Literatura académica sobre el tema "ARM protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "ARM protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "ARM protocol"
Wijdenes, Paula, Michael Brouwers y Corry K. van der Sluis. "Prosthesis Prescription Protocol of the Arm (PPP-Arm): The implementation of a national prosthesis prescription protocol". Prosthetics and Orthotics International 42, n.º 1 (4 de enero de 2018): 56–59. http://dx.doi.org/10.1177/0309364617747962.
Texto completoYang, Wei Ming. "Design of UART Downloading for Multi-Process Micro-Kernel Embedded OS on ARM". Applied Mechanics and Materials 389 (agosto de 2013): 843–48. http://dx.doi.org/10.4028/www.scientific.net/amm.389.843.
Texto completoZhang, Jin Hai. "Study on Embedded TCP_IP Protocol and ARM Implementation". Applied Mechanics and Materials 556-562 (mayo de 2014): 6046–49. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6046.
Texto completoLi, Dan. "The Research of HART Sensor System Based on ARM". Applied Mechanics and Materials 602-605 (agosto de 2014): 2855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2855.
Texto completoOdutayo, Ayodele, Dmitry Gryaznov, Bethan Copsey, Paul Monk, Benjamin Speich, Corran Roberts, Karan Vadher et al. "Design, analysis and reporting of multi-arm trials and strategies to address multiple testing". International Journal of Epidemiology 49, n.º 3 (16 de marzo de 2020): 968–78. http://dx.doi.org/10.1093/ije/dyaa026.
Texto completoMorris, David M. y Ben R. Londeree. "The Effects of Bicycle Crank Arm Length on Oxygen Consumption". Canadian Journal of Applied Physiology 22, n.º 5 (1 de octubre de 1997): 429–38. http://dx.doi.org/10.1139/h97-027.
Texto completoSeys, Stefaan y Bart Preneel. "ARM: anonymous routing protocol for mobile ad hoc networks". International Journal of Wireless and Mobile Computing 3, n.º 3 (2009): 145. http://dx.doi.org/10.1504/ijwmc.2009.028896.
Texto completoHou, Jing Jing y Gen Wang Liu. "A Design of Li-Ion Battery Formation System Based on ARM Embedded Computer". Advanced Materials Research 354-355 (octubre de 2011): 998–1001. http://dx.doi.org/10.4028/www.scientific.net/amr.354-355.998.
Texto completoPedrosa, Gustavo F., Marina G. Simões, Marina O. C. Figueiredo, Lucas T. Lacerda, Brad J. Schoenfeld, Fernando V. Lima, Mauro H. Chagas y Rodrigo C. R. Diniz. "Training in the Initial Range of Motion Promotes Greater Muscle Adaptations Than at Final in the Arm Curl". Sports 11, n.º 2 (6 de febrero de 2023): 39. http://dx.doi.org/10.3390/sports11020039.
Texto completoWalker, R., S. Powers y M. K. Stuart. "Peak oxygen uptake in arm ergometry: effects of testing protocol." British Journal of Sports Medicine 20, n.º 1 (1 de marzo de 1986): 25–26. http://dx.doi.org/10.1136/bjsm.20.1.25.
Texto completoTesis sobre el tema "ARM protocol"
Jonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.
Texto completoDistribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.
Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.
What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.
This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.
The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.
Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation". Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.
Texto completoŠpanihel, Pavol. "Zabezpečovací modul pro reklamní robot FEKT VUT v Brně". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.
Texto completoZemánek, Petr. "Modulární RGB LED displej s rozhraním Ethernet". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.
Texto completoKrůpa, Tomáš. "Univerzální zavaděč pro mikrokontrolér Kinetis K60". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.
Texto completoPérez, María del Carmen Marín. "Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins". Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.
Texto completoNovotný, Jan. "Zpracování signálu UHF RFID čtečky". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.
Texto completoSabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures". Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Texto completoThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Prítel, Pavol. "Implementace protokolu EtherCAT pro procesor ARM". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.
Texto completoSanti, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado". [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.
Texto completoDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCPH2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solucionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de desempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avaliados e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into account the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the controller with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
Libros sobre el tema "ARM protocol"
Parker, Sue. 'Protocols are good for nurses'. Sutton: Reed Healthcare Communications, 1998.
Buscar texto completoDocumentary protocols: Protocoles documentaires (1967-1975) / sous la direction de Vincent Bonin avec la collaboration de Michèle Thériault. Montréal (Québec) Canada: Galerie Leonard & Bina Ellen Art Gallery, 2010.
Buscar texto completo1933-, Vazan Bill y Musée national des beaux-arts du Québec, eds. Les matins infidèles: L'art du protocole. Québec, Québec: Musée national des beaux-arts du Québec, 2013.
Buscar texto completoPardon me, your manners are showing!: Professional etiquette, protocol & diplomacy. Grand Forks, ND: Center for Innovation & Business Development, 1992.
Buscar texto completoRizzo, Galleria Michela y Biennale di Venezia (55th : 2013 : Venice, Italy), eds. Protocolli veneziani I. Cinisello Balsamo, Milano: Silvana, 2013.
Buscar texto completoJones, Robin, Scott W. Miller, Nicole Cappuccio y Jennifer Courtwright. AIM national aquatic monitoring framework: Field protocol for wadeable lotic systems. Denver, Colo: U.S. Department of the Interior, Bureau of Land Management, National Operations Center, 2017.
Buscar texto completoR, Chari P., Rajain Arpit y Institute of Peace and Conflict Studies (New Delhi, India), eds. Working towards a verification protocol for biological weapons. New Delhi: Institute of Peace and Conflict Studies, 2001.
Buscar texto completoMiller, Derek. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations Institute for Disarmament Research, 2008.
Buscar texto completoCapítulos de libros sobre el tema "ARM protocol"
González, Laura Pedraza, Leonardo Barneschi, Daniele Padula, Luca De Vico y Massimo Olivucci. "Evolution of the Automatic Rhodopsin Modeling (ARM) Protocol". En Topics in Current Chemistry Collections, 105–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07658-9_5.
Texto completoBina, T. S., M. E. Kunkel, E. G. R. dos Anjos, R. C. Ribeiro, T. V. Ribeiro y H. D. Silveira. "Creation of a 3D printing protocol for the unlimbited arm prosthesis". En Advances and Current Trends in Biomechanics, 327–30. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003217152-72.
Texto completoFerrario, Cinzia, Yousra Ben Khadra, Michela Sugni, M. Daniela Candia Carnevali, Pedro Martinez y Francesco Bonasoro. "Studying Echinodermata Arm Explant Regeneration Using Echinaster sepositus". En Methods in Molecular Biology, 263–91. New York, NY: Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2172-1_14.
Texto completoPeng, Daogang, Hao Zhang, Jiannian Weng, Hui Li y Fei Xia. "Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux". En Web Information Systems and Mining, 363–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05250-7_39.
Texto completoKoziel, Brian, Amir Jalali, Reza Azarderakhsh, David Jao y Mehran Mozaffari-Kermani. "NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM". En Cryptology and Network Security, 88–103. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_6.
Texto completoBimonte-Nelson, Heather A. "The Water Radial-Arm Maze: Four Out of Eight Arms Platformed Protocol for Rodents". En The Maze Book, 411–19. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_15.
Texto completoBimonte-Nelson, Heather A. "The Water Radial-Arm Maze: Seven Out of Eight Arms Platformed Protocol for Rodents". En The Maze Book, 421–27. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_16.
Texto completoDaniel, Jill M. "The Land Radial-Arm Maze: Eight Out of Eight Arms Baited with Food Protocol for Rodents". En The Maze Book, 429–32. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-2159-1_17.
Texto completoChoi, Joonwon, Adam Chlipala y Arvind. "Hemiola: A DSL and Verification Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols". En Computer Aided Verification, 317–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_16.
Texto completoCrocker, Trisha y Susan M. D. Carr. "Intervention Protocol". En Clay Work and Body Image in Art Therapy, 137–50. New York: Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003097884-11.
Texto completoActas de conferencias sobre el tema "ARM protocol"
Wido, Daniel M., Denis J. DiAngelo y Brian P. Kelly. "Robotic Simulation of an Eccentric Lever Arm Protocol and a Novel Head Weight Protocol for Evaluation of the Subaxial Cervical Spine: An In Vitro Biomechancial Comparison". En ASME 2011 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2011. http://dx.doi.org/10.1115/sbc2011-53740.
Texto completoMeling, Hein y Alberto Montresor. "Type-safe dynamic protocol composition in Jgroup/ARM". En the 3rd International DiscCoTec Workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1566966.1566967.
Texto completoSeys, S. y B. Preneel. "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks". En 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). IEEE, 2006. http://dx.doi.org/10.1109/aina.2006.104.
Texto completoJadhav, A. D. y S. D. Mali. "RTOS based MODBUS protocol implementation on ARM-7 processor". En the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980298.
