Academic literature on the topic 'Protools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protools"
Garland, Jack. "APB Tools Sigma1 Surround Matrix Mixer for ProTools TDM." Computer Music Journal 22, no. 3 (1998): 73. http://dx.doi.org/10.2307/3681166.
Full textShi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textMiguel Silva Gómez, Miguel, Rubén Darío Hernández, and Juan Carlos Ruge Cárdenas. "Propuesta de una plataforma de pruebas para el análisis de la interacción llanta-pavimento." Revista Clepsidra 9, no. 17 (May 18, 2014): 61–69. http://dx.doi.org/10.26564/19001355.29.
Full textCameron, Thomas, Doson Chua, Stephen Shalansky, Edwin Tam, and Erica Wang. "Comparison of a Fully Weight-Based Protocol with a Non–Weight-Based Dosage Titration Protocol for IV Unfractionated Heparin: A Before-and-After Study." Canadian Journal of Hospital Pharmacy 76, no. 1 (January 9, 2023): 23–28. http://dx.doi.org/10.4212/cjhp.3265.
Full textPeixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (December 23, 2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.
Full textBeattie, Randall C. "Distortion Product Otoacoustic Emissions: Comparison of Sequential versus Simultaneous Presentation of Primary-Tone Pairs." Journal of the American Academy of Audiology 14, no. 09 (October 2003): 471–84. http://dx.doi.org/10.1055/s-0040-1715939.
Full textYAKIN, RAHIMUL, SYAHRIZAL SYARIF, and EDI SETIAWAN TEHUTERU. "Perbandingan Kesintasan Tiga Tahun pada Anak Leukemia Limfoblastik Akut antara Protokol Pengobatan 2006 dan 2013." Indonesian Journal of Cancer 11, no. 3 (November 6, 2017): 111. http://dx.doi.org/10.33371/ijoc.v11i3.515.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 9. http://dx.doi.org/10.21754/tecnia-250215.02.
Full textReges Bessa, Carlos Deyvinson. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (August 16, 2016): 17. http://dx.doi.org/10.21754/tecnia-26012016.02.
Full textReges Bessa, Carlos Deyvinson, Rodrigo Soares Semente, Xiankleber Cavalcante Benjamim, Talison Augusto Correia de Melo, Felipe Denis Mendonça de Oliveira, Daniel Holanda Noronha, Antônio Eduardo de Morais Silva, André Laurindo Maitelli, and Andrés Ortiz Salazar. "PERFORMANCE EVALUATION ANALYSIS OF WIRELESS SENSOR NETWORKS ROUTING PROTOCOLS IN SMART GRIDS." Revista Cientifica TECNIA 26, no. 1 (November 28, 2016): 17. http://dx.doi.org/10.21754/tecnia.v26i1.2.
Full textDissertations / Theses on the topic "Protools"
Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol." Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.
Full textJelinski, Olaf [Verfasser]. "Diplomatisches Protokoll versus Corporate Protocol : Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2017. http://d-nb.info/114209703X/34.
Full textBandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ondráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Full textAlbuquerque, Edison de Queiroz. "Um protocolo multicast bi-direcional para educação a distancia." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260530.
Full textTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1 Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5) Previous issue date: 2005
Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda
Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation. The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Halfar, Patrik. "Zabezpečený transportní protokol monitorovacích systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237155.
Full textGerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Full textBareš, Jan. "Návrh protokolu hardwarového akcelerátoru náročných výpočtů nad více jádry." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376928.
Full textDebant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.
Full textThe purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
Books on the topic "Protools"
Spiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.
Find full textR, Wright Gary, ed. TCP/IP illustrated. Reading, Mass: Addison-Wesley Pub. Co., 1994.
Find full textRichard, Stevens W., ed. TCP/IP illustrated, volume 1. 2nd ed. Upper Saddle River, NJ: Addison-Wesley, 2012.
Find full textCruz, Frank Da. Kermit, a file transfer protocol. Bedford, Mass: Digital Press, 1987.
Find full textMarshall, Wilensky, ed. TCP/IP for Dummies. 6th ed. Hoboken: For Dummies [Imprint], 2009.
Find full textBook chapters on the topic "Protools"
Choi, Joonwon, Adam Chlipala, and Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols." In Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Full textGu, Xiang, and Jianlin Qiu. "Describing Protocol Elements and Protocols with RSL." In Lecture Notes in Electrical Engineering, 741–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-26001-8_94.
Full textLewis, J. A. "Statistical Standards for Protocols and Protocol Deviations." In Cancer Clinical Trials, 27–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-83419-6_4.
