels." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2008. http://dx.doi.org/10.5753/sbseg.2008.20891.
Full textZhao, Sen, Jinfa Wang, Shouguo Yang, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, and Limin Sun. "ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification." In 2022 IEEE 30th International Conference on Network Protocols (ICNP). IEEE, 2022. http://dx.doi.org/10.1109/icnp55882.2022.9940264.
Full textKleber, Stephan, Rens W. van der Heijden, and Frank Kargl. "Message Type Identification of Binary Network Protocols using Continuous Segment Similarity." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020. http://dx.doi.org/10.1109/infocom41043.2020.9155275.
Full textAgrawal, Jagan P., and Mary L. Gerken. "A model of the contention resolution time for binary tree protocols." In the 1992 ACM annual conference. New York, New York, USA: ACM Press, 1992. http://dx.doi.org/10.1145/131214.131279.
Full textSegal-Halevi, Erel, and Warut Suksompong. "Democratic Fair Allocation of Indivisible Goods." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/67.
Full textLiao, Gen-Yih, and Hsiu-Fen Hsieh. "Analyzing Security of RFID Tag Reading Protocols Based on Binary Tree Traversal." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.115.
Full textKleber, Stephan, Frank Kargl, Milan State, and Matthias Hollick. "Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols." In 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2022. http://dx.doi.org/10.1109/dsn-w54100.2022.00023.
Full textCheng, Kuan, Zhengzhong Jin, Xin Li, and Ke Wu. "Deterministic Document Exchange Protocols, and Almost Optimal Binary Codes for Edit Errors." In 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2018. http://dx.doi.org/10.1109/focs.2018.00028.
Full textElShakankiry, Ali, and Thomas Dean. "Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols." In 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017. http://dx.doi.org/10.1109/pst.2017.00019.
Full textLadi, Gergo, Levente Buttyan, and Tamas Holczer. "Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic." In 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2018. http://dx.doi.org/10.23919/softcom.2018.8555813.
Full textReports on the topic "Binary protocols"
Allen, Jeffrey, Robert Moser, Zackery McClelland, Md Mohaiminul Islam, and Ling Liu. Phase-field modeling of nonequilibrium solidification processes in additive manufacturing. Engineer Research and Development Center (U.S.), December 2021. http://dx.doi.org/10.21079/11681/42605.
Full textCamarillo, G., J. Ott, and K. Drage. The Binary Floor Control Protocol (BFCP). RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4582.
Full textCamarillo, G., K. Drage, T. Kristensen, J. Ott, and C. Eckel. The Binary Floor Control Protocol (BFCP). RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8855.
Full textWachen, John, and Steven McGee. Qubit by Qubit’s Four-Week Quantum Computing Summer School Evaluation Report for 2021. The Learning Partnership, September 2021. http://dx.doi.org/10.51420/report.2021.4.
Full textCamarillo, G. Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams. RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4583.
Full textCamarillo, G., T. Kristensen, and C. Holmberg. Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams. RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8856.
Full textLegg, S. Lightweight Directory Access Protocol (LDAP): The Binary Encoding Option. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4522.
Full textCamarillo, G. Connection Establishment in the Binary Floor Control Protocol (BFCP). RFC Editor, September 2007. http://dx.doi.org/10.17487/rfc5018.
Full textPascual, V., A. Román, S. Cazeaux, G. Salgueiro, and R. Ravindranath. The WebSocket Protocol as a Transport for the Binary Floor Control Protocol (BFCP). RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8857.
Full textMawassi, Munir, Adib Rowhani, Deborah A. Golino, Avichai Perl, and Edna Tanne. Rugose Wood Disease of Grapevine, Etiology and Virus Resistance in Transgenic Vines. United States Department of Agriculture, November 2003. http://dx.doi.org/10.32747/2003.7586477.bard.
Full text