To see the other types of publications on this topic, follow the link: Protocollo SPI.

Journal articles on the topic 'Protocollo SPI'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protocollo SPI.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Salcedo, Octavio, Danilo López, and Cesar A. Hernández. "Estudio comparativo de la utilización de ancho de banda con los protocolos SIP e IAX." Revista Tecnura 16, no. 34 (December 4, 2012): 171. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.4.a12.

Full text
Abstract:
Dentro de los ambientes de voz sobre IP, existen tres protocolos que resuelven el problema de la señalización de paquetes de voz. A estos protocolos se les conoce con el nombre de “highlight protocols” (protocolos de realce) y son: H323, SIP e IAX. Este artículo se enfoca, particularmente, en una de las diferencias específicas entre SIP e IAX: el uso del ancho de banda, que es un parámetro esencial al momento de diseñar y optimizar una red VoIP para una compañía. Uno de los factores más importantes que se deben considerar al momento de construir redes VoIP es la capacidad de planeación adecuada. Con respecto a la capacidad de planeación, el cálculo del ancho de banda es un factor importante que se debe considerar al momento de diseñar y solucionar problemas en redes de voz empaquetada; de manera tal, que se garantice calidad en la voz. Este artículo brinda explicaciones importantes acerca del uso del ancho de banda sobre las redes VoIP. Se incluyen fundamentos teóricos y cálculos de ancho de banda por flujo para una troncal VoIP, en la cual se habilitan varios codecs de voz (específicamente G.711 y GSM) junto con un protocolo VoIP tal como SIP e IAX.
APA, Harvard, Vancouver, ISO, and other styles
2

Cha, Eun-Chul, and Hyoung-Kee Choi. "Evaluation of Security Protocols for the Session Initiation Protocol." KIPS Transactions:PartC 14C, no. 1 (February 28, 2007): 55–64. http://dx.doi.org/10.3745/kipstc.2007.14-c.1.055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leens, Frederic. "An introduction to I2C and SPI protocols." IEEE Instrumentation & Measurement Magazine 12, no. 1 (February 2009): 8–13. http://dx.doi.org/10.1109/mim.2009.4762946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Visconti, P., G. Giannotta, R. Brama, P. Primiceri, A. Malvasi, and A. Centuori. "FEATURES, OPERATION PRINCIPLE AND LIMITS OF SPI AND I2C COMMUNICATION PROTOCOLS FOR SMART OBJECTS: A NOVEL SPI-BASED HYBRID PROTOCOL ESPECIALLY SUITABLE FOR IoT APPLICATIONS." International Journal on Smart Sensing and Intelligent Systems 10, no. 2 (2017): 262–95. http://dx.doi.org/10.21307/ijssis-2017-211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abadi, Martı́n, and Andrew D. Gordon. "A Calculus for Cryptographic Protocols: The Spi Calculus." Information and Computation 148, no. 1 (January 1999): 1–70. http://dx.doi.org/10.1006/inco.1998.2740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kulkarni, Aman, and S. M. Sakthivel. "UVM methodology based functional Verification of SPI Protocol." Journal of Physics: Conference Series 1716 (December 2020): 012035. http://dx.doi.org/10.1088/1742-6596/1716/1/012035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tae, Jang-Won, and Jin-Suk Kwak. "A Study on the VoIP Security Countermeasure of SIP-based." Journal of Korea Navigation Institute 17, no. 4 (August 30, 2013): 421–28. http://dx.doi.org/10.12673/jkoni.2013.17.4.421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deering, S. E. "SIP: Simple Internet Protocol." IEEE Network 7, no. 3 (May 1993): 16–28. http://dx.doi.org/10.1109/65.224022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gurbani, Vijay K., Tsun-Chieh Chiang, and Suresh Kumar. "SIP: A routing protocol." Bell Labs Technical Journal 6, no. 2 (August 14, 2002): 136–52. http://dx.doi.org/10.1002/bltj.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pironti, Alfredo, and Riccardo Sisto. "Provably correct Java implementations of Spi Calculus security protocols specifications." Computers & Security 29, no. 3 (May 2010): 302–14. http://dx.doi.org/10.1016/j.cose.2009.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

