|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6784 occurrences of 3457 keywords
|
|
|
Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Zhigang Jiang, Sandeep K. Gupta 0001 |
Threshold testing: Covering bridging and other realistic faults. |
Asian Test Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Amos Beimel, Enav Weinreb |
Monotone Circuits for Weighted Threshold Functions. |
CCC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Predrag T. Tosic, Gul Agha |
Characterizing Configuration Spaces of Simple Threshold Cellular Automata. |
ACRI |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Lixin Gao 0001, Donald F. Towsley |
Threshold-based multicast for continuous media delivery. |
IEEE Trans. Multim. |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Hendrawan Soeleman, Kaushik Roy 0001, Bipul Chandra Paul |
Robust ultra-low power sub-threshold DTMOS logic. |
ISLPED |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
33 | Tiancheng Lou, Christophe Tartary |
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate |
33 | Liangbin Zhang, Lifeng Xi |
A Novel Fractal Image Coding Based on Quadtree Partition of the Adaptive Threshold Value. |
IFSA (2) |
2007 |
DBLP DOI BibTeX RDF |
fractal image coding, Quadtree partition, adaptive threshold |
33 | Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shimakawa |
Behavior Detection Based on Touched Objects with Dynamic Threshold Determination Model. |
EuroSSC |
2007 |
DBLP DOI BibTeX RDF |
context, Threshold, behavior, proactive, ambient |
33 | Jin Li 0002, Tsz Hon Yuen, Kwangjo Kim |
Practical Threshold Signatures Without Random Oracles. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
CDH problem, Threshold Signature, Bilinear groups |
33 | Renaud Jolivet, Alexander Rauch, Hans-Rudolf Lüscher, Wulfram Gerstner |
Predicting spike timing of neocortical pyramidal neurons by simple threshold models. |
J. Comput. Neurosci. |
2006 |
DBLP DOI BibTeX RDF |
Spike Response Model, Stochastic input, Spike-timing reliability, Predicting spike timing, Adapting threshold |
33 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
33 | Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen |
Simplified Threshold RSA with Adaptive and Proactive Security. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Threshold RSA, Uni-versal Composability, Proactiveness, Adaptive Security |
33 | Arsalan Farrokh, Vikram Krishnamurthy |
Optimal Threshold Policies for Operation of a Dedicated-Platform with Imperfect State Information - A POMDP Framework. |
ECSQARU |
2005 |
DBLP DOI BibTeX RDF |
Partially Observable Markov Decision Process (POMDP), optimal threshold policies, Bellman equation, two-state Markov chain, overlook probability, dynamic programming, Hidden Markov Model (HMM), sufficient statistics, optimal search |
33 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
33 | Kuo-Hsing Cheng, Shun-Wen Cheng, Che-Yu Liao |
64-bit Low Threshold Voltage High-Speed Conditional Carry Adder by Complementary Pass-Transistor Logi. |
ISVLSI |
2004 |
DBLP DOI BibTeX RDF |
CPL, conditional sum adder, low-threshold voltage, differential-end, VLSI design, low-voltage |
33 | Kuo-Hsing Cheng, Shun-Wen Cheng, Chan-Wei Huang |
64-bit Hybrid Dual-Threshold Voltage Power-Aware Conditional Carry Adder Design. |
IWSOC |
2004 |
DBLP DOI BibTeX RDF |
conditional carry, hybrid dual-threshold voltage, CMOS, VLSI design, Adder |
33 | Bingfeng Zhou, Xifeng Fang |
Improving mid-tone quality of variable-coefficient error diffusion using threshold modulation. |
ACM Trans. Graph. |
2003 |
DBLP DOI BibTeX RDF |
threshold modulation, correlation, fourier transform, halftoning, error-diffusion, blue noise |
33 | Saehwa Kim, Seongsoo Hong, Tae-Hyung Kim |
Perfecting preemption threshold scheduling for object-oriented real-time system design: from the perspective of real-time synchronization. |
LCTES-SCOPES |
2002 |
DBLP DOI BibTeX RDF |
object-oriented real-time system design, preemption threshold scheduling, priority inheritance protocols, real-time synchronization, priority ceiling protocol |
