kw.\*:("Protocole jeton")
Results 1 to 21 of 21
Selection :
Embedding distance-bounding protocols within intuitive interactionsBUSSARD, Laurent; ROUDIER, Yves.Lecture notes in computer science. 2004, pp 143-156, issn 0302-9743, isbn 3-540-20887-9, 14 p.Conference Paper
Modified raymond's algorithm for priority (MRA-P) based mutual exclusion in distributed systemsKANRAR, S; CHAKI, N.Lecture notes in computer science. 2006, pp 325-332, issn 0302-9743, isbn 3-540-68379-8, 1Vol, 8 p.Conference Paper
A hybrid MAC protocol based on implicit token and CSMA/CA for wireless networkHAN, Tae-Man; KIM, Dong-Won; KIM, Sang-Ha et al.Lecture notes in computer science. 2007, pp 643-650, issn 0302-9743, isbn 978-3-540-69421-2, 8 p.Conference Paper
Game-theoretic approach to the optimization of FDDI computer networksHÄSSLER, S; JAHN, J.Journal of optimization theory and applications. 2000, Vol 106, Num 3, pp 463-474, issn 0022-3239Article
Detecting duplicate biological entities using Markov random field-based edit distanceMIN SONG; RUDNIY, Alex.Knowledge and information systems (Print). 2010, Vol 25, Num 2, pp 371-387, issn 0219-1377, 17 p.Article
Experimental Case Study of a BACnet-Based Lighting Control SystemPARK, Tae-Jin; HONG, Seung-Ho.IEEE transactions on automation science and engineering. 2009, Vol 6, Num 2, pp 322-333, issn 1545-5955, 12 p.Article
Improving the Profibus medium access control protocolBEGHDAD, Rachid.Journal européen des systèmes automatisés. 2006, Vol 40, Num 8, pp 867-883, issn 1269-6935, 17 p.Article
Noncooperative channel contention in ad hoc wireless LANs with anonymous stationsKONORSKI, Jerzy.Lecture notes in computer science. 2005, pp 262-274, issn 0302-9743, isbn 3-540-30959-4, 1Vol, 13 p.Conference Paper
An algorithm for k-mutual exclusion in decentralized systemsCHAUDHURI, Pranay; EDWARD, Thomas.Computer communications. 2008, Vol 31, Num 14, pp 3223-3235, issn 0140-3664, 13 p.Article
RT-EP : A fixed-priority real time communication protocol over standard ethernetMARTINEZ, José Maria; GONZALEZ HARBOUR, Michael.Lecture notes in computer science. 2005, pp 180-195, issn 0302-9743, isbn 3-540-26286-5, 16 p.Conference Paper
Queueing analysis of DCHF and token-passing MAC protocols with varying turnaround timeBALAKRISHNAN, Manikanden; JOHNSON, Eric E.IEEE International Performance, Computing, and Communications Conference. 2004, pp 315-316, isbn 0-7803-8396-6, 1Vol, 2 p.Conference Paper
A Token-Based Approach to Sharing Beliefs in a Large Multiagent TeamVELAGAPUDI, Prasanna; PROKOPYEV, Oleg; SCERRI, Paul et al.Lecture notes in control and information sciences. 2009, Vol 381, pp 417-429, issn 0170-8643, isbn 978-3-540-88062-2 3-540-88062-3, 1Vol, 13 p.Conference Paper
The Self-Stabilizing Edge-Token and Its ApplicationsHUNG, Su-Shen; HUANG, Shing-Tsaan.Journal of information science and engineering. 2008, Vol 24, Num 6, pp 1859-1872, issn 1016-2364, 14 p.Article
WiCTP : A token-based access control protocol for wireless networksGOFF, Raal; DATTA, Amitava.Lecture notes in computer science. 2005, pp 87-96, issn 0302-9743, isbn 3-540-25860-4, 4Vol, 10 p.Conference Paper
Design of an efficient communication infrastructure for highly contended locks in many-core CMPsABELLAN, José L; FERNANDEZ, Juan; ACACIO, Manuel E et al.Journal of parallel and distributed computing (Print). 2013, Vol 73, Num 7, pp 972-985, issn 0743-7315, 14 p.Conference Paper
A media access and feedback protocol for reliable multicast over wireless channelBHATIA, Ashutosh; HANSDAH, R. C.Wireless networks. 2014, Vol 20, Num 8, pp 2371-2383, issn 1022-0038, 13 p.Article
Performance Evaluation of Wireless Controller Area Network (WCAN) Using Token Frame SchemeWEI LUN NG; CHEE KYUN NG; BORHANUDDIN MOHD ALI et al.Wireless personal communications. 2013, Vol 72, Num 4, pp 1847-1873, issn 0929-6212, 27 p.Article
DynaMoNET : Dynamic Multi-homed IPv6 Mobile Networks with Multiple Mobile RoutersKIM, Won-Tae.Lecture notes in computer science. 2006, pp 398-413, issn 0302-9743, isbn 3-540-46287-2, 1Vol, 16 p.Conference Paper
A Novel Word Spotting Method Based on Recurrent Neural NetworksFRINKEN, Volkmar; FISCHER, Andreas; MANMATHA, R et al.IEEE transactions on pattern analysis and machine intelligence. 2012, Vol 34, Num 2, pp 211-224, issn 0162-8828, 14 p.Article
A priority-based distributed group mutual exclusion algorithm when group access is non-uniformMITTAL, Neeraj; MOHAN, Prajwal K.Journal of parallel and distributed computing (Print). 2007, Vol 67, Num 7, pp 797-815, issn 0743-7315, 19 p.Article
An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANsKONORSKI, Jerzy.Lecture notes in computer science. 2006, pp 582-593, issn 0302-9743, isbn 978-3-540-68139-7, 1Vol, 12 p.Conference Paper