Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
протокол
Связанные издания:
A Approach to Overcoming the Inheritance Anomaly
A Bisimulation Method for Cryptographic Protocols
A Blocking-based Approach to Protocol Validation
Abstraction in Real Time Process Algebra
A Calculus for Cryptographic Protocols: The Spi Calculus
A Case Study of Fault Tolerance with Replicated MMS Clients
Ace: Linguistic Mechanisms for Customizable Protocols
A Client-Server Protocol for the Composition of Petri Nets
A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols
A Comparison of Two Lower Bound Methods for Communication Complexity
A Complete Axiomatization of Branching Bisimulation for Probabilistic Systems with an Application in Protocol Verification
A Continuous Media Data Transport Service and Protocol for Real-Time Communication in High Speed Networks
A Critical Analysis of Distributed Database Recovery Protocols
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
Adaptive Recovery for Mobile Environments
A Data Labelling Technique for High-Performance Protocol Processing and Its Consequences
Ad-hoc, Mobile, and Wireless Networks: Proc./10th International Conference, ADHOC-NOW 2011, Paderborn, Germany, July 2011
Ad-hoc, Mobile, and Wireless Networks: Proc./13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 2014
Ad-Hoc, Mobile, and Wireless Networks: Proc./6th International Conference, ADHOC-NOW 2007. Morelia, Mexico, September 2007
A Distributed Protocol for Channel-Based Communication with Choice
A Distributed QoS-Aware Multicast Routing Protocol
A Distributed Queueing Random Access Protocol for a Broadcast Channel
Advances in Cryptology - AUSCRYPT 92: Proc./Workshop on the Theory and Application of Cryptographic Techniques. Gold Coast, Queensland, Australia, December 1992
A Dynamic Network Architecture
A Formal Framework for Authentication
A Formal Method to Prove Ordering Properties of Multicast Systems
A formal proof of a protocol for communications over faulty channels using the Larch Prover
A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol
A Framework for Network Protocol Software
A Framework for the Analysis of Security Protocols
Agent Communication II: Selected and Revised Papers/Intl WS s AC`05 & AC`06. Utrecht, the Netherlands, July`05 & Hakodate, Japan, May`06
Agent Communication: Revised Selected and Invited Papers/International Workshop on Agent Communication, AC 2004. New York, NY, USA, July 2004
Agents and Peer-to-Peer Computing: Revised and Invited Papers/Second International Workhshop, AP2PC 2003. Melbourne, Australia, July 2003
A GSM-MAP Protocol Experiment Using Passive Testing
A High-Performance Host Interface for ITM Networks
A High Performance Totally Ordered Multicast Protocol
A Language-Based Approach to Protocol Implementation
A Lesson on Authentication Protocol Design
Algorithmic Aspects of Wireless Sensor Networks: Revised Selected Papers/Third International Workshop, ALGOSENSORS 2007. Wroclaw, Poland, July 2007
Algorithmic Verification of Invalidation-Based Protocols
A Little Knowledge Goes a Long Way: Knowledge-Based Derivations and Correctness Proofs for a Family of Protocols
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
A Metaobject Protocol for C++
A Metaobject Protocol for Controlling File Cache Management
A Methodology for Designing Communication Protocols
A Multi-chanel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks
An Adaptive Cache Coherence Protocol Optimized for Migratory Sharing
An Adaptive Memory Management Protocol for Time Warp Parallel Simulation
An Adaptive Stream Synchronization Protocol
An Adaptive Update-Based Cache Coherence Protocol for Reduction of Miss Rate and Traffic
1
2
3
4
5
6
7
8
9
…
следующая ›
последняя »