G, Edwar Jacinto, Fredy H. Martínez S, and Holman Montiel A. "Temperature Control on FPGA using SPI Protocol with Thermopar Max6675k." International Journal of Engineering and Technology 10, no. 6 (December 31, 2018): 1603–10. http://dx.doi.org/10.21817/ijet/2018/v10i6/181006018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Vadagaonkar, Kamlesh S., Hanuman P. Kalmode, Kaliyappan Murugan, and Atul C. Chaskar. "I2 catalyzed tandem protocol for synthesis of quinoxalines via sp3, sp2 and sp C–H functionalization." RSC Advances 5, no. 8 (2015): 5580–90. http://dx.doi.org/10.1039/c4ra08589b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Meireles, José Kleber Soares de. "Tracionamento lento de incisivo central superior: chaves para o sucesso." Revista Clínica de Ortodontia Dental Press 19, no. 4 (October 6, 2020): 80–93. http://dx.doi.org/10.14436/1676-6849.19.4.080-093.spc.

Full text
Abstract:
INTRODUÇÃO: A extrusão ortodôntica lenta para desenvolvimento ósseo em áreas de defeitos ósseos verticais é uma técnica bastante difundida na literatura ortodôntica e tem bases científicas sólidas. Forças aplicadas ao dente em direção oclusal alongam os feixes de fibras gengivais e periodontais, gerando uma tensão osteogênica. Como consequência desse processo, o movimento extrusivo resulta na redução da profundidade de bolsa, aumento do suporte ósseo e mudança na arquitetura dos tecidos moles e duros. OBJETIVOS: O presente trabalho descreve um protocolo clínico para tracionamento lento de incisivos superiores com uso de aparelho fixo e degraus de extrusão sequenciais. Um caso clínico será usado para ilustrar o referido protocolo.
APA, Harvard, Vancouver, ISO, and other styles
14

Al-Refai, Hasan, and Khaldoun Batiha. "Enhancing formal specification and verification of e-commerce protocol." Journal of Advanced Computer Science & Technology 6, no. 1 (February 26, 2017): 13. http://dx.doi.org/10.14419/jacst.v6i1.6713.

Full text
Abstract:
Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, since there are areas, which require further study such as: E-payment phase in SET protocol.E-payment phase is vast and complex phase it has long series of steps. The behavior of environment is assumed by the phase and is restricted to the rules built by their proposed protocol. This paper will follow Ph-Spi calculus for formalizing and analyzing enhanced payment phase of SET protocol by reducing the number of transactions with many additional operators.A new agent controller will be formally modeled, which we can rely upon to make automated decisions during interaction with a dynamic protocol environment. So, this agent controller is used to terminate the transaction process in any case of fraud or attack. This paper is conjunction between our previous works of E-payment phase in SET protocol and other works in Ph-Spi calculus in purpose of analyzing and proving the main security properties: authentication and privacy to evaluate the efficiency of the enhanced security of electronic payment phase for SET protocol (E-SET) using Ph-Spi calculus.
APA, Harvard, Vancouver, ISO, and other styles
15

Trunin, P. A., L. S. Prokhorenko, D. S. Mishchenkov, and D. D. Klimov. "Development of Protocol-Independent Modular Architecture for Three Axis Force Sensor Data Processing." Programmnaya Ingeneria 12, no. 1 (January 22, 2021): 3–7. http://dx.doi.org/10.17587/prin.12.3-7.

Full text
Abstract:
The protocol-independent architecture for three axis force sensor data processing is considered. The force sensor is based on a MLX90393 triaxial magnetic sensor, capable of transmitting data via SPI protocol or I2C protocol, depending on the force sensor modification. The data generated by the MLX90393 requires additional processing before usage. To address this issue a software library is developed. Such a library shall provide means for protocol selection based on the force sensor modification. Three alternative architectural library implementations are consid­ered: the two independent program modules for both SPI and I2C protocol data transmission and processing, the two dependent program modules for SPI and I2C data transmission and one template-based module for the data processing, the two dependent program modules for SPI and I2C data transmission based on a single abstract class and the data processing module working with a pointer to the abstract class implementation. Three experimental library implementations are developed, nine experiments are performed with varying library usage setups, supplemented with one experiment with no data processing for the reference. Various criteria are considered, both quantitative and qualitative, including, but not limited to the compiled program size and the ease of library integration. The experimental results are analysed with the help of stated criteria, conclusions and practical recommendations are made.
APA, Harvard, Vancouver, ISO, and other styles
16

