Journal articles on the topic 'Protocollo SPI'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Protocollo SPI.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Salcedo, Octavio, Danilo López, and Cesar A. Hernández. "Estudio comparativo de la utilización de ancho de banda con los protocolos SIP e IAX." Revista Tecnura 16, no. 34 (December 4, 2012): 171. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2012.4.a12.
Full textCha, Eun-Chul, and Hyoung-Kee Choi. "Evaluation of Security Protocols for the Session Initiation Protocol." KIPS Transactions:PartC 14C, no. 1 (February 28, 2007): 55–64. http://dx.doi.org/10.3745/kipstc.2007.14-c.1.055.
Full textLeens, Frederic. "An introduction to I2C and SPI protocols." IEEE Instrumentation & Measurement Magazine 12, no. 1 (February 2009): 8–13. http://dx.doi.org/10.1109/mim.2009.4762946.
Full textVisconti, P., G. Giannotta, R. Brama, P. Primiceri, A. Malvasi, and A. Centuori. "FEATURES, OPERATION PRINCIPLE AND LIMITS OF SPI AND I2C COMMUNICATION PROTOCOLS FOR SMART OBJECTS: A NOVEL SPI-BASED HYBRID PROTOCOL ESPECIALLY SUITABLE FOR IoT APPLICATIONS." International Journal on Smart Sensing and Intelligent Systems 10, no. 2 (2017): 262–95. http://dx.doi.org/10.21307/ijssis-2017-211.
Full textAbadi, Martı́n, and Andrew D. Gordon. "A Calculus for Cryptographic Protocols: The Spi Calculus." Information and Computation 148, no. 1 (January 1999): 1–70. http://dx.doi.org/10.1006/inco.1998.2740.
Full textKulkarni, Aman, and S. M. Sakthivel. "UVM methodology based functional Verification of SPI Protocol." Journal of Physics: Conference Series 1716 (December 2020): 012035. http://dx.doi.org/10.1088/1742-6596/1716/1/012035.
Full textTae, Jang-Won, and Jin-Suk Kwak. "A Study on the VoIP Security Countermeasure of SIP-based." Journal of Korea Navigation Institute 17, no. 4 (August 30, 2013): 421–28. http://dx.doi.org/10.12673/jkoni.2013.17.4.421.
Full textDeering, S. E. "SIP: Simple Internet Protocol." IEEE Network 7, no. 3 (May 1993): 16–28. http://dx.doi.org/10.1109/65.224022.
Full textGurbani, Vijay K., Tsun-Chieh Chiang, and Suresh Kumar. "SIP: A routing protocol." Bell Labs Technical Journal 6, no. 2 (August 14, 2002): 136–52. http://dx.doi.org/10.1002/bltj.10.
Full textPironti, Alfredo, and Riccardo Sisto. "Provably correct Java implementations of Spi Calculus security protocols specifications." Computers & Security 29, no. 3 (May 2010): 302–14. http://dx.doi.org/10.1016/j.cose.2009.08.001.
Full textG, Edwar Jacinto, Fredy H. Martínez S, and Holman Montiel A. "Temperature Control on FPGA using SPI Protocol with Thermopar Max6675k." International Journal of Engineering and Technology 10, no. 6 (December 31, 2018): 1603–10. http://dx.doi.org/10.21817/ijet/2018/v10i6/181006018.
Full textVadagaonkar, Kamlesh S., Hanuman P. Kalmode, Kaliyappan Murugan, and Atul C. Chaskar. "I2 catalyzed tandem protocol for synthesis of quinoxalines via sp3, sp2 and sp C–H functionalization." RSC Advances 5, no. 8 (2015): 5580–90. http://dx.doi.org/10.1039/c4ra08589b.
Full textMeireles, José Kleber Soares de. "Tracionamento lento de incisivo central superior: chaves para o sucesso." Revista Clínica de Ortodontia Dental Press 19, no. 4 (October 6, 2020): 80–93. http://dx.doi.org/10.14436/1676-6849.19.4.080-093.spc.
Full textAl-Refai, Hasan, and Khaldoun Batiha. "Enhancing formal specification and verification of e-commerce protocol." Journal of Advanced Computer Science & Technology 6, no. 1 (February 26, 2017): 13. http://dx.doi.org/10.14419/jacst.v6i1.6713.
Full textTrunin, P. A., L. S. Prokhorenko, D. S. Mishchenkov, and D. D. Klimov. "Development of Protocol-Independent Modular Architecture for Three Axis Force Sensor Data Processing." Programmnaya Ingeneria 12, no. 1 (January 22, 2021): 3–7. http://dx.doi.org/10.17587/prin.12.3-7.
