Siga este enlace para ver otros tipos de publicaciones sobre el tema: Reuse and protocol exchange.

Tesis sobre el tema "Reuse and protocol exchange"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Reuse and protocol exchange".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Djaffardjy, Marine. "Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.

Texto completo
Resumen
La bioinformatique est un domaine multidisciplinaire qui combine biologie, informatique et statistiques, permettant de mieux comprendre les mécanismes du vivant.Son fondement repose essentiellement sur l'analyse des données biologiques.L'émergence de nouvelles technologies, en particulier les avancées majeures dans le domaine du séquençage, a entraîné une croissance exponentielle des données, posant de nouveaux défis en matière d'analyse et de gestion des données.Pour exploiter ces données, des pipelines sont utilisés, enchaînant des outils et des processus informatiques pour conduire les anal
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Soltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Nilsson, Kim. "Reactive Networking using Dynamic Link Exchange Protocol." Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.

Texto completo
Resumen
This master thesis studies the possibilities of using a radio-router protocol in order to increase the quality of service in dynamic tactical network environments. We cover three radio-router protocols with emphasis on Dynamic Link Exchange Protocol (DLEP). Many applications, such as voice and video communication, have bandwidth and latency requirements which need to be fulfilled in order to provide a sufficient level of quality. This poses a problem in tactical network environments where links are typically dynamic and both bandwidth andlatency can vary. A radio-router protocol can alleviate
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Chandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sardana, Divya. "Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Page, Shannon Charles. "Testing Protocol Development for a Proton Exchange Membrane Fuel Cell." Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.

Texto completo
Resumen
Fuel cell technology has undergone significant development in the past 15 years, spurred in part by its unique energy conversion characteristics; directly converting chemical energy to electrical energy. As fuel cell technology has past through the prototype/pre-commercialisation development, there is increasing interest in manufacturing and application issues. Of the six different fuel cell types pursued commercially, the Proton Exchange Membrane (PEM) fuel cell has received the greatest amount of research and development investment due to its suitability in a variety of applications. A parti
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ninet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.

Texto completo
Resumen
Dans cette thèse, nous analysons le protocole IKEv2 à l'aide de trois outils de vérification formelle : Spin, ProVerif et Tamarin. Pour effectuer l'analyse avec Spin, nous étendons une méthode existante de modélisation. En particulier, nous proposons un modèle de la signature numérique, du MAC et de l'exponentiation modulaire, nous simplifions le modèle d'adversaire pour le rendre applicable à des protocoles complexes, et nous proposons des modèles de propriétés d'authentification. Nos analyses montrent que l'attaque par réflexion, une attaque trouvée par une précédente analyse, n'existe pas.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Thomson, Derek Stewart. "The development of packaged, reusable building services components : a pilot study in the UK national health service." Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Buck, Randall Jay. "WiFu Transport: A User-level Protocol Framework." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.

Texto completo
Resumen
It is well known that the transport layer protocol TCP has low throughput and is unfair in wireless mesh networks. Transport layer solutions for mesh networks have been primarily validated using simulations with simplified assumptions about the wireless network. The WiFu Transport framework complements simulator results by allowing developers to easily create and experiment with transport layer protocols on live networks. We provide a user-space solution that is flexible and promotes code reuse while maintaining high performance and scalability. To validate WiFu Transport we use it to build Wi
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.

Texto completo
Resumen
<p>SMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.</p><p>In order to solve these shortcomings, a new e-mail protocol needs to be defined. T
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Chawla, Nitin. "Registration and authentication protocol for OCEAN (Open Computation Exchange and Auctioning Network) /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1001125.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Myadam, Nishkal Gupta, and Bhavith Patnam. "Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20665.

Texto completo
Resumen
During the modern times, innovators and researchers developed a key technology known as Artificial Intelligence (AI) Marketplace which leverages the power of AI to efficiently utilize the data generated by millions of devices to create new and better services and software products. H2020 Bonseyes is one such project that provides us a collaborative cloud based model of the AI marketplace for the users who generally don’t have access to large data sets, algorithms etc by allowing them to collaborate which each other and exchange the software artifacts. Collaboration leads to issues related to a
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Dahlén, Marcus. "Security Architecture and Technologies for the Electronic Document Exchange with SOAP as Communication Protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2835.

Texto completo
Resumen
<p>In many industries the tracking and tracing of products within the supply chain is required by law. Companies in the metal working industry exchange so-called material test reports, which specify the product’s properties, the customer’s requirements, and serve as an assurance between the supplier and the customer. Internet technologies have changed the way companies exchange information and conduct business. In the metal working industry companies can implement an intermediary platform and make the exchange of material test reports more efficient. Furthermore, a client application that allo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Alotaibi, Abdullah S. "Design and evaluate a fair exchange protocol based on online trusted third party (TTP)." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7879.

