Academic literature on the topic 'Reuse and protocol exchange'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Reuse and protocol exchange.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Reuse and protocol exchange"
Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, et al. "Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming." Membranes 12, no. 1 (2021): 10. http://dx.doi.org/10.3390/membranes12010010.
Full textTermens, Miquel, Mireia Ribera, and Anita Locher. "An analysis of file format control in institutional repositories." Library Hi Tech 33, no. 2 (2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.
Full textSTINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE, and ROBERT C. DURST. "ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)." Journal of Interconnection Networks 03, no. 03n04 (2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.
Full textCui, Hui, and Glen Mudra. "Authenticated Key Exchange under Bad Randomness, Revisited." Mathematics 11, no. 12 (2023): 2721. http://dx.doi.org/10.3390/math11122721.
Full textGoncharov, M. V., and K. A. Kolosov. "On interoperability of metadata within RNPLS&T’s Single Open Information Archive." Scientific and Technical Libraries, no. 10 (November 12, 2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.
Full textLi, Wei, and Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software." Mobile Information Systems 2021 (October 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.
Full textHardwick, Martin. "On STEP-NC and the Complexities of Product Data Integration." Journal of Computing and Information Science in Engineering 4, no. 1 (2004): 60–67. http://dx.doi.org/10.1115/1.1641188.
Full textMeyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor, and Jakob Andert. "Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests." Automotive Innovation 4, no. 4 (2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.
Full textYavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management." Security and Communication Networks 2020 (October 26, 2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.
Full textGilissen, Valentijng, and Hella Hollander. "Archiving the Past While Keeping up with the Times." Studies in Digital Heritage 1, no. 2 (2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.
Full textDissertations / Theses on the topic "Reuse and protocol exchange"
Djaffardjy, Marine. "Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.
Full textSoltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Full textNilsson, Kim. "Reactive Networking using Dynamic Link Exchange Protocol." Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.
Full textChandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.
Full textSardana, Divya. "Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.
Full textPage, Shannon Charles. "Testing Protocol Development for a Proton Exchange Membrane Fuel Cell." Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.
Full textNinet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Full textThomson, Derek Stewart. "The development of packaged, reusable building services components : a pilot study in the UK national health service." Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.
Full textBuck, Randall Jay. "WiFu Transport: A User-level Protocol Framework." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.
Full textGustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Full textBooks on the topic "Reuse and protocol exchange"
Canada Mortgage and Housing Corporation., ed. Water reuse standards and verification protocol. CMHC, 2004.
Find full textCanada Mortgage and Housing Corporation., ed. Water reuse standards and verification protocol. Canada Mortgage and Housing Corporation, 2005.
Find full textCurtis, Parks, and National Institute of Standards and Technology (U.S.), eds. Initial Graphics Exchange Specification hybrid microcircuit application protocol. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textCommunity, Southern African Development. Protocol on Culture, Information and Sport. Southern African Development Community, 2001.
Find full textInstitute Of Electrical and Electronics Engineers. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- common specifications--: Part 4: system load protocol. Institute of Electrical and Electronics Engineers, 1994.
Find full textUnited States. Department of State, ed. Double taxation: Convention between the United States of America and Japan, signed at Washington, November 6, 2003, with protocol and exchange of notes. U.S. Dept. of State, 2012.
Find full textProtocol amending tax convention with Germany: Report (to accompany Treaty doc. 109-20 and exchange of notes dated August 17, 2006 (EC-2046)). U.S. G.P.O., 2007.
Find full textChina. Double taxation, taxes on income: Agreement between the United States of America and the People's Republic of China, signed at Beijing April 30, 1984 with Protocol and exchange of notes and protocol signed at Beijing May 10, 1986. Dept. of State, 1995.
Find full textMexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Dept. of State, 1998.
Find full textMexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Dept. of State, 1998.
Find full textBook chapters on the topic "Reuse and protocol exchange"
Liu, Chao, Zhongxiang Zheng, and Guangnan Zou. "Key Reuse Attack on NewHope Key Exchange Protocol." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12146-4_11.
Full textMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Authenticated Key Exchange Protocol." In Security Access in Wireless Local Area Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_6.
Full textRafat, Khan Farhan. "A Stealth Key Exchange Protocol." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22868-2_48.
Full textBarcau, Mugurel, Vicenţiu Paşol, Cezar Pleşca, and Mihai Togan. "On a Key Exchange Protocol." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69284-5_13.
Full textHe, Lihong. "Secure Group Key Exchange Protocol." In Electrical Engineering and Control. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21765-4_49.