Full textHolzmann, Gerard J. "Standardized protocol interfaces." Software: Practice and Experience 23, no. 7 (July 1993): 711–31. http://dx.doi.org/10.1002/spe.4380230703.
Full textYun, Ha-Na, and Hyung-Woo Lee. "Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack." Journal of the Korea Contents Association 10, no. 1 (January 28, 2010): 46–58. http://dx.doi.org/10.5392/jkca.2010.10.1.046.
Full textShi, Min. "SIP Network Secure Communication Model Based on Improved SIP Protocol." International Journal of Autonomous and Adaptive Communications Systems 14, no. 1/2 (2021): 1. http://dx.doi.org/10.1504/ijaacs.2021.10032394.
Full textMin, Shi. "SIP network secure communication model based on improved SIP protocol." International Journal of Autonomous and Adaptive Communications Systems 14, no. 1/2 (2021): 48. http://dx.doi.org/10.1504/ijaacs.2021.114271.
Full textHutchinson, Norman C., Shivakant Mishra, Larry L. Peterson, and Vicraj T. Thomas. "Tools for implementing network protocols." Software: Practice and Experience 19, no. 9 (September 1989): 895–916. http://dx.doi.org/10.1002/spe.4380190906.
Full textDHURY, S. CHOU, G. K. SINGH, and R. M. ME HRA. "Design and Verification Serial Peripheral Interface (SPI) Protocol for Low Power Applications." International Journal of Innovative Research in Science, Engineering and Technology 03, no. 10 (October 15, 2014): 16750–58. http://dx.doi.org/10.15680/ijirset.2014.0310048.
Full textHolzmann, Gerard J. "An improved protocol reachability analysis technique." Software: Practice and Experience 18, no. 2 (February 1988): 137–61. http://dx.doi.org/10.1002/spe.4380180203.
Full textHernek, Diane, and David P. Anderson. "Efficient automated protocol implementation using RTAG." Software: Practice and Experience 20, no. 9 (September 1990): 869–85. http://dx.doi.org/10.1002/spe.4380200903.
Full textSnow, C. R. "A multi-protocol campus time server." Software: Practice and Experience 21, no. 9 (September 1991): 907–22. http://dx.doi.org/10.1002/spe.4380210903.
Full textKam, Ben W. Y., and Thomas R. Dean. "Linguistic security testing for text communication protocols." Software: Practice and Experience 43, no. 9 (January 25, 2012): 1103–20. http://dx.doi.org/10.1002/spe.2108.
Full textValenzano, A., R. Sisto, and L. Ciminiera. "Rapid prototyping of protocols from LOTOS specifications." Software: Practice and Experience 23, no. 1 (January 1993): 31–54. http://dx.doi.org/10.1002/spe.4380230104.
Full textCotroneo, R., M. Dazi, R. Gigli, C. Guidetti, A. Pingi, G. Cantore, and F. Chiappetta. "Studio Angio-RM degli aneurismi intracranici embolizzati con GDC." Rivista di Neuroradiologia 10, no. 2_suppl (October 1997): 142. http://dx.doi.org/10.1177/19714009970100s256.
Full textSimon, Robert, and Paul Rabinovich. "Rapid simulator development for multicast protocol analysis." Software: Practice and Experience 32, no. 1 (2001): 1–23. http://dx.doi.org/10.1002/spe.425.
Full textSnow, C. R., and H. Whitfield. "An experiment with the newcastle connection protocol." Software: Practice and Experience 16, no. 11 (November 1986): 1031–43. http://dx.doi.org/10.1002/spe.4380161106.
Full textChen, Kuan Lin, Shaw Hwa Hwang, and Cheng Yu Yeh. "Symmetric NAT Traversal Method for Session Initial Protocol (SIP)." Applied Mechanics and Materials 284-287 (January 2013): 2835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2835.
Full textGarratt, P. W., and G. G. Michaelson. "Analysis and design for a standard transport protocol." Software: Practice and Experience 15, no. 5 (May 1985): 427–38. http://dx.doi.org/10.1002/spe.4380150503.
Full textGburzyński, Paweł, and Piotr Rudnicki. "LANSF: A protocol modelling environment and its implementation." Software: Practice and Experience 21, no. 1 (January 1991): 51–76. http://dx.doi.org/10.1002/spe.4380210105.
Full textFrieder, O. "A parallel database-driven protocol verification system prototype." Software: Practice and Experience 22, no. 3 (March 1992): 245–64. http://dx.doi.org/10.1002/spe.4380220304.
