-
1
Exploring computational thinking, executive functions, visuospatial skills and experiences with toys in early childhood: Protocol for a controlled trial
Published 2025-06-01Subjects: “…Protocol…”
Get full text
Article -
2
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: “…security protocol…”
Get full text
Article -
3
Study on frame synchronization performance of data link protocol using in broadband IP networks
Published 2002-01-01Subjects: Get full text
Article -
4
Design of tree topology based Byzantine fault tolerance system
Published 2017-11-01Subjects: Get full text
Article -
5
Network layer protocol architecture for many-nets internetworking
Published 2019-10-01Subjects: “…network protocol…”
Get full text
Article -
6
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: Get full text
Article -
7
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
8
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: Get full text
Article -
9
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01Subjects: Get full text
Article -
10
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
11
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01Subjects: Get full text
Article -
12
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
13
Development and outlook of deep space communication network protocol
Published 2016-07-01Subjects: Get full text
Article -
14
Collision and information error of topologies in clustering protocol
Published 2011-01-01Subjects: “…clustering protocol…”
Get full text
Article -
15
Efficient and configurable data transport protocol for grid computing
Published 2007-01-01Subjects: Get full text
Article -
16
Protocol format extraction at semantic level
Published 2013-10-01Subjects: “…protocol reverse engineering…”
Get full text
Article -
17
Design and hardware implementation of a CAN communication protocol
Published 2008-01-01Subjects: Get full text
Article -
18
Protocol publication rate and comparison between article, registry and protocol in RCTs
Published 2025-02-01Subjects: Get full text
Article -
19
Application of Protocol Buffer in Enterprise Cloud Contacts Abstract This paper introduces the method to use Protocol Buffer to update data in enterprise cloud contacts, and compar...
Published 2012-09-01Subjects: “…Protocol Buffer…”
Get full text
Article -
20
Building mechanism of trusted virtual domain via the VPE
Published 2013-12-01Subjects: Get full text
Article