The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threshold with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1962 (22) 1963-1964 (23) 1965 (27) 1966 (19) 1967-1968 (34) 1969 (22) 1970 (18) 1971-1972 (23) 1973-1974 (17) 1975-1977 (19) 1978-1979 (18) 1980-1981 (21) 1982-1983 (17) 1984-1985 (39) 1986 (17) 1987 (25) 1988 (37) 1989 (36) 1990 (52) 1991 (62) 1992 (40) 1993 (77) 1994 (95) 1995 (108) 1996 (93) 1997 (159) 1998 (131) 1999 (236) 2000 (280) 2001 (314) 2002 (436) 2003 (533) 2004 (741) 2005 (965) 2006 (1157) 2007 (1149) 2008 (1269) 2009 (908) 2010 (477) 2011 (441) 2012 (474) 2013 (491) 2014 (507) 2015 (563) 2016 (596) 2017 (513) 2018 (621) 2019 (655) 2020 (637) 2021 (619) 2022 (649) 2023 (720) 2024 (171)
Publication types (Num. hits)
article(7521) book(5) data(5) incollection(70) inproceedings(9727) phdthesis(44) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6784 occurrences of 3457 keywords

Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Zhigang Jiang, Sandeep K. Gupta 0001 Threshold testing: Covering bridging and other realistic faults. Search on Bibsonomy Asian Test Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Amos Beimel, Enav Weinreb Monotone Circuits for Weighted Threshold Functions. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Predrag T. Tosic, Gul Agha Characterizing Configuration Spaces of Simple Threshold Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Lixin Gao 0001, Donald F. Towsley Threshold-based multicast for continuous media delivery. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
33Hendrawan Soeleman, Kaushik Roy 0001, Bipul Chandra Paul Robust ultra-low power sub-threshold DTMOS logic. Search on Bibsonomy ISLPED The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Pei-Yih Ting, Xiao-Wei Huang An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold proxy signature, Cryptography, Proxy signature
33Tiancheng Lou, Christophe Tartary Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate
33Liangbin Zhang, Lifeng Xi A Novel Fractal Image Coding Based on Quadtree Partition of the Adaptive Threshold Value. Search on Bibsonomy IFSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fractal image coding, Quadtree partition, adaptive threshold
33Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shimakawa Behavior Detection Based on Touched Objects with Dynamic Threshold Determination Model. Search on Bibsonomy EuroSSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF context, Threshold, behavior, proactive, ambient
33Jin Li 0002, Tsz Hon Yuen, Kwangjo Kim Practical Threshold Signatures Without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CDH problem, Threshold Signature, Bilinear groups
33Renaud Jolivet, Alexander Rauch, Hans-Rudolf Lüscher, Wulfram Gerstner Predicting spike timing of neocortical pyramidal neurons by simple threshold models. Search on Bibsonomy J. Comput. Neurosci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Spike Response Model, Stochastic input, Spike-timing reliability, Predicting spike timing, Adapting threshold
33Yumin Yuan A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation
33Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen Simplified Threshold RSA with Adaptive and Proactive Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold RSA, Uni-versal Composability, Proactiveness, Adaptive Security
33Arsalan Farrokh, Vikram Krishnamurthy Optimal Threshold Policies for Operation of a Dedicated-Platform with Imperfect State Information - A POMDP Framework. Search on Bibsonomy ECSQARU The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Partially Observable Markov Decision Process (POMDP), optimal threshold policies, Bellman equation, two-state Markov chain, overlook probability, dynamic programming, Hidden Markov Model (HMM), sufficient statistics, optimal search
33Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
33Kuo-Hsing Cheng, Shun-Wen Cheng, Che-Yu Liao 64-bit Low Threshold Voltage High-Speed Conditional Carry Adder by Complementary Pass-Transistor Logi. Search on Bibsonomy ISVLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CPL, conditional sum adder, low-threshold voltage, differential-end, VLSI design, low-voltage
33Kuo-Hsing Cheng, Shun-Wen Cheng, Chan-Wei Huang 64-bit Hybrid Dual-Threshold Voltage Power-Aware Conditional Carry Adder Design. Search on Bibsonomy IWSOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF conditional carry, hybrid dual-threshold voltage, CMOS, VLSI design, Adder
33Bingfeng Zhou, Xifeng Fang Improving mid-tone quality of variable-coefficient error diffusion using threshold modulation. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold modulation, correlation, fourier transform, halftoning, error-diffusion, blue noise
33Saehwa Kim, Seongsoo Hong, Tae-Hyung Kim Perfecting preemption threshold scheduling for object-oriented real-time system design: from the perspective of real-time synchronization. Search on Bibsonomy LCTES-SCOPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF object-oriented real-time system design, preemption threshold scheduling, priority inheritance protocols, real-time synchronization, priority ceiling protocol
33Saehwa Kim, Seongsoo Hong, Tae-Hyung Kim Integrating Real-Time Synchronization Schemes into Preemption Threshold Scheduling. Search on Bibsonomy Symposium on Object-Oriented Real-Time Distributed Computing The full citation details ... 2002 DBLP  DOI  BibTeX  RDF preemption threshold scheduling, real-time synchronization scheme, real-time scheduling, real-time object-oriented modeling
