Sciweavers

3483 search results - page 114 / 697
» Forward
Sort
View
140
Voted
CSFW
2003
IEEE
15 years 9 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla
111
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Broadcasting in Ad Hoc Networks Based on Self-Pruning
— We propose a general framework for broadcasting in ad hoc networks through self-pruning. The approach is based on selecting a small subset of hosts (also called nodes) to form ...
Jie Wu, Fei Dai
131
Voted
DSD
2002
IEEE
90views Hardware» more  DSD 2002»
15 years 8 months ago
Simplifying Instruction Issue Logic in Superscalar Processors
Modern microprocessors schedule instructions dynamically in order to exploit instruction-level parallelism. It is necessary to increase instruction window size for improving instr...
Toshinori Sato, Itsujiro Arita
ISCC
2002
IEEE
15 years 8 months ago
A new approach to construct multicast trees in MPLS networks
In this paper1 , we present a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to...
Ali Boudani, Bernard Cousin
161
Voted
TSE
1998
128views more  TSE 1998»
15 years 3 months ago
Modeling and Evaluating Design Alternatives for an On-Line Instrumentation System: A Case Study
—This paper demonstrates the use of a model-based evaluation approach for instrumentation systems (ISs). The overall objective of this study is to provide early feedback to tool ...
Abdul Waheed, Diane T. Rover, Jeffrey K. Hollingsw...