Texto completo
Resumen
One of the most crucial factors that e-commerce protocols should address is a fair exchange. In this research, an advanced method of cryptography coupled with the pay per use technique is used. A new electronic commerce protocol for the exchange of commodities is introduced. The proposed new protocol guarantees both features while addressing the main drawbacks associated with other related protocols. The new suggested e-commerce protocol is composed of two stages: pre-exchange and exchange stages. When the suggested new protocol is analysed with scrupulous protocol analysis, it attains fair ex
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Geary, Aaron C. "Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocol." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FGeary.pdf.

Texto completo
Resumen
Thesis (M.S. in Applied Mathematics and M.S. in Information Technology Management)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Stanica, Pantelimon ; Kanevsky, Valery. "September 2009." Description based on title screen as viewed on November 6, 2009 Author(s) subject terms: Cryptography, Diffie-Hellman, Man-in-the-Middle Attack. Includes bibliographical references (p. 55-56). Also available in print.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Watkins, E. James. "Foulant adsorption onto ion exchange membranes." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/7062.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Texto completo
Resumen
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissi
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Stefik, Christopher J. "Effect of protocol mouthguard on VO₂ max in female hockey players using the skating treadmill." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79136.

Texto completo
Resumen
Athletes competing in contact sports commonly wear intra-oral dental mouthguards. Data are sparse concerning the influence of a mouthguard on breathing during exercise. We compared VE and VO2 during submaximal and maximal exercise on a skating treadmill (TM) while wearing an intra-oral dental mouthguard. Female varsity hockey players (n = 12) performed two skating tests on a TM with and without a mouthguard (WIPSS Jaw-Joint Protecto(TM)). The players wore the mouthguard during hockey practices prior to collection of ventilation data on the treadmill. Also, the players completed a questi
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Lampinen, Björn. "Protocol optimization of the filter exchange imaging (FEXI) sequence and implications on group sizes : a test-retest study." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196327.

Texto completo
Resumen
Diffusion weighted imaging (DWI) is a branch within the field of magnetic resonance imaging (MRI) that relies on the diffusion of water molecules for its contrast. Its clinical applications include the early diagnosis of ischemic stroke and mapping of the nerve tracts of the brain. The recent development of filter exchange imaging (FEXI) and the introduction of the apparent exchange rate (AXR) present a new DWI based technique that uses the exchange of water between compartments as contrast. FEXI could offer new clinical possibilities in diagnosis, differentiation and treatment follow-up of co
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Alston, Katherine Yvette. "A heuristic on the rearrangeability of shuffle-exchange networks." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2521.

Texto completo
Resumen
The algorithms which control network routing are specific to the network because the algorithms are designed to take advantage of that network's topology. The "goodness" of a network includes such criteria as a simple routing algorithm and a simple routing algorithm would increase the use of the shuffle-exchange network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

R, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Wang, Hao-Hsien. "Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1087.

Texto completo
Resumen
The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE protocol possess, and (2) How does one, in a step by step fashion, create a secure AKE protocol? This thesis aims to answer these two questions. The thesis contains two parts: one is a survey of previous works on the desired features of the Station-to-Station (STS) protocol, and the other is a study of a previously proposed design methodology in designing secure AKE pro
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Andreasson, Samuel, and Jesper Palmér. "OPC UA Field eXchange Prototyping : Enabling decentralized communication using Publish/Subscribe." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45029.

Texto completo
Resumen
Open Platform Communication Unified Architecture, or OPC UA, is a world-leading communication protocol specializing in unifying and automating production systems communication. In 2018 the OPC Foundation, an industrial consortium, started the OPC UA Field eXchange initiative to develop the current protocol to extend the reach of the communication down to field level devices like sensors and actuators. This paper explores whether OPC UA FX software can be implemented and integrated with HMS Networks’ product AnyBus CompactCom M40.  The problem formulation stems from the future need for factory
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

KUNDA, SAKETH RAM. "Methods to Reuse CAD Data in Tessellated Models for Efficient Visual Configurations : An Investigation for Tacton Systems AB." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281748.

Texto completo
Resumen
Data loss has always been a side effect of sharing 3D models between different CAD systems. Continuous research and new frameworks have been implemented to minimise the data loss in CAD and in other downstream applications separately like 3D visual graphics applications (eg. 3DS Max, Blender etc.). As a first step into this research area, the thesis is an explorative study on understanding the problem of CAD data loss while exchanging models between a CAD application and a visual application. The thesis is performed at Tacton systems which provides product configurations to their customers in
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.

