Sciweavers

3483 search results - page 23 / 697
» Forward
Sort
View
GLOBECOM
2008
IEEE
15 years 3 months ago
Multiple Antenna Assisted Hard Versus Soft Decoding-and-Forwarding for Network Coding Aided Relaying Systems
— In this paper, we propose two types of new decoding algorithms for a network coding aided relaying (NCR) system, which adopts multiple antennas at both the transmitter and rece...
Kyungchun Lee, Lajos Hanzo
PPOPP
2006
ACM
15 years 3 months ago
High-performance IPv6 forwarding algorithm for multi-core and multithreaded network processor
IP forwarding is one of the main bottlenecks in Internet backbone routers, as it requires performing the longest-prefix match at 10Gbps speed or higher. IPv6 forwarding further ex...
Xianghui Hu, Xinan Tang, Bei Hua
77
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Path Diversity with Forward Error Correction (PDF) System for Delay Sensitive Applications over the Internet
— Packet loss and end-to-end delay limit delay sensitive applications over the best effort packet switched networks such as the Internet. In our previous work, we have shown that...
Thinh Nguyen
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
15 years 1 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
76
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 1 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...