33William Agassounon, Alcherio Martinoli Efficiency and robustness of threshold-based distributed allocation algorithms in multi-agent systems. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF embodied multi-agent systems, response threshold, swarm intelligence, probabilistic modeling, division of labor
33A. N. Trahtman Piecewise and Local Threshold Testability of DFA. Search on Bibsonomy FCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF locally threshold testable, piecewise testable, locally testable, syntactic semigroup, algorithm, automaton, transition graph
33Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear secret sharing, Randomness requirements, Threshold secret sharing
33Andrea Bondavalli, Silvano Chiaradonna, Felicita Di Giandomenico, Fabrizio Grandoni 0002 Threshold-Based Mechanisms to Discriminate Transient from Intermittent Faults. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Fault discrimination, threshold-based identification, transient and intermittent faults, fault diagnosis, modeling and evaluation
33Sorin Cotofana, Stamatis Vassiliadis Signed Digit Addition and Related Operations with Threshold Logic. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF signed-digit arithmetic, redundant adders, redundant multipliers, neural networks, Computer arithmetic, threshold logic, carry-free addition, signed-digit number representation
33Raju Khubchandani A Fast Test to Generate Flash Memory Threshold Voltage Distribution Map. Search on Bibsonomy MTDT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF flash memory, memory testing, bitmap, threshold voltage
33Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
32Deepayan Chakrabarti, Yang Wang 0008, Chenxi Wang, Jure Leskovec, Christos Faloutsos Epidemic thresholds in real networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Viral propagation, eigenvalue, epidemic threshold
32Jian Chih Ou, Chang-Hung Lee, Ming-Syan Chen Efficient algorithms for incremental Web log mining with dynamic thresholds. Search on Bibsonomy VLDB J. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web mining path traversal pattern, Dynamic support threshold
32Ryan O'Donnell, Rocco A. Servedio The chow parameters problem. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF chow parameters, boolean function, fourier analysis, threshold function
32Shouhuai Xu, Xiaohu Li, T. Paul Parker Exploiting social networks for threshold signing: attack-resilience vs. availability. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-resilience, threshold signing, social networks, availability, threshold cryptography
32Benton H. Calhoun, Alice Wang, Naveen Verma, Anantha P. Chandrakasan Sub-threshold design: the challenges of minimizing circuit energy. Search on Bibsonomy ISLPED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low voltage memory, sub-threshold digital circuits, sub-threshold logic, process variations, dynamic voltage scaling
32Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
32Fu Chang, Kung-Hao Liang, Tzu-Ming Tan, Wen-Liang Hwang Binarization of Document Images using Hadamard Multiresolution Analysis. Search on Bibsonomy ICDAR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF global threshold, Hadamard multiresolution analysis, local threshold, window-based dynamic binarization, wavelet transform, scale, document image, Binarization
30Paul Erdös, Edward T. Ordman, Yechezkel Zalcstein Bounds on threshold dimension and disjoint threshold coverings (abstract only). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
30Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Furuzan Atay Onat, Yijia Fan, Halim Yanikomeroglu, John S. Thompson Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Pallav Gupta, Rui Zhang, Niraj K. Jha Automatic Test Generation for Combinational Threshold Logic Networks. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Hiroki Koga Coding Theorems on the Threshold Scheme for a General Source. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Tzu-Chuan Chou, Meng Chang Chen Using Incremental PLSI for Threshold-Resilient Online Event Analysis. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Knowledge life cycles, Clustering, Web mining, Probabilistic algorithms
30Cécile Delerablée, David Pointcheval Dynamic Threshold Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng Su, K. J. Ray Liu Differential Modulation With Threshold-Based Decision Combining for Cooperative Communications. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Rui Zhang, Pallav Gupta, Lin Zhong 0001, Niraj K. Jha Threshold network synthesis and optimization and its application to nanotechnologies. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin Updating the parameters of a threshold scheme by minimal broadcast. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Yehea I. Ismail, Chirayu S. Amin Computation of signal-threshold crossing times directly from higher order moments. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Rui Zhang, Pallav Gupta, Lin Zhong 0001, Niraj K. Jha Synthesis and Optimization of Threshold Logic Networks with Application to Nanotechnologies. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Pallav Gupta, Rui Zhang, Niraj K. Jha An Automatic Test Pattern Generation Framework for Combinational Threshold Logic Networks. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Edward G. Coffman Jr., Predrag R. Jelenkovic Threshold policies for single-resource reservation systems. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Leana Golubchik, John C. S. Lui Bounding of Performance Measures for a Threshold-based Queueing System with Hysteresis. Search on Bibsonomy SIGMETRICS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
