Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Protocole jeton")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 21 of 21

  • Page / 1
Export

Selection :

  • and

Embedding distance-bounding protocols within intuitive interactionsBUSSARD, Laurent; ROUDIER, Yves.Lecture notes in computer science. 2004, pp 143-156, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper

Modified raymond's algorithm for priority (MRA-P) based mutual exclusion in distributed systemsKANRAR, S; CHAKI, N.Lecture notes in computer science. 2006, pp 325-332, issn 0302-9743, isbn 3-540-68379-8, 1Vol, 8 p.Conference Paper

A hybrid MAC protocol based on implicit token and CSMA/CA for wireless networkHAN, Tae-Man; KIM, Dong-Won; KIM, Sang-Ha et al.Lecture notes in computer science. 2007, pp 643-650, issn 0302-9743, isbn 978-3-540-69421-2, 8 p.Conference Paper

Game-theoretic approach to the optimization of FDDI computer networksHÄSSLER, S; JAHN, J.Journal of optimization theory and applications. 2000, Vol 106, Num 3, pp 463-474, issn 0022-3239Article

Detecting duplicate biological entities using Markov random field-based edit distanceMIN SONG; RUDNIY, Alex.Knowledge and information systems (Print). 2010, Vol 25, Num 2, pp 371-387, issn 0219-1377, 17 p.Article

Experimental Case Study of a BACnet-Based Lighting Control SystemPARK, Tae-Jin; HONG, Seung-Ho.IEEE transactions on automation science and engineering. 2009, Vol 6, Num 2, pp 322-333, issn 1545-5955, 12 p.Article

Improving the Profibus medium access control protocolBEGHDAD, Rachid.Journal européen des systèmes automatisés. 2006, Vol 40, Num 8, pp 867-883, issn 1269-6935, 17 p.Article

Noncooperative channel contention in ad hoc wireless LANs with anonymous stationsKONORSKI, Jerzy.Lecture notes in computer science. 2005, pp 262-274, issn 0302-9743, isbn 3-540-30959-4, 1Vol, 13 p.Conference Paper

An algorithm for k-mutual exclusion in decentralized systemsCHAUDHURI, Pranay; EDWARD, Thomas.Computer communications. 2008, Vol 31, Num 14, pp 3223-3235, issn 0140-3664, 13 p.Article

RT-EP : A fixed-priority real time communication protocol over standard ethernetMARTINEZ, José Maria; GONZALEZ HARBOUR, Michael.Lecture notes in computer science. 2005, pp 180-195, issn 0302-9743, isbn 3-540-26286-5, 16 p.Conference Paper

Queueing analysis of DCHF and token-passing MAC protocols with varying turnaround timeBALAKRISHNAN, Manikanden; JOHNSON, Eric E.IEEE International Performance, Computing, and Communications Conference. 2004, pp 315-316, isbn 0-7803-8396-6, 1Vol, 2 p.Conference Paper

A Token-Based Approach to Sharing Beliefs in a Large Multiagent TeamVELAGAPUDI, Prasanna; PROKOPYEV, Oleg; SCERRI, Paul et al.Lecture notes in control and information sciences. 2009, Vol 381, pp 417-429, issn 0170-8643, isbn 978-3-540-88062-2 3-540-88062-3, 1Vol, 13 p.Conference Paper

The Self-Stabilizing Edge-Token and Its ApplicationsHUNG, Su-Shen; HUANG, Shing-Tsaan.Journal of information science and engineering. 2008, Vol 24, Num 6, pp 1859-1872, issn 1016-2364, 14 p.Article

WiCTP : A token-based access control protocol for wireless networksGOFF, Raal; DATTA, Amitava.Lecture notes in computer science. 2005, pp 87-96, issn 0302-9743, isbn 3-540-25860-4, 4Vol, 10 p.Conference Paper

Design of an efficient communication infrastructure for highly contended locks in many-core CMPsABELLAN, José L; FERNANDEZ, Juan; ACACIO, Manuel E et al.Journal of parallel and distributed computing (Print). 2013, Vol 73, Num 7, pp 972-985, issn 0743-7315, 14 p.Conference Paper

A media access and feedback protocol for reliable multicast over wireless channelBHATIA, Ashutosh; HANSDAH, R. C.Wireless networks. 2014, Vol 20, Num 8, pp 2371-2383, issn 1022-0038, 13 p.Article

Performance Evaluation of Wireless Controller Area Network (WCAN) Using Token Frame SchemeWEI LUN NG; CHEE KYUN NG; BORHANUDDIN MOHD ALI et al.Wireless personal communications. 2013, Vol 72, Num 4, pp 1847-1873, issn 0929-6212, 27 p.Article

DynaMoNET : Dynamic Multi-homed IPv6 Mobile Networks with Multiple Mobile RoutersKIM, Won-Tae.Lecture notes in computer science. 2006, pp 398-413, issn 0302-9743, isbn 3-540-46287-2, 1Vol, 16 p.Conference Paper

A Novel Word Spotting Method Based on Recurrent Neural NetworksFRINKEN, Volkmar; FISCHER, Andreas; MANMATHA, R et al.IEEE transactions on pattern analysis and machine intelligence. 2012, Vol 34, Num 2, pp 211-224, issn 0162-8828, 14 p.Article

A priority-based distributed group mutual exclusion algorithm when group access is non-uniformMITTAL, Neeraj; MOHAN, Prajwal K.Journal of parallel and distributed computing (Print). 2007, Vol 67, Num 7, pp 797-815, issn 0743-7315, 19 p.Article

An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANsKONORSKI, Jerzy.Lecture notes in computer science. 2006, pp 582-593, issn 0302-9743, isbn 978-3-540-68139-7, 1Vol, 12 p.Conference Paper

  • Page / 1