Academic literature on the topic 'Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protocols"

1

Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.

Full text
Abstract:
Currently published hearing aid fitting protocols recommend speech-in-noise testing and loudness measures, but it remains unclear how these measures affect hearing aid benefit and user satisfaction. This study compared two protocols in their effects on benefit and satisfaction. Protocol A included an electroacoustic analysis, real-ear measures, and hearing aid adjustments based on users' comments. Protocol B included all of Protocol A and a speech-in-noise test, loudness discomfort levels, and aided loudness. Thirty-two participants completed the Abbreviated Profile of Hearing Aid Benefit (APH
APA, Harvard, Vancouver, ISO, and other styles
2

Báez S., Paola, Isabel Ruiz S., Luis F. Restrepo, and Jhon D. Ruiz B. "Comparación de dos protocolos anestésicos para ovariohisterectomía en perras sanas." Revista Colombiana de Ciencias Pecuarias 20, no. 4 (2016): 6. http://dx.doi.org/10.17533/udea.rccp.324200.

Full text
Abstract:
Para determinar los cambios hemodinámicos, y fisiológicos y la recuperación en dos protocolos anestésicos, en hembras caninas sanas durante ovariohisterectomia (OVH) electiva, se utilizaron dos grupos de animales, a cada uno de los cuales se les asignó un protocolo anestésico: Grupo I (fentanil + etomidato), grupo II (fentanil + tiopental). En ambos grupos el mantenimiento se hizo con isoflurano. Cada cinco minutos durante el procedimiento quirúrgico se midieron las siguientes variables: frecuencia cardíaca, frecuencia respiratoria, temperatura, dióxido de carbono expirado, presión arterial no
APA, Harvard, Vancouver, ISO, and other styles
3

Cameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.

Full text
Abstract:
Background: Unfractionated heparin (UFH) is used for the prevention and treatment of arterial or venous thromboembolism. The dosage for IV infusion of UFH is generally based on the patient’s weight, with adjustment to a specific target for activated partial thromboplastin time (aPTT). In May 2019, the UFH protocols at the study institution were changed from being fully weight-based (i.e., for both initial dosing and subsequent dosage titrations) to weight-based initial dosing and non–weight-based dosage titrations, but the relative effectiveness of these 2 approaches was not known. Objectives:
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.

Full text
Abstract:
Three-factor multiserver authentication protocols become a prevalence in recent years. Among these protocols, almost all of them do not involve the registration center into the authentication process. To improve the protocol’s efficiency, a common secret key is shared among all severs, which leads to a serious weakness; i.e., we find that these protocols cannot resist the passive attack from the honest-but-curious servers. This paper takes Wang et al.’s protocol as an example, to exhibit how an honest-but-curious server attacks their protocol. To remedy this weakness, a novel three-factor mult
APA, Harvard, Vancouver, ISO, and other styles
5

Peixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Full text
Abstract:
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O obje
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.

Full text
Abstract:
Abstract Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations, offering the advantage of not requiring all users to possess intricate quantum devices. However, current SQSS protocols mainly cater to bipartite scenarios, with few protocols suitable for multi-party scenarios. Moreover, the multi-party SQSS protocols face limitations such as low qubit efficiency and inability to share deterministic secret information. To address this gap, this paper proposes a multi-party SQSS protocol based on multi-particle GHZ states. In this p
APA, Harvard, Vancouver, ISO, and other styles
7

Sabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.

Full text
Abstract:
In the current Digital world, to protect Data and provide secure communication internally and externally, Network security Protocols like Transport Layer Security (TLS), Internet Security Protocol (IPsec), and Hypertext Transfer Protocol Secure (HTTPS) play a crucial role in maintaining Security. This Research paper analyses the comparison of these protocols and explains their Functions, Use cases, and Limitations. This case study provides insights and explains the importance of these protocols in maintaining Security and protecting confidentiality, Integrity, and Availability. By Evaluating e
APA, Harvard, Vancouver, ISO, and other styles
8

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
9

Reges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
10

Reges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, et al. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.

