To see the other types of publications on this topic, follow the link: HTTP protocols.

Dissertations / Theses on the topic 'HTTP protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'HTTP protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Harish, Kumar Ivaturi Venkata. "Performance Evaluation of OpenStack with HTTP/3." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21242.

Full text
Abstract:
In today’s technology industry, cloud refers to servers which can be accessed viainternet, and the software and database applications run on the servers [22]. Whereas cloud computing is a concept of delivering the IT resources via internet which is accessed by the users and companies. In these scenarios OpenStack is the widely used cloud software which controls large pool of IT resources like compute, storage and networking which are managed and provisioned through APIs [11]. In this technology the underlying parts are the transport protocols and web servers used for authenticating and provisi
APA, Harvard, Vancouver, ISO, and other styles
2

Dzabic, Daniel, and Jacob Mårtensson. "HTTP Based Adaptive Bitrate Streaming Protocols in Live Surveillance Systems." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153097.

Full text
Abstract:
This thesis explores possible solutions to replace Adobe Flash Player by using tools already built into modern web browsers, and explores the tradeoffs between bitrate, quality, and delay when using an adaptive bitrate for live streamed video. Using an adaptive bitrate for streamed video was found to reduce stalls in playback for the client by adapting to the available bandwidth. A newer codec can further compress the video file size while maintaining the same video quality. This can improve the viewing experience for clients on a restricted or a congested network. The tests conducted in this
APA, Harvard, Vancouver, ISO, and other styles
3

Dzabic, Daniel, and Mårtensson Jacob. "HTTP Based Adaptive Bitrate Streaming Protocols in Live Surveillance Systems." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-152793.

Full text
Abstract:
This thesis explores possible solutions to replace Adobe Flash Player by using toolsalready built into modern web browsers, and explores the tradeoffs between bitrate, qual-ity, and delay when using an adaptive bitrate for live streamed video. Using an adaptivebitrate for streamed video was found to reduce stalls in playback for the client by adapt-ing to the available bandwidth. A newer codec can further compress the video file sizewhile maintaining the same video quality. This can improve the viewing experience forclients on a restricted or a congested network. The tests conducted in this th
APA, Harvard, Vancouver, ISO, and other styles
4

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Full text
Abstract:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’a
APA, Harvard, Vancouver, ISO, and other styles
5

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne‎ (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Full text
Abstract:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unil
APA, Harvard, Vancouver, ISO, and other styles
8

UMESH, AKELLA. "Performance analysis of transmission protocols for H.265 encoder." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10873.

Full text
Abstract:
In recent years there has been a predominant increase in multimedia services such as live streaming, Video on Demand (VoD), video conferencing, videos for the learning. Streaming of high quality videos has become a challenge for service providers to enhance the user’s watching experience. The service providers cannot guarantee the perceived quality. In order to enhance the user’s expectations, it is also important to estimate the quality of video perceived by the user. There are different video streaming protocols that are used to stream from server to client. In this research, we aren’t focus
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.

Full text
Abstract:
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to
APA, Harvard, Vancouver, ISO, and other styles
10

Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.

Full text
Abstract:
Dans un monde fortement dépendant de la communication de données distribuées, la conception d’infrastructures sécurisées est une tâche cruciale. Les systèmes et réseaux distribués prennent de plus en plus d’importance, car la plupart des services et des possibilités qui caractérisent la société moderne sont basés sur ces technologies.La communication entre les agents sur les réseaux a donc suscité un grand intérêt pour la recherche. Afin de fournir des moyens de communication efficaces et fiables, de plus en plus de protocoles de communication sont inventés, et pour la plupart d’entre eux, la
APA, Harvard, Vancouver, ISO, and other styles
11

Attamah, M. K. "Epistemic gossip protocols." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001317/.

Full text
Abstract:
In this thesis we study epistemic protocols for gossip. Each agent in the gossip scenario knows a unique piece of information which is called a secret. Agents communicate with each other by means of pairwise telephone calls, and in each call the calling pair of agents exchange all the secrets they currently know. In an epistemic gossip protocol, an agent 'a' can call another agent 'b', not because it is so instructed, but because agent 'a' knows that it satisfies some knowledge-based condition defined by the protocol. The goal of gossiping is typically epistemic, for example, that after a sequ
APA, Harvard, Vancouver, ISO, and other styles
12

Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.