Texto completoKelong Wang, Daogang Peng, Lei Song y Hao Zhang. "Implementation of Modbus Communication Protocol based on ARM Coretx-M0". En 2014 International Conference on System Science and Engineering (ICSSE). IEEE, 2014. http://dx.doi.org/10.1109/icsse.2014.6887907.
Texto completoLou Guohuan, Cai Haiting y Li Shujie. "Research and implementation of ARM-based fieldbus protocol conversion method". En 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5544399.
Texto completoMartinez, H. I. H., C. A. C. Morales y O. A. Martinez. "Automation of a robotic arm by analysing the CAN protocol". En 14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004. IEEE, 2004. http://dx.doi.org/10.1109/icecc.2004.1269539.
Texto completoAtmoko, Rachmad Andri y Daoguo Yang. "Online Monitoring & Controlling Industrial Arm Robot Using MQTT Protocol". En 2018 IEEE International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (Robionetics ). IEEE, 2018. http://dx.doi.org/10.1109/robionetics.2018.8674672.
Texto completoRupalwala, Shahin S. "ARM 11 based real-time video streaming server using RTSP protocol". En 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO). IEEE, 2015. http://dx.doi.org/10.1109/eesco.2015.7253964.
Texto completoZola, Enrica, Israel Martin-Escalona, Francisco Barcelo-Arroyo y Sergio Machado. "Implementation and analysis of the AODVv2 Routing Protocol in ARM devices". En 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2021. http://dx.doi.org/10.1109/isncc52172.2021.9615672.
Texto completoInformes sobre el tema "ARM protocol"
Quak, Evert-jan. Lessons Learned from Community-based Management of Acute Malnutrition (CMAM) Programmes that Operate in Fragile or Conflict Affected Settings. Institute of Development Studies (IDS), septiembre de 2021. http://dx.doi.org/10.19088/k4d.2021.133.
Texto completoChen, Po-Wei, Hsiao-Yuan Su, Chih-Hsing Wu, Jih-I. Yeh, Ching-Hui Loh, Li-Yu Chen, Huei-Kai Huang y Shu-Man Lin. Association of Bisphosphonates with Risk of Incident Diabetes and Glycemic Control: A Protocol of Systematic Review and Meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, abril de 2022. http://dx.doi.org/10.37766/inplasy2022.4.0125.
Texto completoAndersen, K. The Authenticated Received Chain (ARC) Protocol. Editado por B. Long, S. Blank y M. Kucherawy. RFC Editor, julio de 2019. http://dx.doi.org/10.17487/rfc8617.
Texto completoPstuty, Norbert, Mark Duffy, Dennis Skidds, Tanya Silveira, Andrea Habeck, Katherine Ames y Glenn Liu. Northeast Coastal and Barrier Network Geomorphological Monitoring Protocol: Part I—Ocean Shoreline Position, Version 2. National Park Service, junio de 2022. http://dx.doi.org/10.36967/2293713.
Texto completoZareian, Farzin y Joel Lanning. Development of Testing Protocol for Cripple Wall Components (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, noviembre de 2020. http://dx.doi.org/10.55461/olpv6741.
Texto completoSprague, Joshua, David Kushner, James Grunden, Jamie McClain, Benjamin Grime y Cullen Molitor. Channel Islands National Park Kelp Forest Monitoring Program: Annual report 2014. National Park Service, agosto de 2022. http://dx.doi.org/10.36967/2293855.
Texto completoArkko, J. y C. Pignataro. IANA Allocation Guidelines for the Address Resolution Protocol (ARP). RFC Editor, abril de 2009. http://dx.doi.org/10.17487/rfc5494.
Texto completoChu, Dahtzen, James Miller, David Underwood, Stuart Foltz, Scott Lux, Eileen Westervelt, Juan Davila-Perez et al. Standard protocol for protective storage of dormant Army facilities. Engineer Research and Development Center (U.S.), septiembre de 2018. http://dx.doi.org/10.21079/11681/29289.
Texto completoMartins, Francisco, Cíntia França, Francisco Santos, Diogo Martinho, Carolina Saldanha y Élvio Rúbio Gouveia. Emerging technologies to promote fans interaction in football events: a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, febrero de 2023. http://dx.doi.org/10.37766/inplasy2023.2.0015.
Texto completoLeis, Sherry, Mike DeBacker, Lloyd Morrison, Gareth Rowell y Jennifer Haack. Vegetation community monitoring protocol for the Heartland Inventory and Monitoring Network: Narrative, Version 4.0. Editado por Tani Hubbard. National Park Service, noviembre de 2022. http://dx.doi.org/10.36967/2294948.
Texto completo