Academic literature on the topic 'Design of protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Design of protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Design of protocols"

1

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Full text
Abstract:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.

Full text
Abstract:
Based on the study of existing RFID security protocols and RFID anti-collision algorithms, this paper proposes a processing mechanism integrating lightweight random key double-authentication and dynamic slot-ALOHA protocol. The mechanism is simple, practical, and compatible with EPC Gen2 standards. Research shows that comparing with the other security protocols and anti-collision protocols, the new mechanism has a little complexity and tag-cost.
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Jiali, Zhiwei Rong, Xinwen Zhong, et al. "Practice and Consideration of Master Protocol in Clinical Trials." Tumor Discovery 2, no. 2 (2023): 342. http://dx.doi.org/10.36922/td.342.

Full text
Abstract:
There is great interest in accelerating late-stage therapy development by efficiently performing a trial design with multiple therapies or multiple subpopulations simultaneously under a single protocol. The master protocols are termed to describe the design of such trials, with a variety of terms such as umbrella, basket, or platform describing specific designs, which are, in contrast to the traditional trial designs, full of complexity. What should we consider in designing a trial ensuring the safety of human subjects and demonstrating the efficacy of new therapy? This paper overviews the mas
APA, Harvard, Vancouver, ISO, and other styles
4

Turilli, Matteo. "Ethical protocols design." Ethics and Information Technology 9, no. 1 (2007): 49–62. http://dx.doi.org/10.1007/s10676-006-9128-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Philon, Thanh An Nguyen, and Yong Zeng. "Segmentation of design protocol using EEG." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 33, no. 1 (2018): 11–23. http://dx.doi.org/10.1017/s0890060417000622.

Full text
Abstract:
AbstractDesign protocol data analysis methods form a well-known set of techniques used by design researchers to further understand the conceptual design process. Verbal protocols are a popular technique used to analyze design activities. However, verbal protocols are known to have some limitations. A recurring problem in design protocol analysis is to segment and code protocol data into logical and semantic units. This is usually a manual step and little work has been done on fully automated segmentation techniques. Physiological signals such as electroencephalograms (EEG) can provide assistan
APA, Harvard, Vancouver, ISO, and other styles
6

He, Jiayue, Jennifer Rexford, and Mung Chiang. "Don't optimize existing protocols, design optimizable protocols." ACM SIGCOMM Computer Communication Review 37, no. 3 (2007): 53–58. http://dx.doi.org/10.1145/1273445.1273452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

N, Hemanthraju. "A Review on Design Implementation and Verification of AMBA AXI- 4 lite Protocol for SoC Integration." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2321–26. http://dx.doi.org/10.22214/ijraset.2022.44313.

Full text
Abstract:
Abstract: The present modern bus protocols used for communication between different functional blocks on a System-on-Chip (Soc) designs face many different challenges among which complexity and communication management are the most important factors. These on-chip communications directly impact performance and functionality, hence depending on the application where the bus protocol is to be used, a perfect communication protocol is chosen. AMBA (Advanced Microcontroller Bus Architecture) provides various types of protocols to be used as IP, of which AXI4 (Advance Extensible Interface), is one
APA, Harvard, Vancouver, ISO, and other styles
8

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, r
APA, Harvard, Vancouver, ISO, and other styles
9

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (2021): 292. http://dx.doi.org/10.3390/info12080292.

Full text
Abstract:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of
APA, Harvard, Vancouver, ISO, and other styles
10

Hayam A. Al-Yasiri and Nyan D. Sallman. "Design and Implementation of Mobile Computing Simulator." Diyala Journal of Engineering Sciences 7, no. 4 (2014): 1–23. http://dx.doi.org/10.24237/djes.2014.07401.

Full text
Abstract:
The Rapid progress in communications and wireless technology, especially in mobile computing, resulted in wide area of development in design, control and simulation of protocols that manage the wireless network. In this paper, a software simulator package has been designed, implemented and analyzed to simulate Internet Mobile Host Protocol (IMHP), Multicast Routing Protocol (MRP) and Handoff operation, which feature both route optimization and integrated authentication of all management packets.The simulator coverage area includes three extendable subnets (LANs) with ten mobile hosts moving ei
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Design of protocols"

1

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
2

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Full text
Abstract:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagra
APA, Harvard, Vancouver, ISO, and other styles
3

Müffke, Friedger. "A better way to design communication protocols." Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Horan, Stephen, and Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>The design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW
APA, Harvard, Vancouver, ISO, and other styles
5

Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.

