|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6784 occurrences of 3457 keywords
|
|
|
Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu 0001 |
Minimal Threshold Closure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 145-155, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Threshold Closure, Access Control, Authorization, Threshold Schemes |
64 | Brian King |
Improved Methods to Perform Threshold RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 359-372, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
threshold RSA, threshold cryptography, threshold secret sharing, cyclotomic polynomials |
61 | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 494-508, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification |
59 | Wolfgang Maass 0001, Georg Schnitger, Eduardo D. Sontag |
On the Computational Power of Sigmoid versus Boolean Threshold Circuits ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991, pp. 767-776, 1991, IEEE Computer Society, 0-8186-2445-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
polynomially bounded weights, sigmoid threshold gates, smooth threshold gates, depth 2 circuits, Boolean threshold circuits, constant size circuits, Boolean threshold gates, polynomial size sigmoid threshold circuits, Boolean functions, computational power, constant depth circuits |
58 | Rafail Lashevsky, K. Takaara, M. Souma |
The efficiency of neuron-MOS transistors in threshold logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 3(1), pp. 20-29, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Neuron MOS-transistors, threshold gate with alterable parameters, threshold logic |
57 | Mohammad Reza Kakoee, Ashoka Visweswara Sathanur, Antonio Pullini, Jos Huisken, Luca Benini |
Automatic synthesis of near-threshold circuits with fine-grained performance tunability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2010 International Symposium on Low Power Electronics and Design, 2010, Austin, Texas, USA, August 18-20, 2010, pp. 401-406, 2010, ACM, 978-1-4503-0146-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
near threshold, sub-threshold performance, variability compensation, low power, ultra low power, dual VDD, sub-threshold |
56 | Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata |
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 259-273, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 75-89, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
54 | Maciej Nikodem, Marek A. Bawiec, Janusz Biernat |
Synthesis of Generalised Threshold Gates and Multi Threshold Threshold Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEng ![In: 21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011, pp. 463-464, 2011, IEEE, 978-1-4577-1078-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Generalised Threshold Gate, Multi Threshold Threshold Gate, synthesis, nanotechnologies, resonant tunnelling diodes |
51 | Maurice J. Chacron, Benjamin Lindner, André Longtin |
Threshold fatigue and information transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Neurosci. ![In: J. Comput. Neurosci. 23(3), pp. 301-311, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Action potential threshold, Refractoriness, Information theory, Variability |
51 | Benjamin Watson 0001, Neff Walker, Larry F. Hodges |
Supra-threshold control of peripheral LOD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 23(3), pp. 750-759, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
peripheral visual sensitivity, supra-threshold visual sensitivity, human factors, perception, level of detail |
51 | Bipul Chandra Paul, Arijit Raychowdhury, Kaushik Roy 0001 |
Device optimization for ultra-low power digital sub-threshold operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2004 International Symposium on Low Power Electronics and Design, 2004, Newport Beach, California, USA, August 9-11, 2004, pp. 96-101, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
device optimization, sub-threshold operation, ultra-low power applications |
51 | Matthias Krause 0001, Pavel Pudlák |
Computing Boolean Functions by Polynomials and Threshold Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 7(4), pp. 346-370, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Complexity of Boolean functions, circuit lower bounds, representations by multivariate polynomials, threshold circuits |
50 | Changshe Ma, Kefei Chen, Dong Zheng 0001, Shengli Liu 0001 |
Efficient and Proactive Threshold Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 233-243, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
threshold signcryption, threshold approach, Network security, provable security, asynchronous network |
50 | Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce |
Improved topology assumptions for threshold cryptography in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 53-62, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures |
50 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 89-106, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
50 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 74-82, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
49 | Stanislaw J. Piestrak |
The Minimal Test Set for Multioutput Threshold Circuits Implemented as Sorting Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 42(6), pp. 700-712, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
minimal test set, multioutput threshold circuits, n-input, symmetric threshold functions, logic testing, Boolean functions, Boolean functions, logic circuits, sorting networks, threshold logic, threshold circuit, unidirectional error detecting codes |
47 | Guilin Wang, Xiaoxi Han, Bo Zhu |
On the Security of Two Threshold Signature Schemes with Traceable Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 111-122, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, threshold signature |
47 | Siva G. Narendra, Vivek De, Shekhar Borkar, Dimitri A. Antoniadis, Anantha P. Chandrakasan |
Full-chip sub-threshold leakage power prediction model for sub-0.18 µm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002, Monterey, California, USA, August 12-14, 2002, pp. 19-23, 2002, ACM, 1-58113-475-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
sub-threshold leakage, CMOS, within-die variation |
47 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 455-470, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
47 | Yvo Desmedt, Kaoru Kurosawa |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 351-361, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures |
45 | Avesta Sasan, Fadi J. Kurdahi, Ahmed M. Eltawil |
Resizable Data Composer (RDC) Cache: A Near-Threshold Cache Tolerating Process Variation via Architectural Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., pp. 57-73, 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Avesta Sasan, Fadi J. Kurdahi, Ahmed M. Eltawil |
Erratum to: Chapter 4 Resizable Data Composer (RDC) Cache: A Near-Threshold Cache Tolerating Process Variation via Architectural Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Shekhar Borkar |
Extreme Energy Efficiency by Near Threshold Voltage Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., pp. 3-18, 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Ioannis S. Stamelakos, Sotirios Xydis, Gianluca Palermo, Cristina Silvano |
Variability-Aware Voltage Island Management for Near-Threshold Computing with Performance Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., pp. 35-53, 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Patrick Grim |
Threshold Phenomena in Epistemic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
45 | Bryan D. Jones, László Zalányi, Frank R. Baumgartner, Péter Érdi |
Dynamic Threshold Modeling of Budget Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
44 | Kei Uchizawa, Rodney J. Douglas, Wolfgang Maass 0001 |
Energy Complexity and Entropy of Threshold Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (1) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I, pp. 631-642, 2006, Springer, 3-540-35904-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Damien Marshall, Seamus C. McLoone, Declan Delaney, Tomás Ward |
Statistical Determination of Hybrid Threshold Parameters for Entity State Update Mechanisms in Distributed Interactive Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DS-RT ![In: 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2-4 October 2006, Malaga, Spain, pp. 85-94, 2006, IEEE Computer Society, 0-7695-2697-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan Katz, Moti Yung |
Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 192-205, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Derek L. Eager, Edward D. Lazowska, John Zahorjan |
A Comparison of Receiver-Initiated and Sender-Initiated Adaptive Load Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1985 ACM SIGMETRICS conference on Measurement and modeling of computer systems, Austin, Texas, USA, August 26-29, 1985, pp. 1-3, 1985, ACM, 0-89791-169-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
44 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 186-200, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
44 | Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald |
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(4), pp. 562-575, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography |
44 | Tae-Suk Kim, Jennifer C. Hou, Hyuk Lim |
Improving spatial reuse through tuning transmit power, carrier sense threshold, and data rate in multihop wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006, Los Angeles, CA, USA, September 23-29, 2006, pp. 366-377, 2006, ACM, 1-59593-286-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
carrier sense threshold, wireless ad-hoc networks, power control, spatial reuse |
44 | Avraham Trakhtman |
Reducing the Time Complexity of Testing for Local Threshold Testability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAA ![In: Implementation and Application of Automata, 8th International Conference, CIAA 2003, Santa Barbara, California, USA, July 16-18, 2003, Proceedings, pp. 141-149, 2003, Springer, 3-540-40561-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
threshold locally testable, algorithm, graph, Automaton |
44 | A. N. Trahtman |
An Algorithm to Verify Local Threshold Testability of Deterministic Finite Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIA ![In: Automata Implementation, 4th International Workshop on Implementing Automata, WIA'99, Potsdam, Germany, July 17-19, 1999, Revised Papers, pp. 164-173, 1999, Springer, 3-540-42812-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
locally threshold testable, semigroup AMS subject classification 68Q25, 68Q68, 20M07, algorithm, deterministic finite automaton, 68Q45 |
43 | Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen |
Threshold Signature Scheme Resistible for Conspiracy Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 479-483, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
conspiracy attack and group signature, threshold cryptography, Threshold signature |
43 | Brian King |
A Comment on Group Independent Threshold Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 425-441, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs |
43 | Claudio Moraga |
Improving the Characterization of p-Valued Threshold Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMVL ![In: 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), May 15-18, 2002, Boston, Massachusetts, USA, pp. 28-34, 2002, IEEE Computer Society, 0-7695-1462-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Multiple-valued threshold functions, semiduality, table-based realization of m-v threshold functions |
43 | Tal Rabin |
A Simplified Approach to Threshold and Proactive RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 89-104, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
proactive signatures, threshold and proactive RSA, RSA, threshold signatures |
42 | Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen |
Image segmentation by automatic histogram thresholding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 136-141, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bi-level threshold, image histogram, image segmentation, automatic threshold, multi-threshold |
41 | Andrew B. Kahng, Swamy Muddu, Puneet Sharma |
Impact of Gate-Length Biasing on Threshold-Voltage Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 7th International Symposium on Quality of Electronic Design (ISQED 2006), 27-29 March 2006, San Jose, CA, USA, pp. 747-754, 2006, IEEE Computer Society, 0-7695-2523-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Amos Beimel, Tamir Tassa, Enav Weinreb |
Characterizing Ideal Weighted Threshold Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 600-619, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Threshold MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 237-252, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Volkan Kursun, Eby G. Friedman |
Node Voltage Dependent Subthreshold Leakage Current Characteristics of Dynamic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 5th International Symposium on Quality of Electronic Design (ISQED 2004), 22-24 March 2004, San Jose, CA, USA, pp. 104-109, 2004, IEEE Computer Society, 0-7695-2093-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Raghid Shreih, Maitham Shams |
Implementation of asynchronous pipeline circuits in multi-threshold CMOS technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, Orlando, Florida, USA, May 4-6, 2008, pp. 189-194, 2008, ACM, 978-1-59593-999-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
c-element, gasp, low power, pipeline, asynchronous, multi-threshold |
40 | Tejaswi Gowda, Sarma B. K. Vrudhula, Goran Konjevod |
Combinational equivalence checking for threshold logic circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007, pp. 102-107, 2007, ACM, 978-1-59593-605-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nano devices, EDA, equivalence checking, threshold logic |
40 | Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 |
Generic On-Line/Off-Line Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 58-74, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic |
40 | Jianmin Ma, Wen-Xiu Zhang, Sheng Cai |
Variable Threshold Concept Lattice and Dependence Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD ![In: Fuzzy Systems and Knowledge Discovery, Third International Conference, FSKD 2006, Xi'an, China, September 24-28, 2006, Proceedings, pp. 109-118, 2006, Springer, 3-540-45916-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Fuzzy formal context, Variable threshold concept lattice, Dependence space, Closed set, Congruence |
40 | Leana Golubchik, John C. S. Lui |
Bounding of Performance Measures for Threshold-Based Queuing Systems: Theory and Application to Dynamic Resource Management in Video-on-Demand Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(4), pp. 353-372, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
threshold-based systems, matrix-geometric, Markov chains, error bounds, video-on-demand systems |
40 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
Changing Thresholds in the Absence of Secure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 177-191, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing |
39 | Kouji Harada, Yoshiteru Ishida |
Mutation Probability Threshold of HIV for AIDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 838-845, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Antigenic Diversity Threshold, Mutation Probability Threshold, HIV, Immune System, AIDS |
39 | José Fernández Ramos, Alfonso Gago Bohórquez |
Two Operand Binary Adders with Threshold Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 48(12), pp. 1324-1337, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
neural networks, logic design, computer arithmetic, Threshold logic, threshold gate, binary adders |
38 | Ali Keshavarzi, Gerhard Schrom, Stephen Tang, Sean Ma, Keith A. Bowman, Sunit Tyagi, Kevin Zhang 0001, Tom Linton, Nagib Hakim, Steven G. Duvall, John Brews, Vivek De |
Measurements and modeling of intrinsic fluctuations in MOSFET threshold voltage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2005 International Symposium on Low Power Electronics and Design, 2005, San Diego, California, USA, August 8-10, 2005, pp. 26-29, 2005, ACM, 1-59593-137-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Vt mismatch, Vt variation, random dopant variation, threshold voltage variation, transistor mismatch, transistor threshold voltage mismatch, process variation, CMOS, integrated circuits, variation, transistors, threshold voltage, mismatch, body bias, Vt |
37 | Harry I. A. Chen, Edward K. W. Loo, James B. Kuo, Marek Syrzycki |
Triple-Threshold Static Power Minimization in High-Level Synthesis of VLSI CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 17th International Workshop, PATMOS 2007, Gothenburg, Sweden, September 3-5, 2007, Proceedings, pp. 453-462, 2007, Springer, 978-3-540-74441-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Izchak Sharfman, Assaf Schuster, Daniel Keren |
Aggregate Threshold Queries in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-10, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Burak Kantarci, Sema F. Oktug |
Adaptive Threshold based Burst Assembly in OBS Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1419-1422, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Damien Marshall, Seamus C. McLoone, David J. Roberts 0001, Declan Delaney, Tomás Ward |
Exploring the Effect of Curvature on the Consistency of Dead Reckoned Paths for Different Error Threshold Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DS-RT ![In: 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2-4 October 2006, Malaga, Spain, pp. 77-84, 2006, IEEE Computer Society, 0-7695-2697-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild |
Size of Broadcast in Threshold Schemes with Disenrollment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 71-88, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Ayako Maeda, Atsuko Miyaji, Mitsuru Tada |
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 403-416, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang |
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 286-298, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
37 | Tobias Gemmeke, Mohamed M. Sabry, Jan Stuijt, Pieter Schuddinck, Praveen Raghavan, Francky Catthoor |
Memories for NTC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., pp. 75-100, 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
37 | Josep Torrellas |
Many-Core Architecture for NTC: Energy Efficiency from the Ground Up. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Near Threshold Computing ![In: Near Threshold Computing, Technology, Methods and Applications., pp. 21-33, 2016, Springer, 978-3-319-23388-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
37 | |
Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![AAAI The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Deborah Vakas Duong |
Using Complex Adaptive Systems to Simulate Information Operations at the Department of Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Didier Dréau |
Modeling of Solid Tumor Progression Thresholds using a Complex Adaptive System Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Anthony M. D'Amato |
Evolution of International Law: Two Thresholds, Maybe a Third. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | David L. Sallach, Jonathan Ozik |
Data Theory, Discourse Mining and Thresholds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Andrea Jones-Rooy |
Thresholds of Behavioral Flexibility and Environmental Turbulence for Group Success. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | P. J. Lamberson |
Linking Network Structure and Diffusion through Stochastic Dominance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Jacomo Corbo, Yevgeniy Vorobeychik |
The Effects of Quality and Price on Adoption Dynamics of Competing Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Griffin Vernor Drutchas, Péter Érdi |
Dynamics of Price Sensitivity and Market Structure in an Evolutionary Matching Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Betty Tuller |
Language Dynamics: Sound Categorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Aaron Louis Bramson |
Formal Measures of Dynamical Properties: Tipping Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Hugh Trenchard |
Self-Organized Coupling Dynamics and Phase Transitions in Bicycle Pelotons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Hilton L. Root |
The Rise of the Modern State: Gradual Reform or Punctuated Transition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Nathan B. Menke, Kevin R. Ward, Lemont B. Kier, Chao-Kun Cheng, Umesh R. Desai |
A Computational Analysis of the Synergistic Effect of Coagulation Inhibitors on the Generation of Thrombin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Don Miner, Marie desJardins |
Predicting and Controlling System-Level Parameters of Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Mary Rorick, Günter P. Wagner |
Emergence of Ultra-Conserved Protein Domains and Amino Acid Repeats: Adaptation, Competition and Thresholds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
37 | Tina Gwoing Yu, Tsung-Hong Chiu, Jeroen P. H. M. van den Wijngaard, T'sang-T'ang Hsieh, Berend E. Westerhof, Enson Tseng |
Timing the Delivery of Preterm Fetus: A Case Study Based on Computer Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposium: Complex Adaptive Systems and the Threshold Effect ![In: Complex Adaptive Systems and the Threshold Effect, Papers from the 2009 AAAI Fall Symposium, Arlington, Virginia, USA, November 5-7, 2009, 2009, AAAI. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
36 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(5), pp. 379-385, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
36 | Xiaofeng He, Lei Duan, Yiping Zhou, Byron Dom |
Threshold selection for web-page classification with highly skewed class distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1081-1082, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
binary classifier, skewed class distribution, web-page classification, stratified sampling, threshold selection |
36 | Yexin Zheng, Michael S. Hsiao, Chao Huang |
SAT-based equivalence checking of threshold logic designs for nanotechnologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, Orlando, Florida, USA, May 4-6, 2008, pp. 225-230, 2008, ACM, 978-1-59593-999-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAT, nanotechnology, equivalence checking, threshold logic |
36 | Zhenfu Cao, Haojin Zhu, Rongxing Lu |
Provably secure robust threshold partial blind signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(5), pp. 604-615, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
improved RSA cryptosystem, factoring problem, blind signature, electronic cash, threshold signature |
36 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 218-232, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
36 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 351-368, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
36 | Hyeon-Kyu Lee, Jin-Hyung Kim |
An HMM-Based Threshold Model Approach for Gesture Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 21(10), pp. 961-973, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
gesture spotting, threshold model, pattern recognition, segmentation, Hidden Markov Model, Hand gesture, relative entropy, state reduction |
36 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Applications of Pedersen's Distributed Key Generation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 373-390, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security |
36 | Steven C. Jocke, Jonathan F. Bolus, Stuart N. Wooters, Travis N. Blalock, Benton H. Calhoun |
A 2.6 µW sub-threshold mixed-signal ECG SoC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009, San Fancisco, CA, USA, August 19-21, 2009, pp. 117-118, 2009, ACM, 978-1-60558-684-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sub-threshold SoC, sub-threshold operation, system on chip, electrocardiogram |
36 | Joseph F. Ryan 0002, Jiajing Wang, Benton H. Calhoun |
Analyzing and modeling process balance for sub-threshold circuit design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007, pp. 275-280, 2007, ACM, 978-1-59593-605-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
minimum energy operation, process balance, process imbalance, sub-threshold digital circuits, sub-threshold modeling |
36 | George Voutsadakis |
A Categorical Approach to Threshold Agent Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Categorical Struct. ![In: Appl. Categorical Struct. 12(2), pp. 203-223, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
finite dynamical systems, automata networks, threshold networks, threshold agent networks, categories of networks, neural networks, products, equalizers, limits |
36 | Octavian V. Sarca, Ioan Tabus, Jaakko Astola |
Threshold Decomposition Based- Locally Adaptive Linear Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings 1997 International Conference on Image Processing, ICIP '97, Santa Barbara, California, USA, October 26-29, 1997, pp. 409-412, 1997, IEEE Computer Society, 0-8186-8183-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
threshold decomposition based-locally adaptive linear filters, extended threshold Boolean filter, observation windows, MSE-optimal design, iterative design algorithm, ETBF, images, adaptive filters, linear filters |
35 | Yongbing Zhang, Sajal K. Das 0001, Xiaohua Jia |
D-CAT: An Efficient Algorithm for Distributed Channel Allocation in Cellular Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 9(4), pp. 279-288, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
channel importing and exporting, heavy threshold, target threshold, mobile communication, distributed channel allocation |
34 | Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan |
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 80-101, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Reliable and Secure Communication, Information Theoretic Security, Directed Networks, Communication Efficiency |
33 | Hideki Nakagawa, Ryota Nishioka |
The Angular Threshold for Frog Collision Avoidance Behavior Changes Depending on Not Only the Stimulus Location But Also the Behavioral Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Brain-Inspired Information Technology ![In: Brain-Inspired Information Technology, pp. 109-113, 2010, Springer, 978-3-642-04024-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Basab Datta, Wayne P. Burleson |
Temperature effects on energy optimization in sub-threshold circuit design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 10th International Symposium on Quality of Electronic Design (ISQED 2009), 16-18 March 2009, San Jose, CA, USA, pp. 680-685, 2009, IEEE Computer Society, 978-1-4244-2952-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Jing Zhou, Hong Va Leong, Qin Lu 0001, Ken C. K. Lee |
Optimizing Update Threshold for Distance-based Location Tracking Strategies in Moving Object Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-8, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Johannes Aßfalg, Hans-Peter Kriegel, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz |
Time Series Analysis Using the Concept of Adaptable Threshold Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: 18th International Conference on Scientific and Statistical Database Management, SSDBM 2006, 3-5 July 2006, Vienna, Austria, Proceedings, pp. 251-260, 2006, IEEE Computer Society, 0-7695-2590-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Andrew Snow, Shweta Agarwal |
Towards an optimal network survivability threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pp. 761-774, 2005, IEEE. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 17373 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|