Holzmann, Gerard J. "Standardized protocol interfaces." Software: Practice and Experience 23, no. 7 (July 1993): 711–31. http://dx.doi.org/10.1002/spe.4380230703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Yun, Ha-Na, and Hyung-Woo Lee. "Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack." Journal of the Korea Contents Association 10, no. 1 (January 28, 2010): 46–58. http://dx.doi.org/10.5392/jkca.2010.10.1.046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shi, Min. "SIP Network Secure Communication Model Based on Improved SIP Protocol." International Journal of Autonomous and Adaptive Communications Systems 14, no. 1/2 (2021): 1. http://dx.doi.org/10.1504/ijaacs.2021.10032394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Min, Shi. "SIP network secure communication model based on improved SIP protocol." International Journal of Autonomous and Adaptive Communications Systems 14, no. 1/2 (2021): 48. http://dx.doi.org/10.1504/ijaacs.2021.114271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hutchinson, Norman C., Shivakant Mishra, Larry L. Peterson, and Vicraj T. Thomas. "Tools for implementing network protocols." Software: Practice and Experience 19, no. 9 (September 1989): 895–916. http://dx.doi.org/10.1002/spe.4380190906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

DHURY, S. CHOU, G. K. SINGH, and R. M. ME HRA. "Design and Verification Serial Peripheral Interface (SPI) Protocol for Low Power Applications." International Journal of Innovative Research in Science, Engineering and Technology 03, no. 10 (October 15, 2014): 16750–58. http://dx.doi.org/10.15680/ijirset.2014.0310048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Holzmann, Gerard J. "An improved protocol reachability analysis technique." Software: Practice and Experience 18, no. 2 (February 1988): 137–61. http://dx.doi.org/10.1002/spe.4380180203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hernek, Diane, and David P. Anderson. "Efficient automated protocol implementation using RTAG." Software: Practice and Experience 20, no. 9 (September 1990): 869–85. http://dx.doi.org/10.1002/spe.4380200903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Snow, C. R. "A multi-protocol campus time server." Software: Practice and Experience 21, no. 9 (September 1991): 907–22. http://dx.doi.org/10.1002/spe.4380210903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kam, Ben W. Y., and Thomas R. Dean. "Linguistic security testing for text communication protocols." Software: Practice and Experience 43, no. 9 (January 25, 2012): 1103–20. http://dx.doi.org/10.1002/spe.2108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Valenzano, A., R. Sisto, and L. Ciminiera. "Rapid prototyping of protocols from LOTOS specifications." Software: Practice and Experience 23, no. 1 (January 1993): 31–54. http://dx.doi.org/10.1002/spe.4380230104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cotroneo, R., M. Dazi, R. Gigli, C. Guidetti, A. Pingi, G. Cantore, and F. Chiappetta. "Studio Angio-RM degli aneurismi intracranici embolizzati con GDC." Rivista di Neuroradiologia 10, no. 2_suppl (October 1997): 142. http://dx.doi.org/10.1177/19714009970100s256.

Full text
Abstract:
Gli autori presentano 18 casi di pazienti portatori di aneurismi cerebrali sottoposti ad embolizzazione mediante uso di spirali a distacco elettrolitico (GDC), controllati a distanza di tre e sei mesi con Angio-RM 3D TOF. Come è noto il protocollo internazionale prevede controlli angiografici a distanza di una settimana, tre mesi, sei mesi, un anno, per gli aneurismi spiralizzati con GDC. Il fine è di controllare una eventuale riabilitazione dell'aneurisma o un aumento delle dimensioni del colletto qualora questi non fosse stato totalmente obliterato. Gli autori hanno suddiviso gli aneurismi in base alle dimensioni della sacca (<1 cm, 1–2.5 cm, >2.5 cm) e in base alle dimensioni del colletto (<4 mm o >4 mm). Inoltre gli aneurismi sono stati suddivisi, dopo il trattamento, in totalmente embolizzati, parzialmente embolizzati, ed embolizzati con residuo di colletto. Al fine di evitare ai pazienti ripetuti esami angiografici con i rischi connessi alla somministrazione di m.d.c. iodato ed a ripetuti traumatismi nelle sedi di puntura, gli AA. hanno ipotizzato di verificare possibilità alternative di immagine. La presenza delle spirali di platino rende, per i noti artefatti, di difficile interpretazione l'Angio-TC con ricostruzione tridimensionale. L'Angio-RM presenta limiti per artefatti dovuti a caduta di segnale proprio in prossimità del colletto dell'aneurisma per turbolenze di flusso. Tale turbolenza è un aspetto fisico che si presenta quanto la sacca aneurismatica è pervia; una volta obliterata il flusso dovrebbe risultare più regolare. Per confermare tale ipotesi, sono state confrontate le Angiografie digitali eseguite a tre e sei mesi dalla spiralizzazione con le Angio-RM eseguite nello stesso periodo tutte con il medesimo tomografo a RM di media intensità di campo (0,5T). Gli autori illustrano i risultati, i limiti e discutono le indicazioni di un protocollo di Angio-RM per alcuni aneurismi sottoposti a embolizzazione.
APA, Harvard, Vancouver, ISO, and other styles
28