Full text
Abstract:
O presente estudo objetivou realizar um levantamento retrospectivo de todos os planejamentos ortodônticos realizados pelo Departamento de Ortodontia (FOB USP) desde 1973, para que pudessem ser avaliados os protocolos de tratamento escolhidos à época, principalmente quanto à decisão de extrações e suas freqüências. A amostra constitui-se inicialmente de 3745 documentações ortodônticas arquivadas pelo Departamento de Ortodontia, das quais 332 documentações foram descartadas seguindo alguns fatores de exclusão, tais como casos transferidos, desistências e informações e exames incompletos. A amo
APA, Harvard, Vancouver, ISO, and other styles
13

坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.

Full text
Abstract:
The ability of the software engineering community to achieve high levels of reuse from software frameworks has been tempered by the difficulty in understanding how to reuse them properly. When written correctly, a plugin can take advantage of the framework’s code and architecture to provide a rich application with relatively few lines of code. Unfortunately, doing this correctly is difficult because frameworks frequently require plugin developers to be aware of complex protocols between objects, and improper use of these protocols causes exceptions and unexpected behavior at run time. This dis
APA, Harvard, Vancouver, ISO, and other styles
15

Bedrax-Weiss, Tania. "Optimal search protocols /." view abstract or download file of text, 1999. http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 1999.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 206-211). Also available for download via the World Wide Web; free to University of Oregon users. Address: http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.
APA, Harvard, Vancouver, ISO, and other styles
16

Shamsher, Usama, and Xiao Jun Wang. "Evaluating Web-latency reducing Protocols in Mobile Environments." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2361.

Full text
Abstract:
User perceived latency is the most prominent performance issue influencing the World Wide Web (www) presently. Hyper-Text Transfer Protocol(HTTP) and Transmission Control Protocol (TCP) have been the backbone of web transport for decades, thus received a lot of attention recently due to end-to-end performance degradation in mobile environments. Inefficiencies of HTTP and TCP strongly affect web response time mainly in resource limited devices. HTTP compression reduces some of the burden imposed by TCP slow start phase. However, compression is still an underutilized feature of the web today [1]
APA, Harvard, Vancouver, ISO, and other styles
17

Shah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.

Full text
Abstract:
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network
APA, Harvard, Vancouver, ISO, and other styles
18

Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.

Full text
Abstract:
This thesis addresses the problem of conformance testing of communication protocol implementations. Test sequence generation techniques for finite state machines (FSM) have been developed to solve the problem of high costs of an exhaustive test. These techniques also guarantee a complete coverage of an implementation in terms of state transitions and output functions, and therefore provide a sound test of the implementation under test. In this thesis, we have modified and applied three test sequence generation techniques on the class 0 transport protocol. A local tester and executable test
APA, Harvard, Vancouver, ISO, and other styles
19

Kobeissi, Nadim. "Formal verification for real-world cryptographic protocols and implementations." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE065.

Full text
Abstract:
Les particuliers et les organisations comptent de plus en plus sur le Web et sur les applications destinées aux utilisateurs pour des cas d'utilisation comme les services bancaires en ligne, la messagerie sécurisée, le partage de documents et le vote électronique. Pour protéger la confidentialité et l'intégrité de ces communications, ces systèmes dépendent de protocoles d'authentification et d'autorisation, de constructions cryptographiques au niveau de l'application et de protocoles cryptographiques au niveau du transport. Cependant, la combinaison de ces divers mécanismes pour atteindre des
APA, Harvard, Vancouver, ISO, and other styles
20

Muhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.

Full text
Abstract:
Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfu
APA, Harvard, Vancouver, ISO, and other styles
21

Scerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.

Full text
Abstract:
Avec la généralisation d'Internet, l'usage des protocoles cryptographiques est devenu omniprésent. Étant donné leur complexité et leur l'aspect critique, une vérification formelle des protocoles cryptographiques est nécessaire.Deux principaux modèles existent pour prouver les protocoles. Le modèle symbolique définit les capacités de l'attaquant comme un ensemble fixe de règles, tandis que le modèle calculatoire interdit seulement a l'attaquant derésoudre certain problèmes difficiles. Le modèle symbolique est très abstrait et permet généralement d'automatiser les preuves, tandis que le modèle c
APA, Harvard, Vancouver, ISO, and other styles
22

O'Daniel, Graham M. "HTTP 1.2: DISTRIBUTED HTTP FOR LOAD BALANCING SERVER SYSTEMS." DigitalCommons@CalPoly, 2010. https://digitalcommons.calpoly.edu/theses/302.