Full textOniz, Cagil Can, Erkay Savas, and Albert Levi. "A Fair Multimedia Exchange Protocol." In Computer and Information Sciences - ISCIS 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569596_37.
Full textShanker, Udai, B. Vidyareddi, and Anupam Shukla. "PERDURABLE: A Real Time Commit Protocol." In Recent Trends in Information Reuse and Integration. Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0738-6_1.
Full textJiménez, Joan Campmany, Iza Romanowska, Rubina Raja, and Eivind Heldaas Seland. "2Modelling an Urban Hinterland. The Case of Roman Palmyra." In Exchange and Reuse in Roman Palmyra. Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132169.
Full textŻuchowska, Marta. "8Textile Economy of Roman Palmyra." In Exchange and Reuse in Roman Palmyra. Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132175.
Full textButcher, Kevin. "3Circuits of Exchange: Palmyrene Coins and Roman Monetary Plurality." In Exchange and Reuse in Roman Palmyra. Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132170.
Full textConference papers on the topic "Reuse and protocol exchange"
Saeed, Maryam, Hadi Shahriar Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun, and Mohammad Zare Bidoki. "A secure two-party password-authenticated key exchange protocol." In 2014 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 2014. http://dx.doi.org/10.1109/iri.2014.7051926.
Full textPedditi, Sandeep Reddy, Du Zhang, and Chung-E. Wang. "FIEP: An initial design of a firewall information exchange protocol." In 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI). IEEE, 2013. http://dx.doi.org/10.1109/iri.2013.6642446.
Full textNi, Peifang. "Augmented Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies without Scripts." In 8th International Conference on Artificial Intelligence and Fuzzy Logic System (AIFZ 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121605.
Full textBeringer, Dorothea, Laurence Melloul, and Gio Wiederhold. "A reuse and composition protocol for services." In the 1999 symposium. ACM Press, 1999. http://dx.doi.org/10.1145/303008.303027.
Full textHarrison, Andrew, Ian Harvey, Andrew Jones, David Rogers, and Ian Taylor. "Object reuse and exchange for publishing and sharing workflows." In the 6th workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2110497.2110506.
Full textYang, Xuan, Zhaoping Yu, and Bin Kang. "Chameleon-Based Optimistic Fair Exchange Protocol." In 2008 International Conference on Embedded Software and Systems. IEEE, 2008. http://dx.doi.org/10.1109/icess.2008.26.
Full textGanjavi, Ramin, Maryam Rajabzadeh Asaar, and Mahmoud Salmasizadeh. "A traceable optimistic fair exchange protocol." In 2014 11th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2014. http://dx.doi.org/10.1109/iscisc.2014.6994041.
Full textYiyao Hao, D. M. Havey, and D. A. Turner. "An exchange protocol for alternative currencies." In International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.78.
Full textSofu Risqi, Y. S., and Susila Windarta. "Design key exchange protocol SOFU-11." In 2016 International Seminar on Intelligent Technology and its Applications (ISITIA). IEEE, 2016. http://dx.doi.org/10.1109/isitia.2016.7828671.
Full textYi, Tong, Minyong Shi, and Wenqian Shang. "Personalized two party key exchange protocol." In 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS). IEEE, 2015. http://dx.doi.org/10.1109/icis.2015.7166659.
Full textReports on the topic "Reuse and protocol exchange"
Mahy, R., and B. Tate. Connection Reuse in the Session Initiation Protocol (SIP). Edited by V. Gurbani. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5923.
Full textKaufman, C., ed. Internet Key Exchange (IKEv2) Protocol. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4306.
Full textRatliff, S., S. Jury, D. Satterwhite, R. Taylor, and B. Berry. Dynamic Link Exchange Protocol (DLEP). RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8175.
Full textRose, M. The Blocks Extensible Exchange Protocol Core. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3080.
Full textFeinstein, B., and G. Matthews. The Intrusion Detection Exchange Protocol (IDXP). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4767.
Full textLear, E., and K. Crozier. Using the NETCONF Protocol over the Blocks Extensible Exchange Protocol (BEEP). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4744.
Full textClancy, T., and W. Arbaugh. Extensible Authentication Protocol (EAP) Password Authenticated Exchange. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4746.
Full textKaufman, C., P. Hoffman, Y. Nir, and P. Eronen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5996.
Full textKaufman, C., P. Hoffman, Y. Nir, P. Eronen, and T. Kivinen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7296.
Full textNeumann, Scott, Jeramy Lochner, Siddharth Sridhar, et al. Universal Utility Data Exchange (UUDEX) - Protocol Design. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1776875.
Full text