Texto completo
Resumen
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer Security and Secure Shell protocols. We introduce new security frameworks for analysing security properties of protocols involving negotiation, multiple ciphersuites, long-term key reuse, and time synchronisation. Our results have increased confidence
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Lluch-Ariet, Magí. "Contributions to efficient and secure exchange of networked clinical data : the MOSAIC system." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/388037.

Texto completo
Resumen
The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Multi-agent systems (MAS), interoperability standards (DICOM, HL7 or EN13606) and clinical Ontologies, are facilitating data interchange among different clinical centres around the world. However, as more and more data becomes available, and more heterogeneous this data gets, the task of accessing and exploiting the large number of distributed repositories to extract useful knowledge becomes increasingly complex. Beyond the existing networks and advances for
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Aguilar, Rodriguez Adriana. "Building networks in the Climate Change Convention : co-ordination failure in the establishment of Clean Development Mechanism (CDM) in Mexico." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/building-networks-in-the-climate-change-convention--coordination-failure-in-the-establishment-of-clean-development-mechanism-cdm-in-mexico(02f1f20b-914a-4ca0-8ce0-0423ab3e6100).html.

Texto completo
Resumen
This thesis evaluates why the implementation of a tree plantation project in Chiapas, Mexico, called Scolel Te failed in its attempt to participate in the CDMs scheme. The Scolel Te project brings together farmers and local organisations into a network of exchange of resources that aims at producing an outcome that is only possible through the co-ordination and co-operation of all participants: the emission of carbon certificates. This thesis studies the co-ordination problems that local actors face at the moment of establishing the carbon projects by identifying how formal and informal mechan
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Shoaib, Naveed. "A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Pfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.

Texto completo
Resumen
Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. Accordingly, a major interest in academic research on formal methods for protocol analysis has been apparent for the last two decades. Such methods formalize the operational semantics of a protocol, laying the base for protocol verification with automatic model checking tools. So far, little work in this field has focused on protocol standardization. Within this thesis
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Pitchai, Karthik Raja. "An executable meta-model for safety oriented software and systems development processes within the avionics domain in compliance with RTCA DO 178 B." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-19296.

Texto completo
Resumen
"There are two critical points in every aerial flight—its beginning and its end." — Alexander Graham Bell, 1906. From beginning till the end, the safety critical software plays a vital role in avionics and hence its development and its certification are indispensable. “RTCA DO-178B- Software Considerations in Airborne Systems and Equipment Certification” provides the normative guidelines to develop such systems. In particular, this standard provides the safety protocol and processes that should be followed to achieve safe systems. The safety guideline of DO178B emphasizes more on better docume
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Rozsnyó, Tomáš. "Modular Multiple Liquidity Source Price Streams Aggregator." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236492.

Texto completo
Resumen
This MSc Thesis was performed during a study stay at the Hochschule Furtwangen University, Furtwangen, Germany. This Master Project provides a theoretical background for understanding financial market principles. It focuses on foreign exchange market, where it gives a description of fundamentals and price analysis. Further, it covers principles of high-frequency trading including strategy, development and cost. FIX protocol is the financial market communication protocol and is discussed in detail. The core part of Master Project are sorting algorithms, these are covered on theoretical and prac
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Greene, Owen J., and P. Batchelor. "Information Exchange and Transparency: Key Elements of an International Action Programme on Small Arms." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4267.

Texto completo
Resumen
yes<br>Efforts to combat and prevent illicit trafficking in, and proliferation and misuse of, small arms and light weapons (SALW) are hampered by lack of relevant information-exchange and transparency. International information exchange and transparency arrangements are key elements of each of the main elements of the international action programme on SALW to be launched at the UN 2001 Conference. There is great scope to develop information management and distribution arrangements to disseminate and exchange of relevant information on SALW without seriously compromising national securit
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Dhavala, Kishore. "Essays on Emissions Trading Markets." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/733.

Texto completo
Resumen
This dissertation is a collection of three economics essays on different aspects of carbon emission trading markets. The first essay analyzes the dynamic optimal emission control strategies of two nations. With a potential to become the largest buyer under the Kyoto Protocol, the US is assumed to be a monopsony, whereas with a large number of tradable permits on hand Russia is assumed to be a monopoly. Optimal costs of emission control programs are estimated for both the countries under four different market scenarios: non-cooperative no trade, US monopsony, Russia monopoly, and cooperative tr
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Hussain, Dostdar, and Muhammad Ismail. "Requirement Engineering : A comparision between Traditional requirement elicitation techniqes with user story." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-70174.