Full text
Abstract:
Content hosted on the Internet must appear robust and reliable to clients relying on such content. As more clients come to rely on content from a source, that source can be subjected to high levels of load. There are a number of solutions, collectively called load balancers, which try to solve the load problem through various means. All of these solutions are workarounds for dealing with problems inherent in the medium by which content is served thereby limiting their effectiveness. HTTP, or Hypertext Transport Protocol, is the dominant mechanism behind hosting content on the Internet thro
APA, Harvard, Vancouver, ISO, and other styles
23

Sadrin, Stéphane. "Evaluation du bénéfice chez l'homme des probiotiques dans la prise en charge du syndrome de l'intestin irritable : méthodologie de l'essai contrôlé randomisé et allégations nutritionnelles et de santé." Thesis, Toulon, 2017. http://www.theses.fr/2017TOUL0007/document.

Full text
Abstract:
Une allégation de santé dans l’UE nécessite des preuves cliniques de l’efficacité et de la sécuritéd’une supplémentation nutrititionnelle. Les probiotiques, en particulier les bactéries lactiques,rentrent dans ce cadre règlementaire dans lequel l’EFSA indique que les preuves obtenues chez despatients avec des troubles fonctionnels intestinaux sont transposables chez une population de sujetssains. Le protocole LAPIBSS est un essai clinique de haute qualité méthodologique évaluantl’efficacité de 2 souches de Lactobacillus acidophilus à diminuer la sévérité des symptômes dusyndrome de l’intestin
APA, Harvard, Vancouver, ISO, and other styles
24

Papanikolaou, Nikolaos K. "Model checking quantum protocols." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/2236/.

Full text
Abstract:
This thesis describes model checking techniques for protocols arising in quantum information theory and quantum cryptography. We discuss the theory and implementation of a practical model checker, QMC, for quantum protocols. In our framework, we assume that the quantum operations performed in a protocol are restricted to those within the stabilizer formalism; while this particular set of operations is not universal for quantum computation, it allows us to develop models of several useful protocols as well as of systems involving both classical and quantum information processing. We detail the
APA, Harvard, Vancouver, ISO, and other styles
25

Clayton, Richard Vincent. "Structuring and destructuring protocols." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Powell, Dave, and Paul Cook. "Community of Programming Protocols." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/606110.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>As new products are developed for the telemetry market, network interfaces are being used for set-up and control. This paper describes the programmability of various telemetry components that are now available and discusses the internal status functions that can be returned to the user or telemetry system via the same interface that are good indicators of system health. Possible control interf
APA, Harvard, Vancouver, ISO, and other styles
27

Oberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.

Full text
Abstract:
Network protocol construction is a complex and error prone task. The challenges originate both from the inherent complexity of developing correct program code and from the distributed nature of networked systems. Protocol errors can have devastating consequences. Even so, methods for ensuring protocol correctness are currently only used to a limited extent. A central reason for this is that they are often complex and expensive to employ. In this thesis, we develop methods to perform network protocol testing and verification, with the goal to make the techniques more accessible and re
APA, Harvard, Vancouver, ISO, and other styles
29

Steine, Asgeir. "Privacy-Preserving Cryptographic Protocols." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-17284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chang, Che-Hao Albert. "Reasoning about security protocols." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wei, K.-K. "Modelling of communication protocols." Thesis, University of York, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nuggehalli, Pavan S. "Energy conscious communication protocols /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3091328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Luo, Yi. "Spatio-temporal negotiation protocols." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4972.

Full text
Abstract:
Canonical problems are simplified representations of a class of real world problems. They allow researchers to compare algorithms in a standard setting which captures the most important challenges of the real world problems being modeled. In this dissertation, we focus on negotiating a collaboration in space and time, a problem with many important real world applications. Although technically a multi-issue negotiation, we show that the problem can not be represented in a satisfactory manner by previous models. We propose the "Children in the Rectangular Forest" (CRF) model as a possible canoni
APA, Harvard, Vancouver, ISO, and other styles
34

Williams, Douglas E. "Fault-tolerant authentication protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0020/NQ58112.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ben, Ameur Chiheb. "TCP Protocol Optimization for HTTP Adaptive Streaming." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S127/document.