30Sorin Cotofana, Stamatis Vassiliadis delta-Bit serial binary addition with linear threshold networks. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
30Daniel M. Dubois, Germano Resconi, Alessandro Raymondi TurboBrain: A Neural Network with Direct Learning Based on Linear or Non-Linear Threshold Logics. Search on Bibsonomy CAST The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
30Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee Remark on the Threshold RSA Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
30Douglas R. Stinson, Scott A. Vanstone A Combinatorial Approach to Threshold Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
29Yvo Desmedt, Brian King, Berry Schoenmakers Revisiting the Karnin, Greene and Hellman Bounds. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Vibhav Kapnadak, Murat Senel, Edward J. Coyle Distributed incumbent estimation for cognitive wireless networks. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yinian Qi, Rohit Jain, Sarvjeet Singh, Sunil Prabhakar Threshold query optimization for uncertain data. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threshold queries, query optimization, uncertain data, probabilistic data
29Ashok Kumar Palaniswamy, Manoj Kumar Goparaju, Spyros Tragoudas Scalable identification of threshold logic functions. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threshold logic gates
29Raghu Meka, David Zuckerman Pseudorandom generators for polynomial threshold functions. Search on Bibsonomy STOC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF invariance principles, polynomials, pseudorandom generators, branching programs, threshold functions, halfspaces
29Mawahib Hussein Sulieman On the Reliability of Interconnected CMOS Gates Considering MOSFET Threshold-Voltage Variations. Search on Bibsonomy NanoNet The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Reliability, CMOS, threshold voltage, gates
29Masao Nakagawa, Hidetoshi Nakayasu, Tetsuya Miyoshi Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel. Search on Bibsonomy HCI (8) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Theory of signal detection, Experienced panel, Stimulus threshold, Psychometric function
29Gang Li, Yanling Li, Chuanda Qi Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. Search on Bibsonomy ISNN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature
29Sudhanshu Khanna, Benton H. Calhoun Serial sub-threshold circuits for ultra-low-power systems. Search on Bibsonomy ISLPED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit width, serial systems, leakage, ultra low power, sub-threshold
29Lara D. Oliver, Krishnendu Chakrabarty, Hisham Z. Massoud Dual-threshold pass-transistor logic design. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dual threshold, pass transistor, low power, leakage
29Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
29Beate Bollig On the OBDD Complexity of Threshold Functions and the Variable Ordering Problem. Search on Bibsonomy SOFSEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF variable ordering problem, Computational complexity, ordered binary decision diagrams, threshold functions
29Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai Weighted Threshold Secret Image Sharing. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing
29Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold ring signature, Stern’s Scheme, syndrome decoding, code-based cryptography
29Ming Hua 0001, Jian Pei, Wenjie Zhang 0001, Xuemin Lin 0001 Ranking queries on uncertain data: a probabilistic threshold approach. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF probabilistic threshold top-k queries, query processing, uncertain data
29Gianni Giorgetti, Sandeep K. S. Gupta, Gianfranco Manes Optimal RSS threshold selection in connectivity-based localization schemes. Search on Bibsonomy MSWiM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cramér-Rao Bound, optimal, localization, approximation, connectivity, threshold, signal strength
29Manoj Kumar Goparaju, Spyros Tragoudas A Novel ATPG Framework to Detect Weight Related Defects in Threshold Logic Gates. Search on Bibsonomy VTS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weght defects, ATPG, Threshold logic, Parametric faults
29Rui Su, Guizhong Liu, Tongyu Zhang Fast mode decision algorithm for intra prediction in H.264/AVC with integer transform and adaptive threshold. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF JVT, Video coding, H.264, Adaptive threshold, Intra prediction, AVC, Integer transform
29Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
29Jonas Boustedt, Anna Eckerdal, Robert McCartney, Jan Erik Moström, Mark Ratcliffe 0001, Kate Sanders 0001, Carol Zander Threshold concepts in computer science: do they exist and are they useful? Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF learning theory, threshold concepts