Simon, Robert, and Paul Rabinovich. "Rapid simulator development for multicast protocol analysis." Software: Practice and Experience 32, no. 1 (2001): 1–23. http://dx.doi.org/10.1002/spe.425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Snow, C. R., and H. Whitfield. "An experiment with the newcastle connection protocol." Software: Practice and Experience 16, no. 11 (November 1986): 1031–43. http://dx.doi.org/10.1002/spe.4380161106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Kuan Lin, Shaw Hwa Hwang, and Cheng Yu Yeh. "Symmetric NAT Traversal Method for Session Initial Protocol (SIP)." Applied Mechanics and Materials 284-287 (January 2013): 2835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2835.

Full text
Abstract:
Although the integration of SIP-based systems with a network address translation (NAT) environment has been investigated extensively, SIP-based system operation in symmetric model NAT remains relatively unexplored. This paper studies the application of symmetric NAT traversal techniques to SIP-based systems. This study focuses on following the SIP process, a non-additive service server, and employs standard SIP commands such as “REGISTER,” “INVITE,” and “200 OK” to predict and deliver the IP addresses and port numbers of the local NAT. This study also implements RTP streaming in the client-to-client (C2C) mode. The symmetric NAT traversal method for the SIP increases the direct peer-to-peer connection rate. This approach also avoids the STUN and RTP-Relay server. Experimental results with 50 types of NAT indicate that symmetric NAT traversal performs better than the STUN solution. The RTP-Relay server bandwidth cost is likewise superior to the TURN solution. These finding have important implications for SIP-based system developers and carrier providers.
APA, Harvard, Vancouver, ISO, and other styles
31

Garratt, P. W., and G. G. Michaelson. "Analysis and design for a standard transport protocol." Software: Practice and Experience 15, no. 5 (May 1985): 427–38. http://dx.doi.org/10.1002/spe.4380150503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gburzyński, Paweł, and Piotr Rudnicki. "LANSF: A protocol modelling environment and its implementation." Software: Practice and Experience 21, no. 1 (January 1991): 51–76. http://dx.doi.org/10.1002/spe.4380210105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Frieder, O. "A parallel database-driven protocol verification system prototype." Software: Practice and Experience 22, no. 3 (March 1992): 245–64. http://dx.doi.org/10.1002/spe.4380220304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lee, Yueh-Feng, and Ruei-Chuan Chang. "Developing dynamic-reconfigurable communication protocol stacks using Java." Software: Practice and Experience 35, no. 6 (2005): 601–20. http://dx.doi.org/10.1002/spe.650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Бражиненко, М. Г., В. Л. Шевченко, and В. Я. Петрівський. "IoT low bandwith networks M2M communication protocols reference qualities." Системи обробки інформації, no. 4(159) (November 28, 2019): 7–15. http://dx.doi.org/10.30748/soi.2019.159.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gomez, Juan Carlos, Jorge R. Ramos, and Vernon Rego. "Signals, timers, and continuations for multithreaded user-level protocols." Software: Practice and Experience 36, no. 5 (2006): 449–71. http://dx.doi.org/10.1002/spe.700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhu, Lian Peng, Shu Ming Jiang, Ying Xia Zhu, Jiang Zhou Zhang, and Wei He. "Research on Standard Domain and Non Standard Domain Based on SIP Protocol." Advanced Materials Research 834-836 (October 2013): 1844–49. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1844.

