Academic literature on the topic 'Binary protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Binary protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Binary protocols"
Zhu, Xinghui, Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao, and Zhiwei Zhang. "An Unknown Protocol Identification Method for Industrial Internet." Wireless Communications and Mobile Computing 2022 (September 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/3792205.
Full textRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Full textThapliyal, Kishore, Rishi Dutt Sharma, and Anirban Pathak. "Protocols for quantum binary voting." International Journal of Quantum Information 15, no. 01 (2017): 1750007. http://dx.doi.org/10.1142/s0219749917500071.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textKim, Jongwan. "Hybrid Dynamic-Binary ALOHA Anti-Collision Protocol in RFID Systems." International Journal of Engineering & Technology 7, no. 2.15 (2018): 171. http://dx.doi.org/10.14419/ijet.v7i2.15.12566.
Full textPuspitasari, Armyta, and Sapto Priyanto. "Kecenderungan Penumpang Menggunakan Moda Kereta Api Antar Kota Dengan Penerapan Protokol Kesehatan Di Era New Normal." Jurnal Perkeretaapian Indonesia (Indonesian Railway Journal) 6, no. 1 (2022): 24–30. http://dx.doi.org/10.37367/jpi.v6i1.167.
Full textGurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.
Full textHussein, Isam, Basil Jasim, and Ramzy Ali. "A Modified BA Anti-Collision Protocol for Coping with Capture Effect and Interference in RFID Systems." Future Internet 10, no. 10 (2018): 96. http://dx.doi.org/10.3390/fi10100096.
Full textChen, Gang, and Frank L. Lewis. "Synchronizing Networked Lagrangian Systems via Binary Control Protocols." IFAC Proceedings Volumes 44, no. 1 (2011): 1225–30. http://dx.doi.org/10.3182/20110828-6-it-1002.01573.
Full textChen, Gang, Frank L. Lewis, and Lihua Xie. "Finite-time distributed consensus via binary control protocols." Automatica 47, no. 9 (2011): 1962–68. http://dx.doi.org/10.1016/j.automatica.2011.05.013.
Full textDissertations / Theses on the topic "Binary protocols"
Khanafer, Mounib. "Design of Efficient MAC Protocols for IEEE 802.15.4-based Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22816.
Full textGreau-Hamard, Pierre-Samuel. "Contribution à l’apprentissage non supervisé de protocoles pour la couche de Liaison de données dans les systèmes communicants, à l'aide des Réseaux Bayésiens." Thesis, CentraleSupélec, 2021. http://www.theses.fr/2021CSUP0009.
Full textAlcober, Jesús. "Aportación al estudio de protocolos de acceso múltiple: El protocolo ALOHA estabilizado de ventana." Doctoral thesis, Universitat Politècnica de Catalunya, 1997. http://hdl.handle.net/10803/7035.
Full textYélémou, Tiguiane. "Utilisation du taux d'erreur binaire pour améliorer la qualité de service dans les réseaux ad hoc." Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT2317/document.
Full textLopes, Cardozo David. "Finite size scaling and the critical Casimir force : Ising magnets and binary fluids." Thesis, Lyon, École normale supérieure, 2015. http://www.theses.fr/2015ENSL1025/document.
Full textRobert, Jean-Marc. "Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asymétrique, algorithmes et implantations." Thesis, Perpignan, 2015. http://www.theses.fr/2015PERP0039/document.
Full textMatloob, Haghanikar Mojgan. "Exploring students’ patterns of reasoning." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/13646.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textVenugopalakrishna, Y. R. "Data Fusion Based Physical Layer Protocols for Cognitive Radio Applications." Thesis, 2016. http://etd.iisc.ernet.in/handle/2005/2683.
Full textBook chapters on the topic "Binary protocols"
Wallis, Corrin V., and Margaret I. Boulton. "Preparation of Coat Protein-Containing Binary Vectors for Use in Agrobacterium-Mediated Transformation." In Plant Virology Protocols. Humana Press, 1998. http://dx.doi.org/10.1385/0-89603-385-6:341.
Full textCocchetti, Carlotta, Mario Maggi, and Alessandra Daphne Fisher. "The Transgender: Endocrinological Assessment." In Practical Clinical Andrology. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11701-5_21.
Full textChoi, Seungoh, Yeop Chang, Jeong-Han Yun, and Woonyon Kim. "Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_27.
Full textPandey, Pavan Kumar, and G. P. Biswas. "Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS." In Advances in Computer Science and Information Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13577-4_35.
Full textHadžiosmanović, Dina, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, and Sandro Etalle. "N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_18.
