Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protocole jeton")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 33

  • Page / 2
Export

Selection :

  • and

Embedding distance-bounding protocols within intuitive interactionsBUSSARD, Laurent; ROUDIER, Yves.Lecture notes in computer science. 2004, pp 143-156, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

Modified raymond's algorithm for priority (MRA-P) based mutual exclusion in distributed systemsKANRAR, S; CHAKI, N.Lecture notes in computer science. 2006, pp 325-332, issn 0302-9743, isbn 3-540-68379-8, 1Vol, 8 p.Conference Paper

A hybrid MAC protocol based on implicit token and CSMA/CA for wireless networkHAN, Tae-Man; KIM, Dong-Won; KIM, Sang-Ha et al.Lecture notes in computer science. 2007, pp 643-650, issn 0302-9743, isbn 978-3-540-69421-2, 8 p.Conference Paper

Implementation of a bandwidth allocation scheme in the MS/TP protocolSEUNG HO HONG; SONG, Won-Seok; KWON, Young-Chan et al.IEEE International conference on industria technologyl. 2004, isbn 0-7803-8662-0, 3Vol, Vol2, 793-800Conference Paper

Game-theoretic approach to the optimization of FDDI computer networksHÄSSLER, S; JAHN, J.Journal of optimization theory and applications. 2000, Vol 106, Num 3, pp 463-474, issn 0022-3239Article

Detecting duplicate biological entities using Markov random field-based edit distanceMIN SONG; RUDNIY, Alex.Knowledge and information systems (Print). 2010, Vol 25, Num 2, pp 371-387, issn 0219-1377, 17 p.Article

Experimental Case Study of a BACnet-Based Lighting Control SystemPARK, Tae-Jin; HONG, Seung-Ho.IEEE transactions on automation science and engineering. 2009, Vol 6, Num 2, pp 322-333, issn 1545-5955, 12 p.Article

Improving the Profibus medium access control protocolBEGHDAD, Rachid.Journal européen des systèmes automatisés. 2006, Vol 40, Num 8, pp 867-883, issn 1269-6935, 17 p.Article

Noncooperative channel contention in ad hoc wireless LANs with anonymous stationsKONORSKI, Jerzy.Lecture notes in computer science. 2005, pp 262-274, issn 0302-9743, isbn 3-540-30959-4, 1Vol, 13 p.Conference Paper

A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed SystemsKANRAR, Sukhendu; CHATTOPADHYAY, Samiran; CHAKI, Nabendu et al.Journal of network and systems management. 2013, Vol 21, Num 1, pp 1-24, issn 1064-7570, 24 p.Article

Dependency on prioritized data in the delay analysis of foundation fieldbusYONG HEE LEE; SEUNG HO HONG.Control engineering practice. 2010, Vol 18, Num 8, pp 845-851, issn 0967-0661, 7 p.Article

Building effective mutual exclusion services for gridsSOPENA, Julien; ARANTES, Luciana; LEGOND-AUBRY, Fabrice et al.Journal of supercomputing. 2009, Vol 49, Num 1, pp 84-107, issn 0920-8542, 24 p.Article

A four-way-handshake protocol for energy forwarding networks in the smart gridEROL-KANTARCI, Melike; SARKER, Jahangir H; MOUFTAH, Hussein T et al.Ad hoc networks. 2014, Vol 22, pp 83-92, issn 1570-8705, 10 p.Article

The WICKPro protocol with the Packet Delivery Ratio metric : Wireless NeworkingAISA, Jesus; VILLARROEL, Jose Luis.Computer communications. 2011, Vol 34, Num 17, pp 2047-2056, issn 0140-3664, 10 p.Article

A worm propagation model based on people's email acquaintance profilesKOMNINOS, T; STAMATIOU, Y. C; VAVITSAS, G et al.Lecture notes in computer science. 2006, pp 343-352, issn 0302-9743, isbn 3-540-68138-8, 1Vol, 10 p.Conference Paper

Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networksPENG, Li-Mei; KIM, Young-Chul; YOO, Kyoung-Min et al.Lecture notes in computer science. 2005, pp 21-26, issn 0302-9743, isbn 3-540-30999-3, 1Vol, 6 p.Conference Paper

A semantics for Web services authenticationBHARGAVAN, Karthikeyan; FOURNET, Cédric; GORDON, Andrew D et al.ACM SIGPLAN notices. 2004, Vol 39, Num 1, pp 198-209, issn 1523-2867, 12 p.Conference Paper

An algorithm for k-mutual exclusion in decentralized systemsCHAUDHURI, Pranay; EDWARD, Thomas.Computer communications. 2008, Vol 31, Num 14, pp 3223-3235, issn 0140-3664, 13 p.Article

RT-EP : A fixed-priority real time communication protocol over standard ethernetMARTINEZ, José Maria; GONZALEZ HARBOUR, Michael.Lecture notes in computer science. 2005, pp 180-195, issn 0302-9743, isbn 3-540-26286-5, 16 p.Conference Paper

Queueing analysis of DCHF and token-passing MAC protocols with varying turnaround timeBALAKRISHNAN, Manikanden; JOHNSON, Eric E.IEEE International Performance, Computing, and Communications Conference. 2004, pp 315-316, isbn 0-7803-8396-6, 1Vol, 2 p.Conference Paper

A Token-Based Approach to Sharing Beliefs in a Large Multiagent TeamVELAGAPUDI, Prasanna; PROKOPYEV, Oleg; SCERRI, Paul et al.Lecture notes in control and information sciences. 2009, Vol 381, pp 417-429, issn 0170-8643, isbn 978-3-540-88062-2 3-540-88062-3, 1Vol, 13 p.Conference Paper

The Self-Stabilizing Edge-Token and Its ApplicationsHUNG, Su-Shen; HUANG, Shing-Tsaan.Journal of information science and engineering. 2008, Vol 24, Num 6, pp 1859-1872, issn 1016-2364, 14 p.Article

WiCTP : A token-based access control protocol for wireless networksGOFF, Raal; DATTA, Amitava.Lecture notes in computer science. 2005, pp 87-96, issn 0302-9743, isbn 3-540-25860-4, 4Vol, 10 p.Conference Paper

Design of an efficient communication infrastructure for highly contended locks in many-core CMPsABELLAN, José L; FERNANDEZ, Juan; ACACIO, Manuel E et al.Journal of parallel and distributed computing (Print). 2013, Vol 73, Num 7, pp 972-985, issn 0743-7315, 14 p.Conference Paper

A media access and feedback protocol for reliable multicast over wireless channelBHATIA, Ashutosh; HANSDAH, R. C.Wireless networks. 2014, Vol 20, Num 8, pp 2371-2383, issn 1022-0038, 13 p.Article

  • Page / 2