Sciweavers

3483 search results - page 138 / 697
» Forward
Sort
View
117
Voted
IMC
2005
ACM
15 years 9 months ago
Inferring and Debugging Path MTU Discovery Failures
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet...
Matthew J. Luckie, Kenjiro Cho, Bill Owens
122
Voted
CAV
2005
Springer
104views Hardware» more  CAV 2005»
15 years 9 months ago
Expand, Enlarge and Check... Made Efficient
Abstract. The coverability problem is decidable for the class of wellstructured transition systems. Until recently, the only known algorithm to solve this problem was based on symb...
Gilles Geeraerts, Jean-François Raskin, Lau...
113
Voted
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 9 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
139
Voted
WPES
2004
ACM
15 years 9 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
126
Voted
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 9 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee