Sciweavers

1458 search results - page 230 / 292
» Monads for incremental computing
Sort
View
ICNP
2007
IEEE
15 years 10 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
ICNP
2007
IEEE
15 years 10 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
118
Voted
ICNP
2007
IEEE
15 years 10 months ago
Greedy Virtual Coordinates for Geographic Routing
— We present a new approach for generating virtual coordinates that produces usable coordinates quickly and improves the routing performance of existing geographic routing algori...
Ben Leong, Barbara Liskov, Robert Morris
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
15 years 10 months ago
Greedy but Safe Replanning under Kinodynamic Constraints
— We consider motion planning problems for a vehicle with kinodynamic constraints, where there is partial knowledge about the environment and replanning is required. We present a...
Kostas E. Bekris, Lydia E. Kavraki
MDM
2007
Springer
15 years 10 months ago
Near Optimal Update-Broadcast of Data Sets
— We consider the problem of efficiently broadcasting incremental updates to multiple terminals that contain outdated (and possibly different) initial copies of the data. This s...
Sachin Agarwal, Andrew Hagedorn, Ari Trachtenberg