Full text
Abstract:
Avec l’essor de l'Industrie 4.0, de nombreuses infrastructures ont été contraintes d’ouvrir leurs réseaux à Internet, principalement pour répondre au besoin croissant de supervision et de contrôle à distance. Mais là où ces infrastructures étaient auparavant isolées, épargnées par les menaces extérieures, leur ouverture a provoqué l’émergence de nouveaux risques, en particulier à travers le réseau, potentiellement sérieux et qui ne sont pas couverts.Les solutions de cybersécurité, comme les pare-feux, les systèmes de détection d’intrusion ou les systèmes de protection contre les intrusions, so
APA, Harvard, Vancouver, ISO, and other styles
7

Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach." Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.

Full text
Abstract:
This thesis presents Algorithmic State Machine (ASM) designs that follow the One Cycle Demand Driven Convention (OCDDC) of three cryptographic protocols: Secure Distributed Multiplication (SDM), Pi Secure Distributed Multiplication (PiSDM, or secure distributed multiplication of a sequence), and Secure Comparison (SC), all of which achieve maximum throughput of 1/32, 1/(32(l - 1)), and 1/(32(l - 1)), respectively, for l-bit numbers. In addition, these protocols where implemented in VHDL and tested using ModelSim-Altera, verifying their correct functionality. Noting that the difference between
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Subramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Design of protocols"

1

name, No. Vaccine protocols. 2nd ed. Humana Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andrew, Robinson, Cranage Martin P, and Hudson Michael, eds. Vaccine protocols. 2nd ed. Humana Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

L, Hammond Joseph, and Pawlikowski Krzysztof, eds. Telecommunications: Protocols and design. Addison-Wesley Pub. Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sharp, Robin. Principles of protocol design. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ehud, Gazit, and Nussinov Ruth, eds. Nanostructure design: Methods and protocols. Humana, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1947-, Robinson Andrew, Farrar Graham H, and Wiblin Christopher N, eds. Vaccine protocols. Human Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kan, Jeff WT, and John S. Gero. Quantitative Methods for Studying Design Protocols. Springer Netherlands, 2017. http://dx.doi.org/10.1007/978-94-024-0984-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holzmann, Gerard J. Design and validation of computer protocols. Prentice-Hall International, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

American Telephone and Telegraph Company., ed. Design and validation of computer protocols. Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Design of protocols"

1

Wilson, Greg. "Protocols." In Software Design by Example. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hyndman, David L., and Masato Mitsuhashi. "PCR Primer Design." In PCR Protocols. Humana Press, 2003. http://dx.doi.org/10.1007/978-1-4612-0055-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hercog, Drago. "System Specification and Design." In Communication Protocols. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hercog, Drago. "Protocol Specification and Design." In Communication Protocols. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Choi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.

Full text
Abstract:
AbstractCache-coherence protocols have been one of the greatest challenges in formal verification of hardware, due to their central complication of executing multiple memory-access transactions concurrently within a distributed message-passing system. In this paper, we introduce Hemiola, a framework embedded in Coq that guides the user to design protocols that never experience inconsistent interleavings while handling transactions concurrently. The framework provides a DSL, where any protocol designed in the DSL always satisfies the serializability property, allowing a user to verify the protocol assuming that transactions are executed one-at-a-time. Hemiola also provides a novel invariant proof method, for protocols designed in Hemiola, that only requires considering execution histories without interleaved memory accesses. We used Hemiola to design and prove hierarchical MSI and MESI protocols as case studies. We also demonstrated that the case-study protocols are hardware-synthesizable, by using a compilation/synthesis toolchain targeting FPGAs.
APA, Harvard, Vancouver, ISO, and other styles
6

Kůr, Jiří, Václav Matyáš, and Petr Švenda. "Evolutionary Design of Attack Strategies." In Security Protocols XVII. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Švenda, Petr. "Evolutionary Design of Attack Strategies." In Security Protocols XVII. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36213-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

de Muro, Marilena Aquino. "Probe Design, Production, and Applications." In Springer Protocols Handbooks. Humana Press, 2008. http://dx.doi.org/10.1007/978-1-60327-375-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sarkar, Mouli, and Naveen Kumar. "De Novo Peptide Design Tools." In Springer Protocols Handbooks. Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3405-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Su-Yang, and Jeff Yan. "Security Design in Human Computation Games." In Security Protocols XVIII. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45921-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Design of protocols"

1

De Marchi, Mirco, and Nicola Bombieri. "Orchestration-Aware Optimization of ROS2 Communication Protocols." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alvarez, Crysthal, Carla Berrospe-Rodriguez, and Guillermo Aguilar. "Digital Holography Interferometry for Thermal Imaging in Cryopreservation and Biological Systems." In Bio-Optics: Design and Application. Optica Publishing Group, 2025. https://doi.org/10.1364/boda.2025.dm3a.3.