Full text
Abstract:
ABSTRACTThis work aims to study which wireless sensor network routing protocol is more suitable for Smart Grids applications, through simulation of AODV protocols, AOMDV, DSDV and HTR in the NS2 simulation environment. Was simulated a network based on a residential area with 47 residences, with one node for each residence and one base station, located about 25m from the other nodes. Many parameters, such as packet loss, throughput, delay, jitter and energy consumption were tested. The network was increased to 78 and 93 nodes in order to evaluate the behavior of the protocols in larger networks
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Protocols"

1

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Full text
Abstract:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’a
APA, Harvard, Vancouver, ISO, and other styles
2

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
3

Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne‎ (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.

Full text
Abstract:
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer Security and Secure Shell protocols. We introduce new security frameworks for analysing security properties of protocols involving negotiation, multiple ciphersuites, long-term key reuse, and time synchronisation. Our results have increased confidence
APA, Harvard, Vancouver, ISO, and other styles
5

Gibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Full text
Abstract:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unil
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.

Full text
Abstract:
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to
APA, Harvard, Vancouver, ISO, and other styles
7

Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.

Full text
Abstract:
O presente estudo objetivou realizar um levantamento retrospectivo de todos os planejamentos ortodônticos realizados pelo Departamento de Ortodontia (FOB USP) desde 1973, para que pudessem ser avaliados os protocolos de tratamento escolhidos à época, principalmente quanto à decisão de extrações e suas freqüências. A amostra constitui-se inicialmente de 3745 documentações ortodônticas arquivadas pelo Departamento de Ortodontia, das quais 332 documentações foram descartadas seguindo alguns fatores de exclusão, tais como casos transferidos, desistências e informações e exames incompletos. A amo
APA, Harvard, Vancouver, ISO, and other styles
8

Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.

Full text
Abstract:
Dans un monde fortement dépendant de la communication de données distribuées, la conception d’infrastructures sécurisées est une tâche cruciale. Les systèmes et réseaux distribués prennent de plus en plus d’importance, car la plupart des services et des possibilités qui caractérisent la société moderne sont basés sur ces technologies.La communication entre les agents sur les réseaux a donc suscité un grand intérêt pour la recherche. Afin de fournir des moyens de communication efficaces et fiables, de plus en plus de protocoles de communication sont inventés, et pour la plupart d’entre eux, la
APA, Harvard, Vancouver, ISO, and other styles
9

坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.

Full text
Abstract:
The ability of the software engineering community to achieve high levels of reuse from software frameworks has been tempered by the difficulty in understanding how to reuse them properly. When written correctly, a plugin can take advantage of the framework’s code and architecture to provide a rich application with relatively few lines of code. Unfortunately, doing this correctly is difficult because frameworks frequently require plugin developers to be aware of complex protocols between objects, and improper use of these protocols causes exceptions and unexpected behavior at run time. This dis
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Protocols"

1

G, Naugle Matthew, ed. Network protocols. McGraw-Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spiropoulos, George. Computer network protocols and protocol proving. University of Birmingham, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scott, Sbihli, and NetLibrary Inc, eds. The wireless application protocol (WAP): A Wiley tech brief. John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Black, Uyless D. TCP/IP and related protocols. 2nd ed. McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Naugle, Matthew G. Network protocol handbook. McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Destefano, Anna. Chaperonin protocols. Humana, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manson, Margaret M. Immunochemical Protocols. Humana Press, 1992. http://dx.doi.org/10.1385/0896032043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Graham, John M., and Joan A. Higgins. Biomembrane Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

White, Bruce A. PCR Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Graham, John M., and Joan A. Higgins. Biomembrane Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Protocols"

1

Malik, Waqar. "Protocols." In Learn Swift 2 on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mesplié, Grégory. "Protocols." In Hand and Wrist Rehabilitation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16318-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Waqar. "Protocols." In Learn Swift on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Campbell, Matthew. "Protocols." In Swift Quick Syntax Reference. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0439-9_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Campbell, Matthew. "Protocols." In Objective-C Quick Syntax Reference. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6488-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moustaira, Elina. "Protocols." In International Insolvency Law. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04450-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dalrymple, Mark, and Scott Knaster. "Protocols." In Learn Objective-C on the Mac. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1816-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, Linda Fossati. "Protocols." In Targeted Regulatory Writing Techniques: Clinical Documents for Drugs and Biologics. Birkhäuser Basel, 2009. http://dx.doi.org/10.1007/978-3-7643-8362-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schoenmakers, Berry. "∑-Protocols." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wilson, Greg. "Protocols." In Software Design by Example. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protocols"

1

Reed, Carl W., and Kat Coronado. "The Futility and Folly of Seeking the Accelerated Corrosion Holy Grail." In SSPC 2015 Greencoat. SSPC, 2015. https://doi.org/10.5006/s2015-00011.

Full text
Abstract:
Abstract Since the dawn of mankind, or at least since the advent of the very first accelerated corrosion cabinet, it has been the goal of coatings evaluators to develop an accelerated corrosion testing protocol which reflects the real world of corrosion in totality. There have been passionate arguments promoting one or another testing protocol while demonizing others, but that one protocol has yet to be developed to everyone’s satisfaction. While the simplistic notion of one accelerated corrosion testing protocol is appealing, it is naïve to believe this Holy Grail is actually attainable. Moth
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Pengyu, Sikang Jiang, Shengli Liu, and Long Liu. "Fuzz Testing of Protocols Based on Protocol Process State Machines." In 2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS). IEEE, 2024. https://doi.org/10.1109/eiecs63941.2024.10800590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Livesey, Joseph, and Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.

Full text
Abstract:
Gossip protocols are programs that can be used by a group of agents to synchronize what information they have. Namely, assuming each agent holds a secret, the goal of a protocol is to reach a situation in which all agents know all secrets. Distributed epistemic gossip protocols use epistemic formulas in the component programs for the agents. In this paper, we study the simplest classes of such gossip protocols: propositional gossip protocols, in which whether an agent wants to initiate a call depends only on the set of secrets that the agent currently knows. It was recently shown that such a p
APA, Harvard, Vancouver, ISO, and other styles
4

Shu, J. C., and M. T. Liu. "Protocol conversion between complex protocols." In Ninth Annual International Phoenix Conference on Computers and Communications. 1990 Conference Proceedings. IEEE, 1990. http://dx.doi.org/10.1109/pccc.1990.101673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Full text
Abstract:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct resul
APA, Harvard, Vancouver, ISO, and other styles
6

Piva, Fabio R., José R. M. Monteiro, Augusto J. Devegili, and Ricardo Dahab. "Applying Strand Spaces to Certified Delivery Proofs." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2006. http://dx.doi.org/10.5753/sbseg.2006.20940.

Full text
Abstract:
Although fair exchange protocols are being widely implemented, there are few formal methods able to verify them. This work introduces the strand spaces method for verifying certified mail delivery protocols, a subclass of fair exchange protocols. Three fair exchange properties are verified: effectiveness, verifiability of TTP and timeliness. For effectiveness and verifiability we used the FPH protocol [Ferrer-Gomila et al. 2000]; for timeliness we use the ZDB protocol [Zhou et al. 1999]. We show that strand spaces can be applied to fair exchange protocols, and present an additional attack to t
APA, Harvard, Vancouver, ISO, and other styles
7

Lamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri, and Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.