Texto completo
Resumen
Requirements are features or attributes which we discover at the initial stage of building a product. Requirements describe the system functionality that satisfies customer needs. An incomplete and inconsistent requirement of the project leads to exceeding cost or devastating the project. So there should be a process for obtaining sufficient, accurate and refining requirements such a process is known as requirement elicitation. Software requirement elicitation process is regarded as one of the most important parts of software development. During this stage it is decided precisely what should b
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Olejník, Tomáš. "Zpracování obchodních dat finančního trhu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412828.

Texto completo
Resumen
The master's thesis' objective is to study basics of high-frequency trading, especially trading at foreign exchange market. Project deals with foreign exchange data preprocessing, fundamentals of market data collecting, data storing and cleaning are discussed. Doing decisions based on poor quality data can lead into fatal consequences in money business therefore data cleaning is necessary. The thesis describes adaptive data cleaning algorithm which is able to adapt current market conditions. According to design a modular plug-in application for data collecting, storing and following cleaning h
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Behnam, Bobby. "Modélisation d'échange d'informations de composants électroniques virtuels." Grenoble INPG, 1998. http://www.theses.fr/1998INPG0126.

Texto completo
Resumen
Les circuits integres d'aujourd'hui sont fabriques en utilisant des technologies submicroniques, ce qui permet de realiser un systeme entier sur une seule puce de silicium. On a alors assiste a la naissance du concept de design-reuse qui, par reutilisation des blocs fonctionnels externes, offre aux concepteurs des solutions pour atteindre le systeme-sur-puce. Ces blocs sont aussi appeles composants virtuels (vc) ou proprietes intellectuelles (ip). Ce nouveau concept induit, beaucoup de problemes nouveaux. Le tout premier probleme rencontre par un integrateur d'ip, est l'absence de normes et d'
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Wen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.

Texto completo
Resumen
Secret sharing is critical to most applications making use of security and remains one of the most challenging research areas in modern cryptography. In this thesis, we propose a novel efficient multi-secret sharing scheme based on the Chinese remainder theorem (CRT) with two verification methods, while the previous works are mostly based on the Lagrange polynomial. Key management schemes play an important role in communication security in Wireless Sensor Networks (WSNs). While the previous works mainly targeting on two different types of WSNs: distributed and hieratical, in this thesis, we
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Valle, Edson Cordeiro do. "Minimização do uso de água e efluentes com considerações econômicas e operacionais via programação matemática." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2005. http://hdl.handle.net/10183/8170.

Texto completo
Resumen
A água é uma matéria-prima estratégica na indústria química, petroquímica e de alimentos, sendo utilizada em diversas etapas dos processos. Devido à importância econômica e ao impacto ambiental resultante do consumo da água na indústria, o uso racional da água vem sendo amplamente enfatizado. Nas últimas décadas, diversas metodologias foram propostas para a minimização do consumo de água e emissão de efluentes líquidos na indústria, baseadas em conceitos de integração mássica como reuso, reciclo e regeneração das correntes que conectam os processos. As metodologias propostas na literatura para
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Uematsu, Akira Arice de Moura Galvão. "Algoritmos de negociação com dados de alta frequência." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45133/tde-28042012-114138/.

Texto completo
Resumen
Em nosso trabalho analisamos os dados provenientes da BM&F Bovespa, a bolsa de valores de São Paulo, no período de janeiro de 2011, referentes aos índices: BOVESPA (IND), o mini índice BOVESPA (WIN) e a taxa de câmbio (DOL). Estes dados são de alta frequência e representam vários aspectos da dinâmica das negociações. No conjunto de valores encontram-se horários e datas dos negócios, preços, volumes oferecidos e outras características da negociação. A primeira etapa da tese foi extrair as informações necessárias para análises a partir de um arquivo em protocolo FIX, foi desenvolvido um programa
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Cunha, Rafael de Souza. "Protocolo de Negociação Baseado em Aprendizagem-Q para Bolsa de Valores." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/501.

Texto completo
Resumen
Made available in DSpace on 2016-08-17T14:53:24Z (GMT). No. of bitstreams: 1 Dissertacao Rafael de Souza.pdf: 5581665 bytes, checksum: 4edbe8b1f2b84008b5129a93038f2fee (MD5) Previous issue date: 2013-03-04<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>In this work, we applied the technology of Multi-Agent Systems (MAS) in the capital market, i.e., the stock market, specifically in Bolsa de Mercadorias e Futuros de São Paulo (BM&FBovespa). The research focused mainly on negotiation protocols and learning of investors agents. Within the Stock Exchange competitive field, t
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Zekri, Dorsaf. "Agrégation et extraction des connaissances dans les réseaux inter-véhicules." Thesis, Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0001/document.

