Pascal and Francis Bibliographic Databases


Search results

Your search



A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV


A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV


A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 48584

  • Page / 1944

Selection :

  • and

Architecture TCP/IPPUJOLLE, Guy.Techniques de l'ingénieur. Informatique. 1997, Vol HB2, Num H2288, pp H2288.1-H2288.13, issn 0245-9612Article

An hybrid explicit multicast/recursive unicast approach for multicast routingBOUDANI, Ali; COUSIN, Bernard.Computer communications. 2005, Vol 28, Num 16, pp 1814-1834, issn 0140-3664, 21 p.Article

Protocol analysis for concrete environmentsGOLLMANN, Dieter.Lecture notes in computer science. 2005, pp 365-372, issn 0302-9743, isbn 3-540-29002-8, 1Vol, 8 p.Conference Paper

Multiprotocol label switching and IP, Part I. MPLS VPNS over IP TunnelsDAUGHERTY, Brian; METZ, Chris.IEEE internet computing. 2005, Vol 9, Num 3, pp 68-72, issn 1089-7801, 5 p.Article

Experimental simulated routing environment for routing protocol testLU WEI; ZHOUJILIU; QIN WENHAO et al.International Conference on Signal Processing. 2004, pp 1878-1881, isbn 0-7803-8406-7, 4 p.Conference Paper

Authentication in distributed systems: a bibliographyLIEBL, A.Operating systems review. 1993, Vol 27, Num 4, pp 31-41, issn 0163-5980Article

Exclusion-freeness in multi-party exchange protocolsGONZALEZ-DELEITO, Nicolas; MARKOWITCH, Olivier.Lecture notes in computer science. 2002, pp 200-209, issn 0302-9743, isbn 3-540-44270-7, 10 p.Conference Paper

Specification and analysis of a composition of protocolsLUNDY, G. M.Information sciences. 1993, Vol 70, Num 3, pp 221-239, issn 0020-0255Article

Crash resilient communication in dynamic networksDOLEV, S; WELCH, J. L.IEEE transactions on computers. 1997, Vol 46, Num 1, pp 14-26, issn 0018-9340Article

Firewall using red hat linux 8.0GANGULY, Pallab.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 63900O.1-63900O.10, issn 0277-786X, isbn 0-8194-6488-0, 1VolConference Paper

An IPv4-to-IPv6 dual stack transition mechanism supporting transparent connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 networkPARK, Eun-Young; LEE, Jae-Hwoon; CHOE, Byrung-Gu et al.IEEE International Conference on Communications. 2004, isbn 0-7803-8533-0, vol2, 1024-1027Conference Paper

Performance evaluation of multireject, selective reject, and other protocol enhancementsBRADY, P. T.IEEE transactions on communications. 1987, Vol 35, Num 6, pp 659-666, issn 0090-6778Conference Paper

A new methodology for TCP evaluation in a multiuser web environmentGONZALEZ-PARADA, E; CANO-GARCIA, J. M; DIAZ-ESTRELLA, A et al.Computer communications. 2005, Vol 28, Num 4, pp 449-465, issn 0140-3664, 17 p.Article

Modelling and constraint hardness characterisation of the unique-path OSPF weight setting problemCHANGYONG ZHANG; RODOSEK, Robert.Lecture notes in computer science. 2005, pp 804-811, issn 0302-9743, isbn 3-540-26032-3, 3Vol, 8 p.Conference Paper

Multiparty computation from threshold homomorphic encryptionCRAMER, Ronald; DAMGARD, Ivan; NIELSEN, Jesper B et al.Lecture notes in computer science. 2001, pp 280-300, issn 0302-9743, isbn 3-540-42070-3Conference Paper

Conformance testing with labelled transition systems : Implementation relations and test generationTRETMANS, J.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 49-79, issn 0169-7552Article

The implementation of a protocol using automata = L'implantation d'un protocole utilisant des automatesMULDER, P. G; VON SOLMS, S. H.Information sciences. 1992, Vol 59, Num 1-2, pp 53-89, issn 0020-0255Article

Enforcing convergence in inter-domain routingCOBB, Jorge A; MUSUNURI, Ravi.IEEE Global Telecommunications Conference. 2004, pp 1353-1358, isbn 0-7803-8794-5, 6 p.Conference Paper

Analysis and design of secure and reliable transmission protocol in diameterSANG KEUN YOO; HYUN GON KIM.Lecture notes in computer science. 2003, pp 231-238, issn 0302-9743, isbn 3-540-00732-6, 8 p.Conference Paper

TTCN : Towards a formal semantics and validation of test suitesKRISTOFFERSEN, F; WALTER, T.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 15-47, issn 0169-7552Article

Throughput of a satellite channel communicationBECHTOLD, M; PUJOLLE, G; SPANIOL, O et al.Acta informatica. 1985, Vol 22, Num 1, pp 1-14, issn 0001-5903Article


Multi-party computation from any linear secret sharing scheme unconditionally secure against adaptive adversary: The zero-error caseNIKOV, Ventzislav; NIKOVA, Svetla; PRENEEL, Bart et al.Lecture notes in computer science. 2003, pp 1-15, issn 0302-9743, isbn 3-540-20208-0, 15 p.Conference Paper

Throughput analysis of a timer controlled token passing protocol under heavy loadPANG, J. W. M; TOBAGI, F. A.IEEE transactions on communications. 1989, Vol 37, Num 7, pp 694-702, issn 0090-6778, 9 p.Article

L'émulation joue aussi la carte TCP/IP = Emulation plays the card TCP/IPSIMOTTEL, F.01 informatique (Paris. 1986). 1995, Vol 1371, issn 0298-2285, p. 22Article

  • Page / 1944