Sciweavers

2290 search results - page 89 / 458
» Extensible Protected Types
Sort
View
GLOBECOM
2007
IEEE
15 years 8 months ago
A Distributed Bandwidth Sharing Heuristic for Backup LSP Computation
— With the advent of MPLS, the restoration times of communications is decreased down to 50 ms by the use of preconfigured backup LSPs. To ensure there are enough resources after ...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
PET
2007
Springer
15 years 8 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
FCT
2005
Springer
15 years 8 months ago
Leftist Grammars and the Chomsky Hierarchy
Leftist grammars can be characterized in terms of rules of the form a → ba and cd → d, without distinction between terminals and nonterminals. They were introduced by Motwani e...
Tomasz Jurdzinski, Krzysztof Lorys
COMCOM
2006
99views more  COMCOM 2006»
15 years 2 months ago
Applying 4-regular grid structures in large-scale access networks
4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together wit...
Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip K...
JNW
2008
103views more  JNW 2008»
15 years 2 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette