Sciweavers

933 search results - page 19 / 187
» Extending Forward Checking
Sort
View
SIGCOMM
2005
ACM
14 years 2 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
ENTCS
2010
119views more  ENTCS 2010»
13 years 8 months ago
A Tableau Method for Checking Rule Admissibility in S4
Rules that are admissible can be used in any derivations in any axiomatic system of a logic. In this paper we introduce a method for checking the admissibility of rules in the mod...
Sergey Babenyshev, Vladimir V. Rybakov, Renate A. ...
IWCMC
2010
ACM
14 years 13 days ago
Cooperative contention-based forwarding for wireless sensor networks
Cooperative forwarding has been considered as an effective strategy for improving the geographic routing performance in wireless sensor networks (WSNs). However, we observe that ...
Long Cheng, Jiannong Cao, Canfeng Chen, Hongyang C...
EURONGI
2005
Springer
14 years 2 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
CCS
2001
ACM
14 years 29 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song