Gotowa bibliografia na temat „Timed business protocols”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Timed business protocols”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Timed business protocols"
MOKHTARI-ASLAOUI, KARIMA, SALIMA BENBERNOU, SOROR SAHRI, VASILIOS ANDRIKOPOULOS, FRANK LEYMANN, and MOHAND-SAID HACID. "TIMED PRIVACY-AWARE BUSINESS PROTOCOLS." International Journal of Cooperative Information Systems 21, no. 02 (June 2012): 85–109. http://dx.doi.org/10.1142/s0218843012500013.
Pełny tekst źródłaElabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.
Pełny tekst źródłaAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Pełny tekst źródłaBiornstad, Biorn, Cesare Pautasso, and Gustavo Alonso. "Enforcing web services business protocols at run-time: a process-driven approach." International Journal of Web Engineering and Technology 2, no. 4 (2006): 396. http://dx.doi.org/10.1504/ijwet.2006.010422.
Pełny tekst źródłaRao, N. H. "Electronic Commerce and Opportunities for Agribusiness in India." Outlook on Agriculture 32, no. 1 (March 2003): 29–33. http://dx.doi.org/10.5367/000000003101294235.
Pełny tekst źródłaUBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.
Pełny tekst źródłaSayeed, Sarwar, and Hector Marco-Gisbert. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks." Applied Sciences 10, no. 18 (September 22, 2020): 6607. http://dx.doi.org/10.3390/app10186607.
Pełny tekst źródłaHerschel, Richard T., and Nicolle Clements. "The Importance of Storytelling in Business Intelligence." International Journal of Business Intelligence Research 8, no. 1 (January 2017): 26–39. http://dx.doi.org/10.4018/ijbir.2017010102.
Pełny tekst źródłaRigin, Anton Mikhailovich, and Sergey Andreevich Shershakov. "Method of Performance Analysis of Time-Critical Applications Using DB-Nets." Proceedings of the Institute for System Programming of the RAS 33, no. 3 (2021): 109–22. http://dx.doi.org/10.15514/ispras-2021-33(3)-9.
Pełny tekst źródłaJain, Tarun, and Bijendra Nath Jain. "Infection Testing at Scale: An Examination of Pooled Testing Diagnostics." Vikalpa: The Journal for Decision Makers 46, no. 1 (March 2021): 13–26. http://dx.doi.org/10.1177/02560909211018906.
Pełny tekst źródłaRozprawy doktorskie na temat "Timed business protocols"
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Pełny tekst źródłaElabd, Emad. "Compliance of Web services over a high level specification." Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.
Pełny tekst źródłaKsiążki na temat "Timed business protocols"
Ovodenko, Alexander. Producers, Trade Groups, and the Design of Global Environmental Regimes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190677725.003.0006.
Pełny tekst źródłaCalloway, Colin G. Treaties and Treaty Making. Edited by Frederick E. Hoxie. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199858897.013.34.
Pełny tekst źródłaCzęści książek na temat "Timed business protocols"
Copei, Sebastian, Manuel Wickert, and Albert Zündorf. "Certification as a Service." In Agile Processes in Software Engineering and Extreme Programming – Workshops, 203–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58858-8_21.
Pełny tekst źródłaEngel, Markus, Christopher Kramer, Tobias Braun, Dennis Christmann, and Reinhard Gotzhein. "BiPS – A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application." In E-Business and Telecommunications, 313–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11039-0_15.
Pełny tekst źródłaNorville, Richard S., Kamesh Namuduri, and Ravi Pendse. "Node Authentication in Networks Using Zero-Knowledge Proofs." In Web Services Security and E-Business, 142–64. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch008.
Pełny tekst źródłaRabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Ontologies and Big Data Considerations for Effective Intelligence, 327–412. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch008.
Pełny tekst źródłaRabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 270–357. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch013.
Pełny tekst źródłaVukovic, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Handbook of Research on E-Business Standards and Protocols, 412–29. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch019.
Pełny tekst źródłaPoon, Simpson. "Future of Small Business E-Commerce." In Encyclopedia of Information Science and Technology, First Edition, 1253–56. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch221.
Pełny tekst źródłaLee, Byung Kwan, Seung Hae Yang, and Tai-Chi Lee. "A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm." In Business Data Communications and Networking, 328–45. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch013.
Pełny tekst źródłaVuković, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Crowdsourcing, 173–92. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8362-2.ch009.
Pełny tekst źródłaLin, Koong, Chad Lin, and Huei Leu. "Decision Analysis for Business to Adopt RFID." In Ubiquitous and Pervasive Computing, 1219–27. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.
Pełny tekst źródłaStreszczenia konferencji na temat "Timed business protocols"
Mokhtari, Karima, Salima Benbernou, Mohsen Rouached, Frank Leyman, and Mohand-Said Hacid. "Privacy Time-Related Analysis in Business Protocols." In 2009 IEEE International Conference on Web Services (ICWS). IEEE, 2009. http://dx.doi.org/10.1109/icws.2009.87.
Pełny tekst źródłaXiang, Mantian, Lihua Sun, and Lihong Li. "Time-diffusion synchronization protocols in wireless sensor networks." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5882272.
Pełny tekst źródła"TOWARDS RUN-TIME PROTOCOL ANOMALY DETECTION AND VERIFICATION." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001395802990304.
Pełny tekst źródłaAlexieva, Sonya. "COMMUNICATIONS IN TOURISM IN TIMES OF PANDEMIC: FROM CONVENTIONAL TO DIGITAL CONNECTIVITY." In TOURISM AND CONNECTIVITY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/tc2020.655.
Pełny tekst źródłaMekid, Samir, and Usman Akbar. "Configuration and Business Protocol of International Load Sharing of Manufacturing and its Challenges Under I4.0 and IIoT." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10158.
Pełny tekst źródłaMa, Haiying, and Ning Cai. "Swarm Stability of Compartmental Networks with Linear Time-Invariant High-Order Dynamical Protocol." In 2011 International Conference on Business Computing and Global Informatization (BCGIn). IEEE, 2011. http://dx.doi.org/10.1109/bcgin.2011.138.
Pełny tekst źródłaResner, Davi, and Antonio Augusto Frohlich. "TSTP MAC: A Foundation for the Trustful Space-Time Protocol." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.159.
Pełny tekst źródłaLo Iacono Ferreira, Vanesa G., and Juan Ignacio Torregrosa López. "Life Cycle Sustainability Analysis for Circular Economy." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10490.
Pełny tekst źródłaPorumb, Andra-Teodora, Adina Săcara-Oniţa, and Cristian Porumb. "THE DENTAL MEDICINE SECTOR IN THE AGE OF THE COVID-19 PANDEMIC – RECOVERY BETWEEN RISKS AND CHALLENGES." In Sixth International Scientific-Business Conference LIMEN Leadership, Innovation, Management and Economics: Integrated Politics of Research. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/limen.2020.101.
Pełny tekst źródłaRajan, Vaidyanath, Badri Narayanan, Michael Barrett, and Kevin Beardsley. "Stainless Steel Pipe Welding With No Backing Gas." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21799.
Pełny tekst źródła