Full text
Abstract:
Le streaming adaptatif sur HTTP, désigné par HAS, est une technique de streaming vidéo largement déployée sur Internet. Elle utilise TCP comme protocole de transport. Elle consiste à segmenter la vidéo stockée sur un serveur web en petits segments indépendants de même durée de lecture et transcodés à plusieurs niveaux de qualité, désignés par "chunks". Le player, du côté du client HAS, demande périodiquement un nouveau chunk. Il sélectionne le niveau de qualité en se basant sur l’estimation de la bande passante du/des chunk(s) précédent(s). Étant donné que chaque client HAS est situé au sein d
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Kang. "Modeling the bandwidth sharing behavior of congestion controlled flows /." Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Barros, Gavilanes Juan Gabriel. "Réseaux de capteurs pour applications de suivi médical." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10664/1/barros.pdf.

Full text
Abstract:
Le maintien des personnes à domicile est une perspective sérieusement envisagée dans le contexte actuel de vieillissement de la population. Selon les statistiques, près d'un habitant sur trois aurait plus de 60 ans en 2050, contre un sur cinq en 2005. Cependant, les solutions actuelles de téléassistance (bouton alarme sur un collier par exemple) ont montré leurs limites. La thèse consiste à étudier des applications du futur permettant de fournir à une personne maintenue à domicile ou à l’hôpital une meilleure solution alternative fondée sur les réseaux de capteurs, capable de mesurer certai
APA, Harvard, Vancouver, ISO, and other styles
40

Lu, Jing. "Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.

Full text
Abstract:
Formal Description Techniques allow for the use of automated tools during the specification and development of communication protocols. Estelle is a standardized formal description technique developed by ISO to remove ambiguities in the specification of communication protocols and services. The UBC Estelle-C compiler automates the implementation of protocols by producing an executable C implementation directly from its Estelle specification. In this thesis, we investigate the automated protocol implementation methodology using the Estelle-C compiler. First, we describe the improvements mad
APA, Harvard, Vancouver, ISO, and other styles
41

Maciel, Luciana França Smith. "Expressão dos receptores endometriais de estrógeno e progesterona em éguas acíclicas após administração de progesterona." Botucatu, 2017. http://hdl.handle.net/11449/151275.

Full text
Abstract:
Orientador: Cezinande de Meira<br>Resumo: Progesterone (P4) is frequently used after the administration of estradiol, to prepare seasonal non-cyclic mares as embryo recipients, however previous studies have reported gestation of seasonal non-cyclic mares treated only with P4. The objective of the present study was to evaluate the gene and protein expression of estrogen receptor alpha (ERα), estrogen beta (ERβ) and progesterone (PR) in the endometrium of seasonal non-cyclic mares treated with long acting progesterone (LAP4). Eight mares were used during the seasonal anoestrus phase, uterine bio
APA, Harvard, Vancouver, ISO, and other styles
42

Koegler, Xavier. "Population protocols, games and large populations." Paris 7, 2012. http://www.theses.fr/2012PA077132.

Full text
Abstract:
Le modèle des populations protocols a été proposé pour capturer les spécificités de réseaux opportunistes constitués d'une population d'agents mobiles à la mémoire limitée capables de communications sans fil par paires. L'objet de cette thèse est d'étendre la compréhension et l'analyse des population protocols ainsi que leurs liens avec d'autres modèles de dynamiques de populations. La première contribution de cette thèse est l'étude de la traduction en terme de protocoles de population de la dynamique d'une population d'agents jouant à un jeu de manière répétée les uns contre les autres et ad
APA, Harvard, Vancouver, ISO, and other styles
43

Delignat-Lavaud, Antoine. "On the security of authentication protocols on the web." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE018/document.