29Esteban Arcaute, Adam Kirsch, Ravi Kumar 0001, David Liben-Nowell, Sergei Vassilvitskii On threshold behavior in query incentive networks. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF query incentive networks, threshold phenomena, branching processes
29Yu Pu, José de Jesus Pineda de Gyvez, Henk Corporaal, Yajun Ha Vt balancing and device sizing towards high yield of sub-threshold static logic gates. Search on Bibsonomy ISLPED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF variability, sub-threshold
29Guorong Xuan, Xiuming Zhu, Yun Q. Shi 0001, Peiqi Chai, Xia Cui, Jue Li A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. Search on Bibsonomy ICIAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Improved Bayesian classifier, handwritten digit recognition Csteganalysis, threshold, eigenvalues
29Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems
29Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung Threshold and Proactive Pseudo-Random Permutations. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography
29Jonggab Kil, Jie Gu 0003, Chris H. Kim A high-speed variation-tolerant interconnect technique for sub threshold circuits using capacitive boosting. Search on Bibsonomy ISLPED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF capacitive boosting, sub-threshold circuit, clock skew, global interconnect, variation tolerance
29Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature
29Fagen Li, Juntao Gao, Yupu Hu ID-Based Threshold Unsigncryption Scheme from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof
29Mingwen Wang, Qingxin Zhu, Li Qing A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF group scheme, coalition attack, robust scheme, digital signature, threshold scheme
29Xueguang Chen, Haigang Song Further extensions of FIPA Contract Net Protocol: threshold plus DoA. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CNCP, MEU, Multi-Agent System, threshold, deadline, Contract Net Protocol, DoA
29Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim New ID-Based Threshold Signature Scheme from Bilinear Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based threshold signature, Bilinear pairings, Key escrow
29Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial
29Niklas Borselius, Chris J. Mitchell, Aaron Wilson On the value of threshold signatures. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, mobile agent, digital signature, threshold signature
29Louis-Marie Le Ny, Bruno Tuffin Modeling and Analysis of Multi-class Threshold-Based Queues with Hysteresis Using Stochastic Petri Nets. Search on Bibsonomy ICATPN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Threshold queues, Fluid Stochastic Petri Nets, Performance analysis, Stochastic Petri Nets, Hysteresis
29Mohand Boughanem, Mohamed Tmar Incremental adaptive filtering: profile learning and threshold calibration. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Mercure, threshold calibration, profile, adaptive learning
29Michel Abdalla, Sara K. Miner, Chanathip Namprempre Forward-Secure Threshold Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF proactive cryptography, forward security, threshold cryptography, signature schemes
29Yun Wang, Manas Saksena Scheduling Fixed-Priority Tasks with Preemption Threshold. Search on Bibsonomy RTCSA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Preemption Threshold, Worst-Case Response Time, Schedulability, Fixed-Priority Scheduling
29Yavuz Günalay, Diwakar Gupta Threshold start-up control policy for polling systems. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF threshold start-up control, dormant/patient server, descendant sets, globally gated service, queueing theory, polling models
29Mayukh Bhattacharya, Pinaki Mazumder Noise Margins of Threshold Logic Gates containing Resonant Tunneling Diodes. Search on Bibsonomy Great Lakes Symposium on VLSI The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quantum devices, Digital circuits, Resonant Tunneling Diode, Noise margin, Threshold gate
29Houng-Jyh Mike Wang, C.-C. Jay Kuo A Multi-Threshold Wavelet Coder ( MTWC ) For High Fidelity Image Compression. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF image compression, embedded coding, wavelet coding, multi-threshold
29Stephen P. Smith Threshold Validity for Mutual Neighborhood Clustering. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF threshold validity, mutual neighborhood clustering, random data, image recognition, image recognition, random processes, Poisson process
29Sverrir Olafsson, Yaser S. Abu-Mostafa The Capacity of Multilevel Threshold Functions. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF information capacity, multilevel threshold functions, input set, lower bounds, topology, topology, information theory, information theory, upper bounds
29Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim Distributive Key Management for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ad hoc networks, threshold cryptography, mobile security, symmetric key, MDS code
29Lars Lundberg, Håkan Lennerstad Guaranteeing Response Times for Aperiodic Tasks in Global Multiprocessor Scheduling. Search on Bibsonomy Real Time Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Aperiodic, Dhalls effect, Optimal threshold, Synthetic utilization, Scheduling, Multiprocessor
Displaying result #101 - #200 of 17373 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license