Sciweavers

3483 search results - page 151 / 697
» Forward
Sort
View
EUROPKI
2004
Springer
15 years 9 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
LPAR
2004
Springer
15 years 9 months ago
The Inverse Method for the Logic of Bunched Implications
Abstract. The inverse method, due to Maslov, is a forward theorem proving method for cut-free sequent calculi that relies on the subformula property. The Logic of Bunched Implicati...
Kevin Donnelly, Tyler Gibson, Neel Krishnaswami, S...
QOFIS
2004
Springer
15 years 9 months ago
Evaluating the Utility of Media-Dependent FEC in VoIP Flows
In this paper, we present an analysis of the impact of using media–dependent Forward Error Correction (FEC) in VoIP flows over the Internet. This error correction mechanism cons...
Gerardo Rubino, Martín Varela
QOFIS
2004
Springer
15 years 9 months ago
Policy-Aware Connectionless Routing
The current Internet implements hop-by-hop packet forwarding based entirely on globally-unique identifiers specified in packet headers, and routing tables that identify destinati...
Bradley R. Smith, J. J. Garcia-Luna-Aceves
WWIC
2004
Springer
143views Communications» more  WWIC 2004»
15 years 9 months ago
CGGC: Cached Greedy Geocast
Abstract. With cached greedy geocast, we propose an enhanced forwarding scheme for geocast especially in highly mobile ad hoc networks. We will show, that a cache for presently unf...
Christian Maihöfer, Reinhold Eberhardt, Elmar...