Academic literature on the topic 'Design of protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Design of protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Design of protocols"
Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.
Full textYu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Full textSong, Jiali, Zhiwei Rong, Xinwen Zhong, et al. "Practice and Consideration of Master Protocol in Clinical Trials." Tumor Discovery 2, no. 2 (2023): 342. http://dx.doi.org/10.36922/td.342.
Full textTurilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.
Full textNguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.
Full textHe, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.
Full textN, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.
Full textAlfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (2021): 741. http://dx.doi.org/10.3390/jmse9070741.
Full textSari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (2021): 292. http://dx.doi.org/10.3390/info12080292.
Full textHayam A. Al-Yasiri and Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator." Diyala Journal of Engineering Sciences 7, no. 4 (2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.
Full textDissertations / Theses on the topic "Design of protocols"
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textalyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Full textMüffke, Friedger. "A better way to design communication protocols." Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Full textHoran, Stephen, and Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Full textRudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.
Find full textRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Full textZamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach." Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Full textLiu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Full textShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Full textSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Full textBooks on the topic "Design of protocols"
Andrew, Robinson, Cranage Martin P, and Hudson Michael, eds. Vaccine protocols. 2nd ed. Humana Press, 2003.
Find full textL, Hammond Joseph, and Pawlikowski Krzysztof, eds. Telecommunications: Protocols and design. Addison-Wesley Pub. Co., 1991.
Find full textEhud, Gazit, and Nussinov Ruth, eds. Nanostructure design: Methods and protocols. Humana, 2008.
Find full textLek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.
Find full text1947-, Robinson Andrew, Farrar Graham H, and Wiblin Christopher N, eds. Vaccine protocols. Human Press, 1996.
Find full textKan, Jeff WT, and John S. Gero. Quantitative Methods for Studying Design Protocols. Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.
Full textHolzmann, Gerard J. Design and validation of computer protocols. Prentice-Hall International, 1991.
Find full textAmerican Telephone and Telegraph Company., ed. Design and validation of computer protocols. Prentice Hall, 1991.
Find full textBook chapters on the topic "Design of protocols"
Wilson, Greg. "Protocols." In Software Design by Example. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Full textHyndman, David L., and Masato Mitsuhashi. "PCR Primer Design." In PCR Protocols. Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.
Full textHercog, Drago. "System Specification and Design." In Communication Protocols. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.
Full textHercog, Drago. "Protocol Specification and Design." In Communication Protocols. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.
Full textChoi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Full textKůr, Jiří, Václav Matyáš, and Petr Švenda. "Evolutionary Design of Attack Strategies." In Security Protocols XVII. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.
Full textŠvenda, Petr. "Evolutionary Design of Attack Strategies." In Security Protocols XVII. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.
Full textde Muro, Marilena Aquino. "Probe Design, Production, and Applications." In Springer Protocols Handbooks. Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.
Full textSarkar, Mouli, and Naveen Kumar. "De Novo Peptide Design Tools." In Springer Protocols Handbooks. Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.
Full textYu, Su-Yang, and Jeff Yan. "Security Design in Human Computation Games." In Security Protocols XVIII. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.
Full textConference papers on the topic "Design of protocols"
De Marchi, Mirco, and Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.
Full textAlvarez, Crysthal, Carla Berrospe-Rodriguez, and Guillermo Aguilar. "Digital Holography Interferometry for Thermal Imaging in Cryopreservation and Biological Systems." In Bio-Optics: Design and Application. Optica Publishing Group, 2025. https://doi.org/10.1364/boda.2025.dm3a.3.
Full textDijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.
Full textDijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.
Full textDong, Ling, Kefei Chen, Mi Wen, and Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.
Full textChiu, I., and L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.
Full textda Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli, and J. Rabaey. "Wireless protocols design." In the eighth international workshop. ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.
Full textLubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.
Full textKoh, Immanuel, Paul Keel, and Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix." In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.
Full textChiasserini, C. F., P. Nuggehalli, and V. Srinivasan. "Energy-efficient communication protocols." In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.
Full textReports on the topic "Design of protocols"
Rose, M. On the Design of Application Protocols. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3117.
Full textAmer, Paul D. Formal Design of Communication Protocols Using Estelle. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada290584.
Full textSyverson, Paul. Limitations on Design Principles for Public Key Protocols. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada465132.
Full textSerpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada484133.
Full textLebovitz, G., and M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6518.
Full textGriffin, Timothy G., Aaron D. Jaggard, and Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada461910.
Full textHerman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45100.
Full textAmer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada370116.
Full textKrunz, Marwan, and Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada591559.
Full textAng, Chwee B., and Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405072.
Full text