Sciweavers

3483 search results - page 5 / 697
» Forward
Sort
View
FOSSACS
2010
Springer
15 years 4 months ago
Forward Analysis of Depth-Bounded Processes
Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an ade...
Thomas Wies, Damien Zufferey, Thomas A. Henzinger
INFOCOM
2007
IEEE
15 years 3 months ago
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use re...
Qing Cao, Tarek F. Abdelzaher, Tian He, Robin Krav...
DEBS
2007
ACM
15 years 1 months ago
Prefix forwarding for publish/subscribe
We present a prefix forwarding algorithm for content-based publish/subscribe systems. Our algorithm performs only one content-based match per message regardless of the number of r...
Zbigniew Jerzak, Christof Fetzer
IJNSEC
2008
120views more  IJNSEC 2008»
14 years 9 months ago
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously establ...
Shengbao Wang, Zhenfu Cao, Feng Cao
CORR
2007
Springer
74views Education» more  CORR 2007»
14 years 9 months ago
Parity Forwarding for Multiple-Relay Networks
—This paper proposes a relaying strategy for the multiple-relay network in which each relay decodes a selection of transmitted messages by other transmitting terminals, and forwa...
Peyman Razaghi, Wei Yu