Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("PROTOCOLE ACCES")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2414

  • Page / 97
Export

Selection :

  • and

PROTOCOLS OF ACCESSING OVERLAPPING SETS OF RESOURCESWINKOWSKI J.1981; INF. PROCESS. LETT.; ISSN 0020-0190; NLD; DA. 1981; VOL. 12; NO 5; PP. 239-243; BIBL. 5 REF.Article

DEFINIZIONE DI UN PROTOCOLLO PER L'ACCESSO DI TERMINALI TELEX ALLA RETE DATI A COMMUTAZIONE DI PACCHETTO = DEFINITION D'UN PROTOCOLE POUR L'ACCES D'UN TERMINAL TELEX A UN RESEAU DE DONNEES A COMMUTATION PAR PAQUETSBOREGGI C; BURGASSI M; CATALDI F et al.1981; CSELT RAPP. TEC.; ISSN 0390-1815; ITA; DA. 1981; VOL. 9; NO 2; PP. 121-128; ABS. ENGArticle

CUSTOMER ACCESS PROTOCOLS FOR INTEGRATED SERVICES DIGITAL NETWORKSACCARINO N; DECINA M; ROSSI C et al.1979; COMPUTER COMMUNIC.; GBR; DA. 1979; VOL. 2; NO 6; PP. 269-273; BIBL. 8 REF.Article

LOCKING PROTOCOL FOR CONCURRENT ACCESS IN B-TREESKIKUNO T; YOSHIDA N; TANAKA K et al.1980; TRANS. INST. ELECTRON. COMMUN. ENG. JPN., E; JPN; DA. 1980; VOL. 63; NO 1; PP. 9-15; BIBL. 7 REF.Article

RESEAUX INFORMATIQUES ET NORMALISATION.ZIMMERMANN H.sdIN: RESEAUX ORDINATEURS INF. DECENT. SEMIN.; TUNIS; 1978; S.L.; DA. S.D.; PP. 106-114; BIBL. 1 P. 1/2Conference Paper

FEASIBILITY STUDY OF A MODULAR MULTIMICROPROCESSOR BASED COMPUTER ARCHITECTURE WITH TIME-SLICED SYNCHRONOUS BUSESDAVIES OJ; KOVALESKI AB.1981; IERE CONF. PROC.; ISSN 0538-0006; GBR; DA. 1981; NO 48; PP. 19-27; BIBL. 24 REF.Conference Paper

DISCUSSION AND CORRESPONDENCE. THE REGIONAL COMPUTING ORGANISATION NETWORK.BARRY PT.1978; COMPUTER J.; G.B.; DA. 1978; VOL. 21; NO 6; PP. 184-187; BIBL. 2 REF.Article

ACCESS TO PACKET SWITCHING NETWORKS.ERSKINE SB.1976; IN: COMPUT. NEXT 5 YEARS. COMPAR. 76. IEEE COMPUT. SOC. INT. CONF. 12; SAN FRANCISCO, CALIF.; 1976; LONG BEACH, CALIF.; INST. ELECTR. ELECTRON. ENG.; DA. 1976; PP. 66-68Conference Paper

DISTRIBUTED FILE ACCESS IN DECNET.PASSAFIUME JJ; WECKER S.sdIN: BERKELEY WORKSHOP DISTRIB. DATA MANAGE. COMPUT. NETWORKS. 2. PROC.; BERKELEY; 1977; SPRINGFIELD; U.S. DEP. COMMER.; DA. S.D.; PP. 114-129; BIBL. 9 REF.Conference Paper

HF data link protocol enhancements based on stanag 4538 and stanag 4539, providing greater than 10KBPS throughput over 3KHZ channelsCHAMBERLAIN, M. W; FURMAN, W. N.IEE conference publication. 2003, pp 64-68, issn 0537-9989, isbn 0-85296-755-1, 5 p.Conference Paper

Combating fraud and piracy in conditional access systemsMOOIJ, Wim.Electronic programme guides. Conference. 1999, 9 p.Conference Paper

Delegation and not-so smart cards. Discussion. Authors' replyCHRISTIANSON, B; MALCOLM, J. A; WHEELER, D et al.Lecture notes in computer science. 1999, pp 154-167, issn 0302-9743, isbn 3-540-65663-4Conference Paper

Protocole d'accès pour réseaux à haut -débitMuhlethaler, Paul; Kipnis, Claude.1989, 165 p.Thesis

Throughput analysis of reservation protocols with tree-type reservation channelOIE, Y; MURO, S; HASEGAWA, T et al.Systems and computers in Japan. 1987, Vol 18, Num 3, pp 79-91, issn 0882-1666Article

The optimal retry distribution for lightly loaded slotted Aloha systemsSIMON, B; VOTTA, L. G.IEEE transactions on communications. 1985, Vol 33, Num 7, pp 724-725, issn 0090-6778Article

Delegation of responsibilities. Discussion. Authors' replyCRISPO, B; GLIGOR, V; CHRISTIANSON, B et al.Lecture notes in computer science. 1999, pp 118-130, issn 0302-9743, isbn 3-540-65663-4Conference Paper

How to break fraud-detectable key recoveryPFITZMANN, B; WAIDNER, M.Operating systems review. 1998, Vol 32, Num 1, pp 23-28, issn 0163-5980Conference Paper

Fully-fledged two-way public key authentication and key agreement for low-cost terminalsBELLER, M. J; YACOBI, Y.Electronics Letters. 1993, Vol 29, Num 11, pp 999-1001, issn 0013-5194Article

Accès X25: les atouts du protocole X32 = X25 access : the assets of the X32 protocolRéseaux & télécoms (Paris-la-Défense). 1992, Num 58, pp 69-71, issn 1251-8964Article

Increasing the throughput of the homePNA MAC protocolAMODEI, Aurelio JR; HENRIQUE, Lufs; COSTA, M. K et al.Conference on Local Computer Networks. 2004, pp 294-301, isbn 0-7695-2260-2, 1Vol, 8 p.Conference Paper

Optimistic Trust with realistic eNvestigators. Discussion. Authors' replyYAHALOM, R; LEE, S; GLIGOR, V et al.Lecture notes in computer science. 1999, pp 193-212, issn 0302-9743, isbn 3-540-65663-4Conference Paper

Cheating in split-knowledge RSA parameter generationJOYE, M; PINCH, R.Workshop on coding and cryptography. 1999, pp 157-163, isbn 2-7261-1136-XConference Paper

Authenticated Diffie-Hellman key agreement protocolsBLAKE-WILSON, S; MENEZES, A.Lecture notes in computer science. 1999, pp 339-361, issn 0302-9743, isbn 3-540-65894-7Conference Paper

Distributed database checkpointingBALDONI, R; QUAGLIA, F; RAYNAL, M et al.Lecture notes in computer science. 1999, pp 450-458, issn 0302-9743, isbn 3-540-66443-2Conference Paper

Fixing a problem in the Helsinki protocolMITCHELL, C. J; CHAN YEOB YEUN.Operating systems review. 1998, Vol 32, Num 4, pp 21-24, issn 0163-5980Article

  • Page / 97