Full textAblayev, Farid, Andris Ambainis, Kamil Khadiev, and Aliya Khadieva. "Lower Bounds and Hierarchies for Quantum Memoryless Communication Protocols and Quantum Ordered Binary Decision Diagrams with Repeated Test." In SOFSEM 2018: Theory and Practice of Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-73117-9_14.
Full textYang, Chenglong, Cai Fu, Yekui Qian, Yao Hong, Guanyun Feng, and Lansheng Han. "Deep Learning-Based Reverse Method of Binary Protocol." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9129-7_42.
Full textLee, Choongin, Jeonghan Bae, and Heejo Lee. "PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2_11.
Full textYu, Tingyue, Shen Wang, and Xiangzhan Yu. "A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63859-1_39.
Full textHur, Sun, Jeong Kee Kim, and Dong Chun Lee. "Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm." In Computational Science and Its Applications – ICCSA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424826_75.
Full textConference papers on the topic "Binary protocols"
Dowsley, Rafael, Jörn Müller-Quade, and Anderson C. A. Nascimento. "On Possibility of Universally Composable Commitments Based on Noisy Channels." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2008. http://dx.doi.org/10.5753/sbseg.2008.20891.
Full textZhao, Sen, Jinfa Wang, Shouguo Yang, et al. "ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification." In 2022 IEEE 30th International Conference on Network Protocols (ICNP). IEEE, 2022. http://dx.doi.org/10.1109/icnp55882.2022.9940264.
Full textKleber, Stephan, Rens W. van der Heijden, and Frank Kargl. "Message Type Identification of Binary Network Protocols using Continuous Segment Similarity." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020. http://dx.doi.org/10.1109/infocom41043.2020.9155275.
Full textAgrawal, Jagan P., and Mary L. Gerken. "A model of the contention resolution time for binary tree protocols." In the 1992 ACM annual conference. ACM Press, 1992. http://dx.doi.org/10.1145/131214.131279.
Full textSegal-Halevi, Erel, and Warut Suksompong. "Democratic Fair Allocation of Indivisible Goods." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/67.
Full textLiao, Gen-Yih, and Hsiu-Fen Hsieh. "Analyzing Security of RFID Tag Reading Protocols Based on Binary Tree Traversal." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.115.
Full textKleber, Stephan, Frank Kargl, Milan State, and Matthias Hollick. "Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols." In 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2022. http://dx.doi.org/10.1109/dsn-w54100.2022.00023.
Full textCheng, Kuan, Zhengzhong Jin, Xin Li, and Ke Wu. "Deterministic Document Exchange Protocols, and Almost Optimal Binary Codes for Edit Errors." In 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2018. http://dx.doi.org/10.1109/focs.2018.00028.
Full textElShakankiry, Ali, and Thomas Dean. "Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols." In 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017. http://dx.doi.org/10.1109/pst.2017.00019.
Full textLadi, Gergo, Levente Buttyan, and Tamas Holczer. "Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic." In 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2018. http://dx.doi.org/10.23919/softcom.2018.8555813.
Full textReports on the topic "Binary protocols"
Allen, Jeffrey, Robert Moser, Zackery McClelland, Md Mohaiminul Islam, and Ling Liu. Phase-field modeling of nonequilibrium solidification processes in additive manufacturing. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/42605.
Full textCamarillo, G., J. Ott, and K. Drage. The Binary Floor Control Protocol (BFCP). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4582.
Full textCamarillo, G., K. Drage, T. Kristensen, J. Ott, and C. Eckel. The Binary Floor Control Protocol (BFCP). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8855.
Full textWachen, John, and Steven McGee. Qubit by Qubit’s Four-Week Quantum Computing Summer School Evaluation Report for 2021. The Learning Partnership, 2021. http://dx.doi.org/10.51420/report.2021.4.
Full textCamarillo, G. Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4583.
Full textCamarillo, G., T. Kristensen, and C. Holmberg. Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8856.
Full textLegg, S. Lightweight Directory Access Protocol (LDAP): The Binary Encoding Option. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4522.
Full textCamarillo, G. Connection Establishment in the Binary Floor Control Protocol (BFCP). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5018.
Full textPascual, V., A. Román, S. Cazeaux, G. Salgueiro, and R. Ravindranath. The WebSocket Protocol as a Transport for the Binary Floor Control Protocol (BFCP). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8857.
Full textMawassi, Munir, Adib Rowhani, Deborah A. Golino, Avichai Perl, and Edna Tanne. Rugose Wood Disease of Grapevine, Etiology and Virus Resistance in Transgenic Vines. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586477.bard.
Full text