Full text
Abstract:
This paper describes GrADyS-SIM, a framework for simulating cooperating swarms of UAVs in a joint mission in a hypothetical landscape and communicating through RF radios. The framework was created to aid and verify the communication, coordination, and context-awareness protocols being developed in the GrADyS project. GrADyS-SIM uses the OMNeT++ simulation library and its INET model suite and allows for the addition of modified/customized versions of some simulated components, network configurations, and vehicle coordination to develop new coordination protocols and tested through the framework
APA, Harvard, Vancouver, ISO, and other styles
8

Suprano, Alessia, Emanuele Polino, Danilo Zia, et al. "Black-box optimization in quantum information protocols." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.fm4a.7.

Full text
Abstract:
We used a black-box approach in quantum information protocols. This allows us to optimize an engineering protocol compensating for experimental imperfections and to optimize the nonclassicality of an unknown system reinforcing the device-independent paradigm.
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Munindar P., Samuel H. Christie V., and Amit K. Chopra. "Langshaw: Declarative Interaction Protocols Based on Sayso and Conflict." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/23.

Full text
Abstract:
Current languages for specifying multiagent protocols either over-constrain protocol enactments or complicate capturing their meanings. We propose Langshaw, a declarative protocol language based on (1) sayso, a new construct that captures who has priority over setting each attribute, and (2) nono and nogo, two constructs to capture conflicts between actions. Langshaw combines flexibility with an information model to express meaning. We give a formal semantics for Langshaw, procedures for determining the safety and liveness of a protocol, and a method to generate a message-oriented protocol (em
APA, Harvard, Vancouver, ISO, and other styles
10

Apt, Krzysztof R., Eryk Kopczyński, and Dominik Wojtczak. "On the Computational Complexity of Gossip Protocols." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/106.

Full text
Abstract:
Gossip protocols deal with a group of communicating agents, each holding a private information, and aim at arriving at a situation in which all the agents know each other secrets. Distributed epistemic gossip protocols are particularly simple distributed programs that use formulas from an epistemic logic. Recently, the implementability of these distributed protocols was established (which means that the evaluation of these formulas is decidable), and the problems of their partial correctness and termination were shown to be decidable, but their exact computational complexity was left open. We
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protocols"

1

Williams, C., P. F. Reynolds, and B. de Supinoki. Delta Coherence Protocols: The Home Update Protocol. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/793578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1783513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Raikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300648.

Full text
Abstract:
In accordance with guidelines set forth by the National Park Service Inventory and Monitoring Division, a quality-assurance plan has been created for use by the Pacific Island Network in the implementation of water quality monitoring protocols, including the marine water quality protocol (Raikow et al. 2023) and future water quality protocols that will address streams and standing waters. This quality-assurance plan documents the standards, policies, and procedures used by the Pacific Island Network for activities specifically related to the collection, processing, storage, analysis, and publi
APA, Harvard, Vancouver, ISO, and other styles
4

Raikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300662.

Full text
Abstract:
In accordance with guidelines set forth by the National Park Service Inventory and Monitoring Division, a quality-assurance plan has been created for use by the Pacific Island Network in the implementation of water quality monitoring protocols, including the marine water quality protocol (Raikow et al. 2023) and future water quality protocols that will address streams and standing waters. This quality-assurance plan documents the standards, policies, and procedures used by the Pacific Island Network for activities specifically related to the collection, processing, storage, analysis, and publi
APA, Harvard, Vancouver, ISO, and other styles
5

Reynolds, J. K., and J. Postel. Official Internet protocols. RFC Editor, 1987. http://dx.doi.org/10.17487/rfc1011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lloyd, B., and W. Simpson. PPP Authentication Protocols. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Galvin, J., K. McCloghrie, and J. Davin. SNMP Security Protocols. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Allen, J., P. Leach, and R. Hedberg. CIP Transport Protocols. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Militao, Filipe, Jonathan Aldrich, and Luis Caires. Rely-Guarantee Protocols. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anderson, Tom E., and David J. Wetherall. Enforceable Network Protocols. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada425347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!