Texto completo
Resumen
Les travaux réalisés dans cette thèse traitent de la gestion des données dans les réseaux inter-véhiculaires (VANETs). Ces derniers sont constitués d’un ensemble d’objets mobiles qui communiquent entre eux à l’aide de réseaux sans fil de type IEEE 802.11, Bluetooth, ou Ultra Wide Band (UWB). Avec de tels mécanismes de communication, un véhicule peut recevoir des informations de ses voisins proches ou d’autres plus distants, grâce aux techniques de multi-sauts qui exploitent dans ce cas des objets intermédiaires comme relais. De nombreuses informations peuvent être échangées dans le contexte de
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.

Texto completo
Resumen
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs o
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Foo, Ernest. "Strategies for designing efficient electronic payment schemes." Thesis, Queensland University of Technology, 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Krontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.

Texto completo
Resumen
This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. The workof this thesis extends the EDHOC protocol with a certificate enrollment functionality, targeting IoT constrained devices and it has been implemented for analysis and evaluation purposes. The main scope of this document is to study the security, performance and scalability
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

"Channel reuse multiple access protocol for bidirectional bus networks." Massachusetts Institute of Technology, Laboratory for Information and Decision Systems], 1992. http://hdl.handle.net/1721.1/3254.

Texto completo
Resumen
Whay Chiou Lee, Pierre Humblet.<br>Caption title.<br>Includes bibliographical references (leaf 5).<br>Supported by the Defense Advanced Research Projects Agency. N00014-84-K-0357 Supported by the National Science Foundation. NSF-ECS-7919880 Supported by the Army Research Office. ARO-DAAL03-86-K-0171
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Chen, Huai-Hsien. "Implementation of Internet Key Exchange Protocol." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200423262600.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Chen, Huai-Hsien, and 陳懷先. "Implementation of Internet Key Exchange Protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/61507602852405847722.

Texto completo
Resumen
碩士<br>國立臺灣大學<br>電機工程學研究所<br>92<br>When the Internet has grown in the past ten years, more and more people communicate with their friends over the Internet. But Internet does not provide privacy; this means that a perpetrator may observe confidential data when the data traverses the Internet. A perpetrator may also modify data traversed the Internet, and we loss data integrity. Things can be worse; a perpetrator may pretend you to send data to others. Thus, some security mechanisms must be used to prevent the above situation from happening IP Security (IPSec) is a network-layer protocol. By im
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

HSU, LIN-CHIH, and 許令芷. "Password authentication and key exchange protocol." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/59451420718306413483.

Texto completo
Resumen
碩士<br>佛光大學<br>資訊學系<br>96<br>Internet provides various services enabling the convenience of human life. However, it accompanies a variety of information security attacks. Before having access to the computer resources in remote site, it is one of the important issues in network security considerations to have a mutual authentication of the communicating entities. We proposed a new method of password authentication and key exchange protocol with smart card in this paper. The proposed scheme has the following characteristics: (1) it is not required for the server to store any authentication data
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Lee, Wei-Cheng, and 李威成. "A Fair Exchange Protocol for Internet Auction." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/94696804468461683616.

Texto completo
Resumen
碩士<br>輔仁大學<br>資訊管理學系<br>94<br>With the popularity of internet and the rise of electronic commerce, internet auctions have become one of the most popular shopping ways. But, there are so many cheating events in internet auctions, which will cause the consumers to doubt of the feasibility of online shopping and obstruct the development of internet auctions. Facing the increasing cheating problems of internet auctions, some major auction websites guarantee their customers against all lost and bring out some policies. However, these policies have some deficiencies, so it is necessary to design a f
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Li, Wen-Hui, and 李文輝. "An Efficient Three-Party Key Exchange Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59665431311256984116.

Texto completo
Resumen
碩士<br>朝陽科技大學<br>資訊工程系碩士班<br>97<br>The introduction of the Internet era also means the dawn of mass threats of e-virus and hackers. Thus, the most appealing element of three-party communication would be the minimizing need of the session key in each user. All recent studies about the three party communications have been concentrating on the safety reliance of public key cryptosystem on the authentication server between each two parties. Yet, this method is prone to forgery identity and password guessing attacks. Therefore, some claimed that the bypassing of public key exchange protocol on authe
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!