Full text
Abstract:
Digital Holography Interferometry (DHI) provides non-invasive thermal imaging for studying supercooling and superheating in cryopreservation applications. DHI enables precise temperature and refractive index mapping, optimizing protocols, and demonstrating broader applications in biological systems and biophotonics.
APA, Harvard, Vancouver, ISO, and other styles
3

Dijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date2014.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dijk, Marten van, and Ulrich Ruhrmair. "Protocol attacks on advanced PUF protocols and countermeasures." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dong, Ling, Kefei Chen, Mi Wen, and Yanfei Zheng. "Protocol Engineering Principles for Cryptographic Protocols Design." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chiu, I., and L. H. Shu. "Potential Limitations of Verbal Protocols in Design Experiments." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28675.

Full text
Abstract:
Contradictory results of a recent design stimulation and creativity experiment prompted us to re-examine our chosen methodological approach, namely the use of verbal protocols. We used verbal protocols to study design cognition associated with stimulus use. Our results showed that use of stimuli did not increase concept creativity, contradicting much of the design literature. After eliminating other possible errors, we re-examined the experimental methodology to identify potential design-specific limitations associated with verbal protocols. Many researchers have used verbal protocol experimen
APA, Harvard, Vancouver, ISO, and other styles
7

da Silva, J. L., M. Sgroi, F. De Bernardinis, S. F. Li, A. Sangiovanni-Vincentelli, and J. Rabaey. "Wireless protocols design." In the eighth international workshop. ACM Press, 2000. http://dx.doi.org/10.1145/334012.334044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lubell, Joshua. "The Application Protocol Information Base World Wide Web Gateway." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4297.

Full text
Abstract:
Abstract The Application Protocol Information Base (APIB) is an on-line repository of documents for the Standard for the Exchange of Product model data (STEP, officially ISO 10303 — Product Data Representation and Exchange). Document types in the APIB include STEP Application Protocols and Integrated Resources. Application Protocols are standards that are intended to be implemented in software systems, and Integrated Resources are used by them as building blocks. Application Protocols and Integrated Resources are represented in the Standard Generalized Markup Language (SGML) in the APIB in ord
APA, Harvard, Vancouver, ISO, and other styles
9

Koh, Immanuel, Paul Keel, and Jeffrey Huang. "Decoding Parametric Design Data - Towards a Heterogeneous Design Search Space Remix." In CAADRIA 2017: Protocols, Flows, and Glitches. CAADRIA, 2017. http://dx.doi.org/10.52842/conf.caadria.2017.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chiasserini, C. F., P. Nuggehalli, and V. Srinivasan. "Energy-efficient communication protocols." In Proceedings of 39th Design Automation Conference. IEEE, 2002. http://dx.doi.org/10.1109/dac.2002.1012736.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Design of protocols"

1

Rose, M. On the Design of Application Protocols. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amer, Paul D. Formal Design of Communication Protocols Using Estelle. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada290584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Syverson, Paul. Limitations on Design Principles for Public Key Protocols. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada465132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Serpedin, Erchin. Design of Efficient Synchronization Protocols for Wireless Airborne Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada484133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lebovitz, G., and M. Bhatia. Keying and Authentication for Routing Protocols (KARP) Design Guidelines. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Griffin, Timothy G., Aaron D. Jaggard, and Vijay Ramachandran. Design Principles of Policy Languages for Path-Vector Protocols. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada461910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Herman, Brook. Evaluation of methods for monitoring herbaceous vegetation. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45100.

Full text
Abstract:
This special report seeks to advance the field of ecological restoration by reviewing selected reports on the processes, procedures, and protocols associated with monitoring of ecological restoration projects. Specifically, this report identifies selected published herbaceous vegetation monitoring protocols at the national, regional, and local levels and then evaluates the recommended sampling design and methods from these identified protocols. Finally, the report analyzes the sampling designs and methods in the context of monitoring restored herbaceous vegetation at US Army Corps of Engineers
APA, Harvard, Vancouver, ISO, and other styles
8

Amer, Paul D. Formal Design of Communication Protocols Based on The Estelle ISO Formal Description Technique. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada370116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krunz, Marwan, and Ricardo G. Sanfelice. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada591559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ang, Chwee B., and Shimon Y. Nof. Design Issues for Information Assurance with Agents: Coordination Protocols and Role Combination in Agents. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!