Full textLee, Yueh-Feng, and Ruei-Chuan Chang. "Developing dynamic-reconfigurable communication protocol stacks using Java." Software: Practice and Experience 35, no. 6 (2005): 601–20. http://dx.doi.org/10.1002/spe.650.
Full textБражиненко, М. Г., В. Л. Шевченко, and В. Я. Петрівський. "IoT low bandwith networks M2M communication protocols reference qualities." Системи обробки інформації, no. 4(159) (November 28, 2019): 7–15. http://dx.doi.org/10.30748/soi.2019.159.01.
Full textGomez, Juan Carlos, Jorge R. Ramos, and Vernon Rego. "Signals, timers, and continuations for multithreaded user-level protocols." Software: Practice and Experience 36, no. 5 (2006): 449–71. http://dx.doi.org/10.1002/spe.700.
Full textZhu, Lian Peng, Shu Ming Jiang, Ying Xia Zhu, Jiang Zhou Zhang, and Wei He. "Research on Standard Domain and Non Standard Domain Based on SIP Protocol." Advanced Materials Research 834-836 (October 2013): 1844–49. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1844.
Full textLu, Yanrong, Lixiang Li, and Yixian Yang. "Robust and Efficient Authentication Scheme for Session Initiation Protocol." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/894549.
Full textFan, Ya Qin, Peng Jun Yu, and Mei Lin Liu. "SIP Protocol in the IMS Network and Simulation." Advanced Materials Research 616-618 (December 2012): 2051–54. http://dx.doi.org/10.4028/www.scientific.net/amr.616-618.2051.
Full textPark, Hyung-Soo, Hyung-Woo Lee, Dong Hoon Lee, and Hong-Ki Ko. "Multi-protocol authentication for SIP/SS7 mobile network." Computer Communications 31, no. 11 (July 2008): 2755–63. http://dx.doi.org/10.1016/j.comcom.2008.02.031.
Full textAzrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 1 (October 1, 2016): 231. http://dx.doi.org/10.11591/ijeecs.v4.i1.pp231-239.
Full textWang, Peishun, Yi Mu, Willy Susilo, and Jun Yan. "Privacy preserving protocol for service aggregation in cloud computing." Software: Practice and Experience 42, no. 4 (October 18, 2011): 467–83. http://dx.doi.org/10.1002/spe.1129.
Full textSuh, Young‐Kyoon, Richard T. Snodgrass, John D. Kececioglu, Peter J. Downey, Robert S. Maier, and Cheng Yi. "EMP: execution time measurement protocol for compute‐bound programs." Software: Practice and Experience 47, no. 4 (February 23, 2017): 559–97. http://dx.doi.org/10.1002/spe.2476.
Full textCiminiera, L., C. Demartini, and A. Valenzano. "A practical study of semi-automatic OSI protocol implementation." Software: Practice and Experience 18, no. 3 (March 1988): 255–77. http://dx.doi.org/10.1002/spe.4380180306.
Full textDroms, Ralph, and Wayne R. Dyksen. "Performance measurements of the X window system communication protocol." Software: Practice and Experience 20, S2 (October 1990): S119—S136. http://dx.doi.org/10.1002/spe.4380201408.
Full textHuang, Sun-Jen, and Richard Lai. "PSAMS: a communication protocol specification assessment and measurement system." Software: Practice and Experience 32, no. 12 (2002): 1129–54. http://dx.doi.org/10.1002/spe.476.
Full textWatson, David, G. Robert Malan, and Farnam Jahanian. "An extensible probe architecture for network protocol performance measurement." Software: Practice and Experience 34, no. 1 (December 11, 2003): 47–67. http://dx.doi.org/10.1002/spe.557.
Full textLai, R. "Using protean for verifying a complex protocol — A case study." Software: Practice and Experience 25, no. 9 (September 1995): 1021–44. http://dx.doi.org/10.1002/spe.4380250906.
Full textChang, Hsung-Pin, Yu-Chieh Lin, and Shiu-Hau Chen. "System supports for protocol and application adaptation in vertical handoffs." Software: Practice and Experience 39, no. 8 (June 10, 2009): 739–71. http://dx.doi.org/10.1002/spe.910.
Full textChao, Daniel Y., and David T. Wang. "An interactive tool for design, simulation, verification, and synthesis of protocols." Software: Practice and Experience 24, no. 8 (August 1994): 747–83. http://dx.doi.org/10.1002/spe.4380240805.
Full text