Full text
Abstract:
SIP protocol is a for the establishment, change and terminate multimedia session control protocol of application layer, based on the analysis of SIP protocol stack, in view of the non SIP video communication field has designed a communication strategy, achieved with the standard SIP domain as well as the standard SIP device and the existing non SIP domain communication, makes SIP protocol is compatible with existing video scheduling system, enhances the use range, avoid re design of non SIP domain, and the validation and application in the bus company project.
APA, Harvard, Vancouver, ISO, and other styles
38

Lu, Yanrong, Lixiang Li, and Yixian Yang. "Robust and Efficient Authentication Scheme for Session Initiation Protocol." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/894549.

Full text
Abstract:
The session initiation protocol (SIP) is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.
APA, Harvard, Vancouver, ISO, and other styles
39

Fan, Ya Qin, Peng Jun Yu, and Mei Lin Liu. "SIP Protocol in the IMS Network and Simulation." Advanced Materials Research 616-618 (December 2012): 2051–54. http://dx.doi.org/10.4028/www.scientific.net/amr.616-618.2051.

Full text
Abstract:
IP Multimedia Subsystem IMS is the core technology of next generation networks can provide real-time IP multimedia services and VoIP services through IMS, but IMS is not perfect, of which there are still some problems. IMS in real-time business a higher demand for mobility support, voice and video data usually use real-time transport protocol RTP to transfer user data protocol over UDP, requiring low transmission delay, seamless switching, as well as higher bandwidth utilization. In this paper, the IMS-related issues, the IMS network protocol.The SIP protocol simulation. Simulation results show that more of the nodes, the network send and receive packets faster, the results of this paper is the study of the IMS network, the actual reference value
APA, Harvard, Vancouver, ISO, and other styles
40

Park, Hyung-Soo, Hyung-Woo Lee, Dong Hoon Lee, and Hong-Ki Ko. "Multi-protocol authentication for SIP/SS7 mobile network." Computer Communications 31, no. 11 (July 2008): 2755–63. http://dx.doi.org/10.1016/j.comcom.2008.02.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Azrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (October 1, 2016): 231. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp231-239.

Full text
Abstract:
<p>Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.</p>
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Peishun, Yi Mu, Willy Susilo, and Jun Yan. "Privacy preserving protocol for service aggregation in cloud computing." Software: Practice and Experience 42, no. 4 (October 18, 2011): 467–83. http://dx.doi.org/10.1002/spe.1129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Suh, Young‐Kyoon, Richard T. Snodgrass, John D. Kececioglu, Peter J. Downey, Robert S. Maier, and Cheng Yi. "EMP: execution time measurement protocol for compute‐bound programs." Software: Practice and Experience 47, no. 4 (February 23, 2017): 559–97. http://dx.doi.org/10.1002/spe.2476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ciminiera, L., C. Demartini, and A. Valenzano. "A practical study of semi-automatic OSI protocol implementation." Software: Practice and Experience 18, no. 3 (March 1988): 255–77. http://dx.doi.org/10.1002/spe.4380180306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Droms, Ralph, and Wayne R. Dyksen. "Performance measurements of the X window system communication protocol." Software: Practice and Experience 20, S2 (October 1990): S119—S136. http://dx.doi.org/10.1002/spe.4380201408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Sun-Jen, and Richard Lai. "PSAMS: a communication protocol specification assessment and measurement system." Software: Practice and Experience 32, no. 12 (2002): 1129–54. http://dx.doi.org/10.1002/spe.476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Watson, David, G. Robert Malan, and Farnam Jahanian. "An extensible probe architecture for network protocol performance measurement." Software: Practice and Experience 34, no. 1 (December 11, 2003): 47–67. http://dx.doi.org/10.1002/spe.557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lai, R. "Using protean for verifying a complex protocol — A case study." Software: Practice and Experience 25, no. 9 (September 1995): 1021–44. http://dx.doi.org/10.1002/spe.4380250906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chang, Hsung-Pin, Yu-Chieh Lin, and Shiu-Hau Chen. "System supports for protocol and application adaptation in vertical handoffs." Software: Practice and Experience 39, no. 8 (June 10, 2009): 739–71. http://dx.doi.org/10.1002/spe.910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chao, Daniel Y., and David T. Wang. "An interactive tool for design, simulation, verification, and synthesis of protocols." Software: Practice and Experience 24, no. 8 (August 1994): 747–83. http://dx.doi.org/10.1002/spe.4380240805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography