Sciweavers

522 search results - page 94 / 105
» The 3-Steiner Root Problem
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
MINENET
2005
ACM
14 years 2 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
IMR
2004
Springer
14 years 2 months ago
Surface Mesh Projection for Hexahedral Mesh Generation by Sweeping
Sweep method is one of the most robust techniques to generate hexahedral meshes in extrusion volumes. One of the main issues to be dealt by any sweep algorithm is the projection o...
Xevi Roca, Josep Sarrate, Antonio Huerta
ARITH
2003
IEEE
14 years 1 months ago
The Interval Logarithmic Number System
This paper introduces the Interval Logarithmic Number System (ILNS), in which the Logarithmic Number System (LNS) is used as the underlying number system for interval arithmetic. ...
Mark G. Arnold, Jesus Garcia, Michael J. Schulte