33 | Saehwa Kim, Seongsoo Hong, Tae-Hyung Kim |
Integrating Real-Time Synchronization Schemes into Preemption Threshold Scheduling. |
Symposium on Object-Oriented Real-Time Distributed Computing |
2002 |
DBLP DOI BibTeX RDF |
preemption threshold scheduling, real-time synchronization scheme, real-time scheduling, real-time object-oriented modeling |
33 | William Agassounon, Alcherio Martinoli |
Efficiency and robustness of threshold-based distributed allocation algorithms in multi-agent systems. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
embodied multi-agent systems, response threshold, swarm intelligence, probabilistic modeling, division of labor |
33 | A. N. Trahtman |
Piecewise and Local Threshold Testability of DFA. |
FCT |
2001 |
DBLP DOI BibTeX RDF |
locally threshold testable, piecewise testable, locally testable, syntactic semigroup, algorithm, automaton, transition graph |
33 | Brian King |
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Linear secret sharing, Randomness requirements, Threshold secret sharing |
33 | Andrea Bondavalli, Silvano Chiaradonna, Felicita Di Giandomenico, Fabrizio Grandoni 0002 |
Threshold-Based Mechanisms to Discriminate Transient from Intermittent Faults. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
Fault discrimination, threshold-based identification, transient and intermittent faults, fault diagnosis, modeling and evaluation |
33 | Sorin Cotofana, Stamatis Vassiliadis |
Signed Digit Addition and Related Operations with Threshold Logic. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
signed-digit arithmetic, redundant adders, redundant multipliers, neural networks, Computer arithmetic, threshold logic, carry-free addition, signed-digit number representation |
33 | Raju Khubchandani |
A Fast Test to Generate Flash Memory Threshold Voltage Distribution Map. |
MTDT |
1999 |
DBLP DOI BibTeX RDF |
flash memory, memory testing, bitmap, threshold voltage |
33 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
32 | Deepayan Chakrabarti, Yang Wang 0008, Chenxi Wang, Jure Leskovec, Christos Faloutsos |
Epidemic thresholds in real networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Viral propagation, eigenvalue, epidemic threshold |
32 | Jian Chih Ou, Chang-Hung Lee, Ming-Syan Chen |
Efficient algorithms for incremental Web log mining with dynamic thresholds. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Web mining path traversal pattern, Dynamic support threshold |
32 | Ryan O'Donnell, Rocco A. Servedio |
The chow parameters problem. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
chow parameters, boolean function, fourier analysis, threshold function |
32 | Shouhuai Xu, Xiaohu Li, T. Paul Parker |
Exploiting social networks for threshold signing: attack-resilience vs. availability. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
attack-resilience, threshold signing, social networks, availability, threshold cryptography |
32 | Benton H. Calhoun, Alice Wang, Naveen Verma, Anantha P. Chandrakasan |
Sub-threshold design: the challenges of minimizing circuit energy. |
ISLPED |
2006 |
DBLP DOI BibTeX RDF |
low voltage memory, sub-threshold digital circuits, sub-threshold logic, process variations, dynamic voltage scaling |
32 | Maged Hamada Ibrahim |
Verifiable Threshold Sharing of a Large Secret Safe-Prime. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS |
32 | Fu Chang, Kung-Hao Liang, Tzu-Ming Tan, Wen-Liang Hwang |
Binarization of Document Images using Hadamard Multiresolution Analysis. |
ICDAR |
1999 |
DBLP DOI BibTeX RDF |
global threshold, Hadamard multiresolution analysis, local threshold, window-based dynamic binarization, wavelet transform, scale, document image, Binarization |
30 | Paul Erdös, Edward T. Ordman, Yechezkel Zalcstein |
Bounds on threshold dimension and disjoint threshold coverings (abstract only). |
ACM Conference on Computer Science |
1985 |
DBLP DOI BibTeX RDF |
|
30 | Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin |
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Furuzan Atay Onat, Yijia Fan, Halim Yanikomeroglu, John S. Thompson |
Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Pallav Gupta, Rui Zhang, Niraj K. Jha |
Automatic Test Generation for Combinational Threshold Logic Networks. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Hiroki Koga |
Coding Theorems on the Threshold Scheme for a General Source. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Tzu-Chuan Chou, Meng Chang Chen |
Using Incremental PLSI for Threshold-Resilient Online Event Analysis. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
Knowledge life cycles, Clustering, Web mining, Probabilistic algorithms |
30 | Cécile Delerablée, David Pointcheval |
Dynamic Threshold Public-Key Encryption. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng Su, K. J. Ray Liu |
Differential Modulation With Threshold-Based Decision Combining for Cooperative Communications. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
30 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Rui Zhang, Pallav Gupta, Lin Zhong 0001, Niraj K. Jha |
Threshold network synthesis and optimization and its application to nanotechnologies. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin |
Updating the parameters of a threshold scheme by minimal broadcast. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague |
GBD Threshold Cryptography with an Application to RSA Key Recovery. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Yehea I. Ismail, Chirayu S. Amin |
Computation of signal-threshold crossing times directly from higher order moments. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Rui Zhang, Pallav Gupta, Lin Zhong 0001, Niraj K. Jha |
Synthesis and Optimization of Threshold Logic Networks with Application to Nanotechnologies. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Pallav Gupta, Rui Zhang, Niraj K. Jha |
An Automatic Test Pattern Generation Framework for Combinational Threshold Logic Networks. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Edward G. Coffman Jr., Predrag R. Jelenkovic |
Threshold policies for single-resource reservation systems. |
SIGMETRICS Perform. Evaluation Rev. |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Leana Golubchik, John C. S. Lui |
Bounding of Performance Measures for a Threshold-based Queueing System with Hysteresis. |
SIGMETRICS |
1997 |
DBLP DOI BibTeX RDF |
|
30 | Sorin Cotofana, Stamatis Vassiliadis |
delta-Bit serial binary addition with linear threshold networks. |
J. VLSI Signal Process. |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Daniel M. Dubois, Germano Resconi, Alessandro Raymondi |
TurboBrain: A Neural Network with Direct Learning Based on Linear or Non-Linear Threshold Logics. |
CAST |
1994 |
DBLP DOI BibTeX RDF |
|
30 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Remark on the Threshold RSA Signature Scheme. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Douglas R. Stinson, Scott A. Vanstone |
A Combinatorial Approach to Threshold Schemes. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
29 | Yvo Desmedt, Brian King, Berry Schoenmakers |
Revisiting the Karnin, Greene and Hellman Bounds. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Vibhav Kapnadak, Murat Senel, Edward J. Coyle |
Distributed incumbent estimation for cognitive wireless networks. |
CISS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yinian Qi, Rohit Jain, Sarvjeet Singh, Sunil Prabhakar |
Threshold query optimization for uncertain data. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
threshold queries, query optimization, uncertain data, probabilistic data |
29 | Ashok Kumar Palaniswamy, Manoj Kumar Goparaju, Spyros Tragoudas |
Scalable identification of threshold logic functions. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
threshold logic gates |
29 | Raghu Meka, David Zuckerman |
Pseudorandom generators for polynomial threshold functions. |
STOC |
2010 |
DBLP DOI BibTeX RDF |
invariance principles, polynomials, pseudorandom generators, branching programs, threshold functions, halfspaces |
29 | Mawahib Hussein Sulieman |
On the Reliability of Interconnected CMOS Gates Considering MOSFET Threshold-Voltage Variations. |
NanoNet |
2009 |
DBLP DOI BibTeX RDF |
Reliability, CMOS, threshold voltage, gates |
29 | Masao Nakagawa, Hidetoshi Nakayasu, Tetsuya Miyoshi |
Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel. |
HCI (8) |
2009 |
DBLP DOI BibTeX RDF |
Theory of signal detection, Experienced panel, Stimulus threshold, Psychometric function |
29 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. |
ISNN (2) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
29 | Sudhanshu Khanna, Benton H. Calhoun |
Serial sub-threshold circuits for ultra-low-power systems. |
ISLPED |
2009 |
DBLP DOI BibTeX RDF |
bit width, serial systems, leakage, ultra low power, sub-threshold |
29 | Lara D. Oliver, Krishnendu Chakrabarty, Hisham Z. Massoud |
Dual-threshold pass-transistor logic design. |
ACM Great Lakes Symposium on VLSI |
2009 |
DBLP DOI BibTeX RDF |
dual threshold, pass transistor, low power, leakage |
29 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
29 | Beate Bollig |
On the OBDD Complexity of Threshold Functions and the Variable Ordering Problem. |
SOFSEM |
2009 |
DBLP DOI BibTeX RDF |
variable ordering problem, Computational complexity, ordered binary decision diagrams, threshold functions |
29 | Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai |
Weighted Threshold Secret Image Sharing. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing |
29 | Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
Threshold ring signature, Stern’s Scheme, syndrome decoding, code-based cryptography |
29 | Ming Hua 0001, Jian Pei, Wenjie Zhang 0001, Xuemin Lin 0001 |
Ranking queries on uncertain data: a probabilistic threshold approach. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
probabilistic threshold top-k queries, query processing, uncertain data |
29 | Gianni Giorgetti, Sandeep K. S. Gupta, Gianfranco Manes |
Optimal RSS threshold selection in connectivity-based localization schemes. |
MSWiM |
2008 |
DBLP DOI BibTeX RDF |
Cramér-Rao Bound, optimal, localization, approximation, connectivity, threshold, signal strength |
29 | Manoj Kumar Goparaju, Spyros Tragoudas |
A Novel ATPG Framework to Detect Weight Related Defects in Threshold Logic Gates. |
VTS |
2008 |
DBLP DOI BibTeX RDF |
Weght defects, ATPG, Threshold logic, Parametric faults |
29 | Rui Su, Guizhong Liu, Tongyu Zhang |
Fast mode decision algorithm for intra prediction in H.264/AVC with integer transform and adaptive threshold. |
Signal Image Video Process. |
2007 |
DBLP DOI BibTeX RDF |
JVT, Video coding, H.264, Adaptive threshold, Intra prediction, AVC, Integer transform |
29 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
29 | Jonas Boustedt, Anna Eckerdal, Robert McCartney, Jan Erik Moström, Mark Ratcliffe 0001, Kate Sanders 0001, Carol Zander |
Threshold concepts in computer science: do they exist and are they useful? |
SIGCSE |
2007 |
DBLP DOI BibTeX RDF |
learning theory, threshold concepts |
29 | Esteban Arcaute, Adam Kirsch, Ravi Kumar 0001, David Liben-Nowell, Sergei Vassilvitskii |
On threshold behavior in query incentive networks. |
EC |
2007 |
DBLP DOI BibTeX RDF |
query incentive networks, threshold phenomena, branching processes |
29 | Yu Pu, José de Jesus Pineda de Gyvez, Henk Corporaal, Yajun Ha |
Vt balancing and device sizing towards high yield of sub-threshold static logic gates. |
ISLPED |
2007 |
DBLP DOI BibTeX RDF |
variability, sub-threshold |
29 | Guorong Xuan, Xiuming Zhu, Yun Q. Shi 0001, Peiqi Chai, Xia Cui, Jue Li |
A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. |
ICIAR |
2007 |
DBLP DOI BibTeX RDF |
Improved Bayesian classifier, handwritten digit recognition Csteganalysis, threshold, eigenvalues |
29 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems |
29 | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung |
Threshold and Proactive Pseudo-Random Permutations. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography |
29 | Jonggab Kil, Jie Gu 0003, Chris H. Kim |
A high-speed variation-tolerant interconnect technique for sub threshold circuits using capacitive boosting. |
