Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protocole")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 32527

  • Page / 1302
Export

Selection :

  • and

Architecture TCP/IPPUJOLLE, Guy.Techniques de l'ingénieur. Informatique. 1997, Vol HB2, Num H2288, pp H2288.1-H2288.13, issn 0245-9612Article

Protocol analysis for concrete environmentsGOLLMANN, Dieter.Lecture notes in computer science. 2005, pp 365-372, issn 0302-9743, isbn 3-540-29002-8, 1Vol, 8 p.Conference Paper

Exclusion-freeness in multi-party exchange protocolsGONZALEZ-DELEITO, Nicolas; MARKOWITCH, Olivier.Lecture notes in computer science. 2002, pp 200-209, issn 0302-9743, isbn 3-540-44270-7, 10 p.Conference Paper

Specification and analysis of a composition of protocolsLUNDY, G. M.Information sciences. 1993, Vol 70, Num 3, pp 221-239, issn 0020-0255Article

Crash resilient communication in dynamic networksDOLEV, S; WELCH, J. L.IEEE transactions on computers. 1997, Vol 46, Num 1, pp 14-26, issn 0018-9340Article

An IPv4-to-IPv6 dual stack transition mechanism supporting transparent connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 networkPARK, Eun-Young; LEE, Jae-Hwoon; CHOE, Byrung-Gu et al.IEEE International Conference on Communications. 2004, isbn 0-7803-8533-0, vol2, 1024-1027Conference Paper

Enforcing convergence in inter-domain routingCOBB, Jorge A; MUSUNURI, Ravi.IEEE Global Telecommunications Conference. 2004, pp 1353-1358, isbn 0-7803-8794-5, 6 p.Conference Paper

Analysis and design of secure and reliable transmission protocol in diameterSANG KEUN YOO; HYUN GON KIM.Lecture notes in computer science. 2003, pp 231-238, issn 0302-9743, isbn 3-540-00732-6, 8 p.Conference Paper

TTCN : Towards a formal semantics and validation of test suitesKRISTOFFERSEN, F; WALTER, T.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 15-47, issn 0169-7552Article

Throughput of a satellite channel communicationBECHTOLD, M; PUJOLLE, G; SPANIOL, O et al.Acta informatica. 1985, Vol 22, Num 1, pp 1-14, issn 0001-5903Article

THE TREATMENT OF HISTIOCYTIC LYMPHOMASWEET DL; GOLOMB HM.1980; SEMIN. ONCOL.; ISSN 0093-7754; USA; DA. 1980; VOL. 7; NO 3; PP. 302-309; BIBL. 22 REF.Article

Multi-party computation from any linear secret sharing scheme unconditionally secure against adaptive adversary: The zero-error caseNIKOV, Ventzislav; NIKOVA, Svetla; PRENEEL, Bart et al.Lecture notes in computer science. 2003, pp 1-15, issn 0302-9743, isbn 3-540-20208-0, 15 p.Conference Paper

Throughput analysis of a timer controlled token passing protocol under heavy loadPANG, J. W. M; TOBAGI, F. A.IEEE transactions on communications. 1989, Vol 37, Num 7, pp 694-702, issn 0090-6778, 9 p.Article

Rekindling Network Protocol Innovation with User-Level StacksHONDA, Michio; HUICI, Felipe; RAICIU, Costin et al.Computer communication review. 2014, Vol 44, Num 2, pp 52-58, issn 0146-4833, 7 p.Article

A logic of authenticationBURROWS, M; ABADI, M; NEEDHAM, R. M et al.Proceedings of the royal society of London, series A : mathematical and physical sciences. 1989, Vol 426, Num 1871, pp 233-271, issn 0080-4630, 39 p.Article

From secrecy to authenticity in security protocolsBLANCHET, Bruno.Lecture notes in computer science. 2002, pp 342-359, issn 0302-9743, isbn 3-540-44235-9, 18 p.Conference Paper

Stepwise optimizations of UDP/IP on a gigabit networkJIN, Hyun-Wook; YOO, Chuck; PARK, Sung-Kyun et al.Lecture notes in computer science. 2002, pp 745-748, issn 0302-9743, isbn 3-540-44049-6, 4 p.Conference Paper

Stability of a slotted ALOHA system with capture effectONOZATO, Y; JIN LIU; NOGUCHI, S et al.IEEE transactions on vehicular technology. 1989, Vol 38, Num 1, pp 31-36, issn 0018-9545, 6 p.Article

Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networksJIN, Hyun-Wook; BALAJI, Pavan; YOO, Chuck et al.Journal of parallel and distributed computing (Print). 2005, Vol 65, Num 11, pp 1348-1365, issn 0743-7315, 18 p.Article

Assessment of objective voice quality over best-effort networksTURUNEN, Jari; LOULA, Pekka; LIPPING, Tarmo et al.Computer communications. 2005, Vol 28, Num 5, pp 582-588, issn 0140-3664, 7 p.Article

On unconditionally secure distributed oblivious transferNIKOV, Ventzislav; NIKOVA, Svetla; PRENEEL, Bart et al.Lecture notes in computer science. 2002, pp 395-408, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper

Multiprotocol transport networking : eliminating application dependencies on communications protocolsPOZEFSKY, D; TURNER, R; DOERINGER, W. A et al.IBM systems journal. 1995, Vol 34, Num 3, pp 472-500, issn 0018-8670Article

GridFTP and parallel TCP support in NaradaBrokeringSANG BOEM LIM; FOX, Geoffrey; KAPLAN, Ali et al.Lecture notes in computer science. 2005, pp 93-102, issn 0302-9743, isbn 3-540-29235-7, 1Vol, 10 p.Conference Paper

Improving Scalability with the Use of the Overlay Multicast Protocol (OMP)AL-MISBAHI, Hind O; AL-AAMA, Arwa Y.International journal of Internet protocol technology (Print). 2009, Vol 4, Num 3, pp 182-192, issn 1743-8209, 11 p.Article

Web-basierte Telematik = Web-based telematicsWALTER, K.-D.VDI-Berichte. 2003, pp 211-218, issn 0083-5560, isbn 3-18-091785-7, 8 p.Conference Paper

  • Page / 1302