Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
протокол
Связанные издания:
Security Clauses in the Writing and Analysis of Standards
Security Properties: Two Agents Are Sufficient
Self-adaptive Protocols
Separating the Specification and Implementation Phases in Cryptology
Sequential Consistency in Distributed Systems
Serializability Preserving Extensions of Concurrency Control Protocols
Service Assurance with Partial and Intermittent Resources: Proc./First International Workshop, SAPIR 2004. Fortaleza, Brazil, August 2004
Service Specification and Its Protocol Specifications in LOTOS - A Survey for Synthesis and Execution
Sicurity Protocols and Specifications
Signaling and Operating System Support for Native-Mode ATM Applications
Signatures for a Network Protocol Stack: A Systems Application of Standard ML
Simple Representative Instantiations for Multicast Protocols
Simulating Synchronized Clocks and Common Knowledge in Distributed Systems
Smart Card Research and Advances Applications: Revised Selected Papers/12th International Conference, CARDIS 2013, Berlin, Germany, November 2013
Smart Spaces and Next Generation Wired/Wireless Networking: Proc./11th Int. Conf, NEW2AN 2011, and 4th Conf, ruSMART 2011, St.Petersburg, Russia, August 2011
SOAP и вопросы безопасности
Software Cache Coherence for Large Scale Multiprocessors
Software Composition: Revised Selected Papers/4th International Workshop, SC 2005. Edinburgh, UK, April 2005
Software Design, Specification, and Verification: Lessons Learned from the Rether Case Study
Software Overhead in Messaging Layers: Where Does the Time Go?
Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks
Specifying Agent Interaction Protocols with Standard UML
SPIN vs. VIS: A Case Study on the Formal Verification of the ATMR Protocol
Structural Complexity and Execution Efficiency of Distributed Application Protocols
Subtyping for session types in the pi calculus
Synthesis of Protocol Specifications from Service Specifications of Distributed Systems in a Marked Graph Model
Tailored Protocol Development Using ESTEREL
Taming Concurrency in Smalltalk - the Procol Approach
Teaching Protocol Engineering in Honours Year
Teapot: Language Support for Writing Memory Coherence Protocols
Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks
Tempest and Typhoon: User-Level Shared Memory
Tentative and Definite Distributed Computations: An Optimistic Approach to Network Synchronization
Test Generation for Specifications Modeled by Input/Output Automata
Testing Deadlock-Freeness in Real-Time Systems: A Formal Approach
Testing IN Protocol Implementation
Testing of 3G 1xEV-DV Stack - A Case Study
Testing SIP Call Flows Using XML Protocol Templates
Testing Software and Systems: Proc./24th IFIP WG 6.1 International Conference, ICTSS 2012, Aalborg, Denmark, November 2012
Testing Software and Systems: Proc./29th IFIP WG 6.1 International Conference, ICTSS 2017, St.Petersburg, Russia, October 2017
Test Suite Structure and Test Purposes for the Security Features of the X.435 Protocol
The causal ordering abstraction and a simple way to implement it
The Column Protocol: A High Availability and Low Message Cost Solution for Managing Replicated Data
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
The Cost of Communication Protocols and Coordination Languages in Embedded Systems
The Design and Performance of a Pluggable Protocols Framework for Real-Time Distributed Object Computing Middleware
The Dynamic Two Phase Commitment (D2PC) Protocol
The Effect of Expertise on Software Selection
The Generalized Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data
The Importance of Non-Data Touching Processing Overheads in TCP/IP
« первая
‹ предыдущая
…
4
5
6
7
8
9
10
11
12
следующая ›
последняя »