Academic literature on the topic 'Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protocols"
Shi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textBáez S., Paola, Isabel Ruiz S., Luis F. Restrepo, and Jhon D. Ruiz B. "Comparación de dos protocolos anestésicos para ovariohisterectomía en perras sanas." Revista Colombiana de Ciencias Pecuarias 20, no. 4 (2016): 6. http://dx.doi.org/10.17533/udea.rccp.324200.
Full textCameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.
Full textGuo, Hua, Chen Chen, Ya Gao, Xiong Li, and Jiongchao Jin. "A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers." Wireless Communications and Mobile Computing 2018 (September 13, 2018): 1–14. http://dx.doi.org/10.1155/2018/3284324.
Full textPeixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.
Full textLi, Jian, and Chong-Qiang Ye. "Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations." Laser Physics Letters 21, no. 7 (2024): 075201. http://dx.doi.org/10.1088/1612-202x/ad4eb6.
Full textSabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.
Full textReges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, et al. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.
Full textDissertations / Theses on the topic "Protocols"
Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textBandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textGerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Full textDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textYang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.
Full textMaria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.
Full textGuedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.
Full text坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.
Full textJaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.
Full textBooks on the topic "Protocols"
Spiropoulos, George. Computer network protocols and protocol proving. University of Birmingham, 1988.
Find full textScott, Sbihli, and NetLibrary Inc, eds. The wireless application protocol (WAP): A Wiley tech brief. John Wiley, 2000.
Find full textManson, Margaret M. Immunochemical Protocols. Humana Press, 1992. http://dx.doi.org/10.1385/0896032043.
Full textGraham, John M., and Joan A. Higgins. Biomembrane Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032361.
Full textWhite, Bruce A. PCR Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032442.
Full textGraham, John M., and Joan A. Higgins. Biomembrane Protocols. Humana Press, 1993. http://dx.doi.org/10.1385/0896032507.
Full textBook chapters on the topic "Protocols"
Malik, Waqar. "Protocols." In Learn Swift 2 on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_17.
Full textMesplié, Grégory. "Protocols." In Hand and Wrist Rehabilitation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16318-5_18.
Full textMalik, Waqar. "Protocols." In Learn Swift on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_15.
Full textCampbell, Matthew. "Protocols." In Swift Quick Syntax Reference. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0439-9_46.
Full textCampbell, Matthew. "Protocols." In Objective-C Quick Syntax Reference. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6488-0_23.
Full textMoustaira, Elina. "Protocols." In International Insolvency Law. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04450-3_6.
Full textDalrymple, Mark, and Scott Knaster. "Protocols." In Learn Objective-C on the Mac. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1816-6_13.
Full textWood, Linda Fossati. "Protocols." In Targeted Regulatory Writing Techniques: Clinical Documents for Drugs and Biologics. Birkhäuser Basel, 2009. http://dx.doi.org/10.1007/978-3-7643-8362-6_5.
Full textSchoenmakers, Berry. "∑-Protocols." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_12.
Full textWilson, Greg. "Protocols." In Software Design by Example. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032725239-9.
Full textConference papers on the topic "Protocols"
Reed, Carl W., and Kat Coronado. "The Futility and Folly of Seeking the Accelerated Corrosion Holy Grail." In SSPC 2015 Greencoat. SSPC, 2015. https://doi.org/10.5006/s2015-00011.
Full textZhao, Pengyu, Sikang Jiang, Shengli Liu, and Long Liu. "Fuzz Testing of Protocols Based on Protocol Process State Machines." In 2024 4th International Conference on Electronic Information Engineering and Computer Science (EIECS). IEEE, 2024. https://doi.org/10.1109/eiecs63941.2024.10800590.
Full textChen, Qiqi, Zhiheng Zhao, and George Q. Huang. "Protocol Model and Execution Protocols for Networked MRO Intralogistics *." In 2024 IEEE 20th International Conference on Automation Science and Engineering (CASE). IEEE, 2024. http://dx.doi.org/10.1109/case59546.2024.10711769.
Full textLivesey, Joseph, and Dominik Wojtczak. "Propositional Gossip Protocols under Fair Schedulers." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/56.
Full textShu, J. C., and M. T. Liu. "Protocol conversion between complex protocols." In Ninth Annual International Phoenix Conference on Computers and Communications. 1990 Conference Proceedings. IEEE, 1990. http://dx.doi.org/10.1109/pccc.1990.101673.
Full textTan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textPiva, Fabio R., José R. M. Monteiro, Augusto J. Devegili, and Ricardo Dahab. "Applying Strand Spaces to Certified Delivery Proofs." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2006. http://dx.doi.org/10.5753/sbseg.2006.20940.
Full textLamenza, Thiago, Marcelo Paulon, Breno Perricone, Bruno Olivieri, and Markus Endler. "GrADyS-SIM - A OMNET++/INET simulation framework for Internet of Flying things." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.222426.
Full textSuprano, Alessia, Emanuele Polino, Danilo Zia, et al. "Black-box optimization in quantum information protocols." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.fm4a.7.
Full textSingh, Munindar P., Samuel H. Christie V., and Amit K. Chopra. "Langshaw: Declarative Interaction Protocols Based on Sayso and Conflict." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/23.
Full textReports on the topic "Protocols"
Williams, C., P. F. Reynolds, and B. de Supinoki. Delta Coherence Protocols: The Home Update Protocol. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/793578.
Full textTubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1783513.
Full textRaikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300648.
Full textRaikow, David, and Kelly Kozar. Quality assurance plan for water quality monitoring in the Pacific Island Network. National Park Service, 2023. http://dx.doi.org/10.36967/2300662.
Full textReynolds, J. K., and J. Postel. Official Internet protocols. RFC Editor, 1987. http://dx.doi.org/10.17487/rfc1011.
Full textLloyd, B., and W. Simpson. PPP Authentication Protocols. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1334.
Full textGalvin, J., K. McCloghrie, and J. Davin. SNMP Security Protocols. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1352.
Full textAllen, J., P. Leach, and R. Hedberg. CIP Transport Protocols. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2653.
Full textMilitao, Filipe, Jonathan Aldrich, and Luis Caires. Rely-Guarantee Protocols. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605817.
Full textAnderson, Tom E., and David J. Wetherall. Enforceable Network Protocols. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada425347.
Full text