Full textBalasubramanian, A. R., Javier Esparza, and Mikhail Raskin. "Finding Cut-Offs in Leaderless Rendez-Vous Protocols is Easy." In Lecture Notes in Computer Science, 42–61. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71995-1_3.
Full textIssariyakul, Teerawat, and Ekram Hossain. "Transport Control Protocols Part 2: Transmission Control Protocol." In Introduction to Network Simulator NS2, 229–72. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4614-1406-3_10.
Full textYang, Ke, Meihua Xiao, Zifan Song, and Ri Ouyang. "Deriving Security Protocols Based on Protocol Derivation System." In Communications in Computer and Information Science, 172–84. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1877-2_12.
Full textKhurana, Surinder, and Manmeet Singh. "Vampire Attacks in Wireless Ad-hoc Networks." In Advances in Wireless Technologies and Telecommunication, 462–81. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0501-3.ch019.
Full text"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.
Full textHenderson, Andrea, David Levine, Darryl Millis, and Marti Drum. "Protocol Development and Protocols." In Canine Rehabilitation and Physical Therapy, 669–729. Elsevier, 2014. http://dx.doi.org/10.1016/b978-1-4377-0309-2.00038-7.
Full text"Protocols and Protocol Deviations." In Introduction to Randomized Controlled Clinical Trials, Second Edition, 183–91. Chapman and Hall/CRC, 2006. http://dx.doi.org/10.1201/9781420011302.ch10.
Full textConference papers on the topic "Protools"
"Organization – ProTools 2020." In 2020 IEEE/ACM International Workshop on HPC User Support Tools (HUST) and Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2020. http://dx.doi.org/10.1109/hustprotools51951.2020.00007.
Full text"Message from the ProTools 2019 Workshop Chairs." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00004.
Full text"Message from the ProTools 2021 Workshop Chairs." In 2021 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2021. http://dx.doi.org/10.1109/protools54808.2021.00004.
Full text"Message from the ProTools 2020 Workshop Chairs." In 2020 IEEE/ACM International Workshop on HPC User Support Tools (HUST) and Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2020. http://dx.doi.org/10.1109/hustprotools51951.2020.00005.
Full text"[Title page]." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00001.
Full text"[Copyright notice]." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00002.
Full text"Table of contents." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00003.
Full text"Organization." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00005.
Full textZhang, Hui, and Jeffrey Hollingsworth. "Understanding the Performance of GPGPU Applications from a Data-Centric View." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00006.
Full textCruz, Miguel Tairum, Daniel Ruiz, and Roxana Rusitoru. "Asvie: A Timing-Agnostic SVE Optimization Methodology." In 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools). IEEE, 2019. http://dx.doi.org/10.1109/protools49597.2019.00007.
Full textReports on the topic "Protools"
Williams, C., P. F. Reynolds, and B. de Supinoki. Delta Coherence Protocols: The Home Update Protocol. Office of Scientific and Technical Information (OSTI), July 2000. http://dx.doi.org/10.2172/793578.
Full textTubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), May 2021. http://dx.doi.org/10.2172/1783513.
Full textEastlake, D. The Protocol versus Document Points of View in Computer Protocols. RFC Editor, October 2004. http://dx.doi.org/10.17487/rfc3930.
Full textQuak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), September 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Full textPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames, and Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, June 2022. http://dx.doi.org/10.36967/2293713.
Full textGalvin, J., and K. McCloghrie. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC Editor, April 1993. http://dx.doi.org/10.17487/rfc1446.
Full textHarrington, D. Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions. RFC Editor, November 2009. http://dx.doi.org/10.17487/rfc5706.
Full textMeadows, Catherine. Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives. Fort Belvoir, VA: Defense Technical Information Center, January 2000. http://dx.doi.org/10.21236/ada464085.
Full textEnlow, Michelle Bosquet, Richard J. Chung, Melissa A. Parisi, Sharon K. Sagiv, Margaret A. Sheridan, Annemarie Stroustrup, Rosalind J. Wright, et al. Standard Measurement Protocols for Pediatric Development Research in the PhenX Toolkit. RTI Press, September 2022. http://dx.doi.org/10.3768/rtipress.2022.mr.0049.2209.
Full textCasado-Trigo, Manuel. Reseña: Historia del ceremonial y del protocolo/ Review:History of Ceremonial and Protocol. Revista Internacional de Relaciones Públicas, December 2016. http://dx.doi.org/10.5783/rirp-12-2016-13-231-236.
Full text