Full text
Abstract:
Est-il possible de démontrer un théorème prouvant que l’accès aux données confidentielles d’un utilisateur d’un service Web (tel que GMail) nécessite la connaissance de son mot de passe, en supposant certaines hypothèses sur ce qu’un attaquant est incapable de faire (par exemple, casser des primitives cryptographiques ou accéder directement aux bases de données de Google), sans toutefois le restreindre au point d’exclure des attaques possibles en pratique?Il existe plusieurs facteurs spécifiques aux protocoles du Web qui rendent impossible une application directe des méthodes et outils existan
APA, Harvard, Vancouver, ISO, and other styles
44

Corin, Ricardo Javier. "Analysis models for security protocols." Enschede : University of Twente [Host], 2006. http://doc.utwente.nl/50892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chaidos, Pavlos Ioannis Pyrros. "Zero knowledge protocols and applications." Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/10026169/.

Full text
Abstract:
The historical goal of cryptography is to securely transmit or store a message in an insecure medium. In that era, before public key cryptography, we had two kinds of people: those who had the correct key, and those who did not. Nowadays however, we live in a complex world with equally complex goals and requirements: securely passing a note from Alice to Bob is not enough. We want Alice to use her smartphone to vote for Carol, without Bob the tallier, or anyone else learning her vote; we also want guarantees that Alice’s ballot contains a single, valid vote and we want guarantees that Bob will
APA, Harvard, Vancouver, ISO, and other styles
46

Gheorghiu, Steluta. "Network coding for transport protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2011. http://hdl.handle.net/10803/32195.

Full text
Abstract:
With the proliferation of smart devices that require Internet connectivity anytime, anywhere, and the recent technological advances that make it possible, current networked systems will have to provide a various range of services, such as content distribution, in a wide range of settings, including wireless environments. Wireless links may experience temporary losses, however, TCP, the de facto protocol for robust unicast communications, reacts by reducing the congestion window drastically and injecting less traffic in the network. Consequently the wireless links are underutilized and the
APA, Harvard, Vancouver, ISO, and other styles
47

Jaafar, Talal Mohamed. "Simulation-Based Routing Protocols Analyses." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16197.

Full text
Abstract:
A new approach to distributed network simulations that eases the burdens on the simulation developer in creating space-parallel simulations is presented. It provides a full-topology knowledge for every federate (simulator instance) to make the best routing decision to destinations simulated at other federates. Later, this technique was used to characterize the benefits of IP Anycast mechanism at large scale. Different IP Anycast scenarios were simulated in a detailed Border Gateway Protocol (BGP) simulator using a realistic large-scale AS topology. Results indicated that Anycast indeed pro
APA, Harvard, Vancouver, ISO, and other styles
48

Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.

Full text
Abstract:
Security is critical to a wide range of applications and services. Numerous security mechanisms and protocols have been developed and are widely used with today’s Internet. These protocols, which provide secrecy, authentication, and integrity control, are essential to protecting electronic information. There are many types of security protocols and mechanisms, such as symmetric key algorithms, asymmetric key algorithms, message digests, digital certificates, and secure socket layer (SSL) communication. Symmetric and asymmetric key algorithms provide secrecy. Message digests are used for authen
APA, Harvard, Vancouver, ISO, and other styles
49

Haqqani, Mujeeb. "Fast prototyping of communication protocols." Thesis, University of Ottawa (Canada), 1990. http://hdl.handle.net/10393/5718.

Full text
Abstract:
In this thesis we present a methodology and a life-cycle system for rapid implementation of communication protocols. Our proposed approach includes a scheme for automated coding and decoding of protocol (single module) formal specifications in Estelle into (and from) a KnowledgeBase(KB). An interactive experimental system, FPCP (Fast Prototyping of Communication Protocols), is designed and implemented. It automatically generates an interrogatable KnowledgeBase representation of the specification, and automatically generates an executable prototype of communication software corresponding to the
APA, Harvard, Vancouver, ISO, and other styles
50

Koh, Sunny. "Stratified protocols for mobile gaming." University of Southern Queensland, Faculty of Sciences, 2006. http://eprints.usq.edu.au/archive/00003851/.

Full text
Abstract:
[Abstract]: Mobile Games are becoming very popular. Players play games under various conditions and so we need protocols which can adapt. However, unlike the desktop, there are many issues with that of mobile communication. This dissertation proposes a stratified protocol to be implemented in order to solve these communication problems more effectively. The protocol itself dynamically adapts to the changing bandwidth capacity of the network. The term stratified means that the payload in the protocol packets is subdivided into different categories, or strata, of data which are handled different
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!