ISLPED |
2006 |
DBLP DOI BibTeX RDF |
capacitive boosting, sub-threshold circuit, clock skew, global interconnect, variation tolerance |
29 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature |
29 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
29 | Mingwen Wang, Qingxin Zhu, Li Qing |
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
group scheme, coalition attack, robust scheme, digital signature, threshold scheme |
29 | Xueguang Chen, Haigang Song |
Further extensions of FIPA Contract Net Protocol: threshold plus DoA. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
CNCP, MEU, Multi-Agent System, threshold, deadline, Contract Net Protocol, DoA |
29 | Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim |
New ID-Based Threshold Signature Scheme from Bilinear Pairings. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
ID-based threshold signature, Bilinear pairings, Key escrow |
29 | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin |
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial |
29 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
On the value of threshold signatures. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
security, mobile agent, digital signature, threshold signature |
29 | Louis-Marie Le Ny, Bruno Tuffin |
Modeling and Analysis of Multi-class Threshold-Based Queues with Hysteresis Using Stochastic Petri Nets. |
ICATPN |
2002 |
DBLP DOI BibTeX RDF |
Threshold queues, Fluid Stochastic Petri Nets, Performance analysis, Stochastic Petri Nets, Hysteresis |
29 | Mohand Boughanem, Mohamed Tmar |
Incremental adaptive filtering: profile learning and threshold calibration. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
Mercure, threshold calibration, profile, adaptive learning |
29 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
29 | Yun Wang, Manas Saksena |
Scheduling Fixed-Priority Tasks with Preemption Threshold. |
RTCSA |
1999 |
DBLP DOI BibTeX RDF |
Preemption Threshold, Worst-Case Response Time, Schedulability, Fixed-Priority Scheduling |
29 | Yavuz Günalay, Diwakar Gupta |
Threshold start-up control policy for polling systems. |
Queueing Syst. Theory Appl. |
1998 |
DBLP DOI BibTeX RDF |
threshold start-up control, dormant/patient server, descendant sets, globally gated service, queueing theory, polling models |
29 | Mayukh Bhattacharya, Pinaki Mazumder |
Noise Margins of Threshold Logic Gates containing Resonant Tunneling Diodes. |
Great Lakes Symposium on VLSI |
1998 |
DBLP DOI BibTeX RDF |
Quantum devices, Digital circuits, Resonant Tunneling Diode, Noise margin, Threshold gate |
29 | Houng-Jyh Mike Wang, C.-C. Jay Kuo |
A Multi-Threshold Wavelet Coder ( MTWC ) For High Fidelity Image Compression. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
image compression, embedded coding, wavelet coding, multi-threshold |
29 | Stephen P. Smith |
Threshold Validity for Mutual Neighborhood Clustering. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1993 |
DBLP DOI BibTeX RDF |
threshold validity, mutual neighborhood clustering, random data, image recognition, image recognition, random processes, Poisson process |
29 | Sverrir Olafsson, Yaser S. Abu-Mostafa |
The Capacity of Multilevel Threshold Functions. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1988 |
DBLP DOI BibTeX RDF |
information capacity, multilevel threshold functions, input set, lower bounds, topology, topology, information theory, information theory, upper bounds |
29 | Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim |
Distributive Key Management for Mobile Ad Hoc Networks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
ad hoc networks, threshold cryptography, mobile security, symmetric key, MDS code |
29 | Lars Lundberg, Håkan Lennerstad |
Guaranteeing Response Times for Aperiodic Tasks in Global Multiprocessor Scheduling. |
Real Time Syst. |
2007 |
DBLP DOI BibTeX RDF |
Aperiodic, Dhalls effect, Optimal threshold, Synthetic utilization, Scheduling, Multiprocessor |
Displaying result #101 - #200 of 17373 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|