The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Threshold with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1962 (22) 1963-1964 (23) 1965 (27) 1966 (19) 1967-1968 (34) 1969 (22) 1970 (18) 1971-1972 (23) 1973-1974 (17) 1975-1977 (19) 1978-1979 (18) 1980-1981 (21) 1982-1983 (17) 1984-1985 (39) 1986 (17) 1987 (25) 1988 (37) 1989 (36) 1990 (52) 1991 (62) 1992 (40) 1993 (77) 1994 (95) 1995 (108) 1996 (93) 1997 (159) 1998 (131) 1999 (236) 2000 (280) 2001 (314) 2002 (436) 2003 (533) 2004 (741) 2005 (965) 2006 (1157) 2007 (1149) 2008 (1269) 2009 (908) 2010 (477) 2011 (441) 2012 (474) 2013 (491) 2014 (507) 2015 (563) 2016 (596) 2017 (513) 2018 (621) 2019 (655) 2020 (637) 2021 (619) 2022 (649) 2023 (720) 2024 (171)
Publication types (Num. hits)
article(7521) book(5) data(5) incollection(70) inproceedings(9727) phdthesis(44) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6784 occurrences of 3457 keywords

Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Vassilis P. Plagianakos, George D. Magoulas, Michael N. Vrahatis Evolutionary training of hardware realizable multilayer perceptrons. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Neural networks with threshold activations, Integer weight neural networks, Integer programming, Differential evolution, Feedforward neural networks, Unconstrained optimization, Backpropagation algorithm, Steepest descent
29Punam K. Saha, Jayaram K. Udupa Optimum Image Thresholding via Class Uncertainty and Region Homogeneity. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF threshold energy, segmented image information, Image segmentation, uncertainty, scale, thresholding, homogeneity
29Wentong Cai 0001, Francis B. S. Lee, L. Chen An Auto-Adaptive Dead Reckoning Algorithm for Distributed Interactive Simulation. Search on Bibsonomy Workshop on Parallel and Distributed Simulation The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Interactive Simulation (DIS), Relevance Filtering, Area of Interest (AOI), Sensitive Region (SR), Multi-level Threshold, Adaptive Algorithm, Dead Reckoning, Extrapolation
28Kristoffer Arnsfelt Hansen, Vladimir V. Podolskii Exact Threshold Circuits. Search on Bibsonomy CCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Exact Threshold Functions, Boolean Circuits, Threshold Functions
28Rakesh K. Sinha, Jayram S. Thathachar Efficient Oblivious Branching Programs for Threshold Functions Search on Bibsonomy FOCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF oblivious branching programs, rectifier-switching network, upper bound, branching programs, threshold functions, threshold function
28Alexander Thomasian, Victor F. Nicola Performance Evaluation of a Threshold Policy for Scheduling Readers and Writers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1993 DBLP  DOI  BibTeX  RDF multiserver system, threshold fastest emptying, vacationing server model, simulation, scheduling, scheduling, performance evaluation, parallel processing, concurrency control, Markov processes, queueing theory, readers, Markovian model, closed-form expressions, writers, threshold policy
28Jaikumar Radhakrishnan Better Bounds for Threshold Formulas Search on Bibsonomy FOCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF stronger monotone contact networks model, better bounds, nearly optimal bounds, threshold formulas, monotone formula, computation, threshold functions
28Andrew Chi-Chih Yao On ACC and Threshold Circuits Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF ACC, two-level circuits, symmetric-function gate, depth-3 threshold circuits, language, computing power, threshold circuits, AND gates
28Johan Håstad, Mikael Goldmann On the Power of Small-Depth Threshold Circuits Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF monotone weighted threshold circuit, small-depth threshold circuits, bottom fan-in, AND, OR circuits, functions, monotone functions
28Eric Allender A Note on the Power of Threshold Circuits Search on Bibsonomy FOCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF unbounded-fan-in circuits, depth-three threshold circuits, polynomial hierarchy, threshold circuits, AND gates, OR gates
28Peng Jiang, Qingbo Huang, Yaguang Kong, Li Chai 0001 Research on a Denoising Method Based on Wavelet Packet Shrinkage for Pulp. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wavelet packet shrinkage, pulp thickness, threshold, threshold function
28Maria J. Avedillo, José M. Quintana, Hamid El Alami, Antonio Jiménez-Calderón A Practical Parallel Architecture for Stacks Filters. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stack filters, threshold decomposition, threshold logic, non-linear filters
28Christian Cachin, Klaus Kursawe, Victor Shoup Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). Search on Bibsonomy PODC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF asynchronous consensus, crytographic common coin, dual-threshold schemes, Byzantine faults, threshold signatures
28Edith Cohen Learning Noisy Perceptrons by a Perceptron in Polynomial Time. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF noisy perceptron learning, linear threshold functions, labeled examples, random classification noise, PAC learnable, linear thresholds, single threshold function, machine learning, polynomial time, learning by example, hypothesis
28Igor Tatarinov, Alex Rousskov, Valery Soloviev Static caching in Web servers. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF implementation complexity an, static caching, cache policies, LRU-threshold, LFU, LRU-SIZE, LRU-MIN, LRU-k-threshold, Pitkow/Recker policy, Web document access patterns, request log file, small cache sizes, primary Web servers, CPU overhead, performance analysis, cache performance, log files, online front-ends
28Tsutomu Sasao, Jon T. Butler Planar Multiple-Valued Decision Diagrams. Search on Bibsonomy ISMVL The full citation details ... 1995 DBLP  DOI  BibTeX  RDF planar multiple-valued decision diagrams, monotone increasing functions, binary functions, field programmable gate arrays, programmable logic arrays, multivalued logic circuits, threshold logic, symmetric functions, threshold functions
26Nikhil Tripathi, Amit M. Bhosle, Debasis Samanta, Ajit Pal Optimal Assignment of High Threshold Voltage for Synthesizing Dual Threshold CMOS Circuits. Search on Bibsonomy VLSI Design The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Yuanqiang Huang, Yongjian Wang, Yinan Ren, Bingheng Yan, Zhongzhi Luan, Depei Qian Reducing Communication Overhead in Threshold Monitoring with Arithmetic Aggregation. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Kei Uchizawa, Takao Nishizeki, Eiji Takimoto Energy Complexity and Depth of Threshold Circuits. Search on Bibsonomy FCT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park Fair Threshold Decryption with Semi-Trusted Third Parties. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Abdourrahmane M. Atto, Dominique Pastor, Grégoire Mercier Detection threshold for non-parametric estimation. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sparse transform, Non-parametric detection, Wavelet transform, Soft thresholding, Non-parametric estimation
26Maurice Herlihy, Flavio Paiva Junqueira, Keith Marzullo, Lucia Draque Penso Optimizing Threshold Protocols in Adversarial Structures. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yongqiang Zhang 0001, Lili Wu, Jianguang Zhao A New Threshold Method Exploration about Wavelet De-noising. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Rocco A. Servedio Every Linear Threshold Function has a Low-Weight Approximator. Search on Bibsonomy Comput. Complex. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Subject classification. 06E30, 52C07, 52C35, 68Q15, 68Q32
26Kei Uchizawa, Eiji Takimoto An Exponential Lower Bound on the Size of Constant-Depth Threshold Circuits with Small Energy Complexity. Search on Bibsonomy CCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jonathan Bentwich The duality principle: irreducibility of sub-threshold psychophysical computation to neuronal brain activation. Search on Bibsonomy Synth. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Materialistic reductionism, Duality principle, Body-mind, Binding problem, Computation, Psychophysics, Neuroscience
26B. Chung, J. B. Kuo Gate-Level Dual-Threshold Static Power Optimization Methodology (GDSPOM) Using Path-Based Static Timing Analysis (STA) Technique. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Masakazu Hioki, Takashi Kawanami, Toshiyuki Tsutsumi, Tadashi Nakagawa, Toshihiro Sekigawa, Hanpei Koike Evaluation of granularity on threshold voltage control in flex power FPGA. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ben Reichardt Fault-Tolerance Threshold for a Distance-Three Quantum Code. Search on Bibsonomy ICALP (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai A Proactive Secret Sharing for Server Assisted Threshold Signatures. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fault tolerant and Distributed Computing, Secret sharing
26Qingwu Li, Chunyuan He Application of Wavelet Threshold to Image De-noising. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yumiko Kimura, Daishi Watabe, Hideyashu Sai, Osamu Nakamura New Threshold Setting Method for the Extraction of Facial Areas and the Recognition of Facial Expressions. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Johannes Aßfalg, Hans-Peter Kriegel, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz TQuEST: Threshold Query Execution for Large Sets of Time Series. Search on Bibsonomy EDBT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ning Hu, Deyun Zhang, Fubao Wang Dynamic Threshold Scheme Used in Directed Diffusion. Search on Bibsonomy ICESS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Zuowen Tan, Zhuojun Liu, Mingsheng Wang On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee A Simplified Approach to User Controllable Threshold Signatures. Search on Bibsonomy CEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Yuvraj Singh Dhillon, Abdulkadir Utku Diril, Abhijit Chatterjee, Hsien-Hsin S. Lee Algorithm for Achieving Minimum Energy Consumption in CMOS Circuits Using Multiple Supply and Threshold Voltages at the Module Level. Search on Bibsonomy ICCAD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Chan-Gun Lee, Aloysius K. Mok, Prabhudev Konana Monitoring of Timing Constraints with Confidence Threshold Requirements. Search on Bibsonomy RTSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Marius Padure, Sorin Cotofana, Stamatis Vassiliadis Design and experimental results of a CMOS flip-flop featuring embedded threshold logic. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Xiaohong Yuan, Mohammad Ilyas Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Yih Huang, David Rine, Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Liqiong Wei, Zhanping Chen, Kaushik Roy 0001, Mark C. Johnson, Yibin Ye, Vivek De Design and optimization of dual-threshold circuits for low-voltage low-power applications. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Liqiong Wei, Zhanping Chen, Mark Johnson, Kaushik Roy 0001, Vivek De Design and Optimization of Low Voltage High Performance Dual Threshold CMOS Circuits. Search on Bibsonomy DAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF low power, synthesis, placement, flip-flops, voltage scaling, codec, MPEG4, level converters, design automatian
26Yenjo Han, Lane A. Hemaspaandra, Thomas Thierauf Threshold Computation and Cryptographic Security. Search on Bibsonomy ISAAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
26Karla Taboada, Kaoru Shimada, Shingo Mabu, Kotaro Hirasawa, Jinglu Hu Association rule mining for continuous attributes using genetic network programming. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF association rules mining, genetic network programming, continuous attributes
26Prakash Kolan, Ram Vaithilingam, Ram Dantu Automatic Calibration Using Receiver Operating Characteristics Curves. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Padmavathi Mundur, Arun K. Sood, Robert Simon Class-based access control for distributed video-on-demand systems. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Maria J. Avedillo, José M. Quintana, Héctor Pettenghi Logic Models Supporting the Design of MOBILE-based RTD Circuits. Search on Bibsonomy ASAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Secure commercial applications, Access Control, Authorization, Distributed system security
26Yang Wang 0008, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Zbigniew M. Wójcik Solving the Localization-Detection Trade-Off In Shadow Recognition Problem Using Rough Sets. Search on Bibsonomy Rough Sets and Current Trends in Computing The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26G. R. Blakley, Catherine Meadows 0001 Security of Ramp Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
26J. Gary Augustson, Jack Minker An Analysis of Some Graph Theoretical Cluster Techniques. Search on Bibsonomy J. ACM The full citation details ... 1970 DBLP  DOI  BibTeX  RDF
25Yuval Emek, Amos Korman Efficient threshold detection in a distributed environment: extended abstract. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threshold detection, transmission complexity, message complexity
25Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne P. Burleson Low-power sub-threshold design of secure physical unclonable functions. Search on Bibsonomy ISLPED The full citation details ... 2010 DBLP  DOI  BibTeX  RDF embedded system security, sub-threshold circuits, RFID, physical unclonable function
25Bin Yang 0002, Hua Lu 0001, Christian S. Jensen Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF indoor moving objects, probabilistic threshold k nearest neighbor queries, symbolic indoor space, uncertainty
25Jinhui Wang, Lei Zuo, Na Gong, Daming Gao, Shuqin Geng, Wang Zhang, Ligang Hou, Xiaohong Peng, Wuchen Wu Estimation for Speed and Leakage Power of Dual Threshold Domino OR Based on Wavelet Neural Networks. Search on Bibsonomy ISNN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dual threshold domino OR, Leakage power, Speed, Wavelet Neural Networks
25Markus Behle On threshold BDDs and the optimal variable ordering problem. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold BDD, 0/1 integer programming, Optimal variable ordering, Variable ordering spectrum, Binary decision diagram, Knapsack
25William W. Gaver, Andy Boucher 0002, Andy Law, Sarah Pennington, John Bowers 0001, Jacob Beaver, Jan Humble, Tobie Kerridge, Nicolas Villar, Alex Wilkie Threshold devices: looking out from the home. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold devices, ubiquitous computing, home
25Hiroyuki Yamahara, Fumiko Harada, Hideyuki Takada, Hiromitsu Shimakawa Personalizing Threshold Values on Behavior Detection with Collaborative Filtering. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context, threshold, behavior, proactive, ambient
25Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Multi Authority ABE, Without a central authority
25Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
25Kamer Kaya, Ali Aydin Selçuk Robust Threshold Schemes Based on the Chinese Remainder Theorem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal
25Yun Ye, Frank Liu 0001, Sani R. Nassif, Yu Cao 0001 Statistical modeling and simulation of threshold variation under dopant fluctuations and line-edge roughness. Search on Bibsonomy DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF atomistic simulations, line-edge roughness, non-rectangular gate, random dopant fluctuations, threshold variation, predictive modeling, SPICE simulation
25Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai An Efficient Threshold Multi-group-Secret Sharing Scheme. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold
25Bo Zhai, Ronald G. Dreslinski, David T. Blaauw, Trevor N. Mudge, Dennis Sylvester Energy efficient near-threshold chip multi-processing. Search on Bibsonomy ISLPED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF near-threshold, energy efficient, CMP, subthreshold
25Xiangxue Li, Dong Zheng 0001, Kefei Chen Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. Search on Bibsonomy ICA3PP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature
25Dimitri Efrosinin, Lothar Breuer Threshold policies for controlled retrial queues with heterogeneous servers. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Retrial queueing system, Controllable queueing systems, Monotonicity of optimal policies, Threshold levels, Optimal Control, Numerical analysis, MAP, PH
25Hiroki Koga, Etsuyo Ueda Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing
25Chin-Chen Chang 0001, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group-oriented signature, (t, n) threshold signature, replay attack, message recovery, data linkage
25Zhihua Cui, Jianchao Zeng 0001, Guoji Sun Adaptive Velocity Threshold Particle Swarm Optimization. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF velocity threshold, evolution programming, Particle swarm optimization
25Zhiyu Liu, Volkan Kursun Robust Dynamic Node Low Voltage Swing Domino Logic with Multiple Threshold Voltages. Search on Bibsonomy ISQED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low Voltage Swing, Gate Oxide Leakage, Domino Logic, Subthreshold Leakage, Dual Threshold Voltage
25Hossein Ghodosi, Josef Pieprzyk An Ideal and Robust Threshold RSA. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold RSA, Robust Systems, Ideal Secret Sharing Schemes
25Dessislava Nikolova, Benny Van Houdt, Chris Blondia Dynamic Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks with Threshold Reporting. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ethernet passive optical network (EPON), threshold reporting, dynamic bandwidth allocation
25David Rousseau, François Chapeau-Blondeau Neuronal Signal Transduction Aided by Noise at Threshold and at Saturation. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF neuronal transmission, noise, threshold, saturation, stochastic resonance
25Steve Ferrera, Nicholas P. Carter A magnetoelectronic macrocell employing reconfigurable threshold logic. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PLA/CPLD, magnetoelectronic circuits, wired-and logic, threshold logic, lookup table, non-volatility
25Seungjoo Kim, Dongho Won Threshold Entrusted Undeniable Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Entrusted undeniable signature, Undeniable signature, Threshold signature
25Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Signature Scheme from the Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack
25Adrian Vasilache, Jie Li 0002, Hisao Kameda Threshold-Based Load Balancing for Multiple Home Agents in Mobile IP Networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multiple home agents, load balancing, mobile networking, mobile IP, threshold
25Mingyan Li, Radha Poovendran Broadcast Enforced Threshold Schemes with Disenrollment. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold schemes with disenrollment, entropy, secret sharing
25Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng A Threshold GQ Signature Scheme. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold signature scheme, GQ signature scheme
25Valeriu Beiu Constructive Threshold Logic Addition A Synopsis of the Last Decade. Search on Bibsonomy ICANN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF circuit/VLSI complexity, addition, Threshold logic
25Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cheating Detection and Identification, Secret Sharing, Threshold Schemes
25Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from Orthogonal Arrays. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Orthogonal Arrays, Nonlinear Functions, Threshold Secret Sharing, Cheating Detection
25Luigi Romano, Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Threshold mechanisms, Diagnosis, COTS, Legacy systems, Distributed architectures
25Pierre-Alain Fouque, Jacques Stern Fully Distributed Threshold RSA under Standard Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold RSA key generation and signature
25Zi-Chen Li, Jun-Mei Zhang, Jun Luo, William Song, Yi-Qi Dai Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers. Search on Bibsonomy ISEC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold digital signature, Information security, Traceable
25Takao Waho, Kazufumi Hattori, Kouji Honda Novel Resonant-Tunneling Multiple-Threshold Logic Circuit Based on Switching Sequence Detection. Search on Bibsonomy ISMVL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multiple-threshold, analog-to-digital converter, Resonant-tunneling diode
25Frank Yeong-Chyang Shih, Owen Robert Mitchell Threshold Decomposition of Gray-Scale Morphology into Binary Morphology. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF gray-scale morphology, binary morphology, multiple binary signals, threshold decomposition architecture, parallel processing, VLSI, VLSI, parallel architectures, computerised picture processing, computerised picture processing, stacking, digital signal processing chips, logic gates
25Zhi-Hua Zhou, Xu-Ying Liu Training Cost-Sensitive Neural Networks with Methods Addressing the Class Imbalance Problem. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF threshold-moving, data mining, neural networks, Machine learning, sampling, ensemble learning, cost-sensitive learning, class imbalance learning
25Nikhil Jayakumar, Rajesh Garg, Bruce Gamache, Sunil P. Khatri A PLA based asynchronous micropipelining approach for subthreshold circuit design. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF micro-pipelining, asynchronous, PLA, sub-threshold
25Lyes Khoukhi, Soumaya Cherkaoui FuzzyCCG: a fuzzy logic QoS approach for congestiosn control in wireless ad hoc networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF threshold management, QoS, fuzzy logic, congestion control, wireless mobile ad hoc networks
25Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
25Akio Nishikawa, Masayuki Yamamura, Masami Hagiya DNA computation simulator based on abstract bases. Search on Bibsonomy Soft Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold approach, Stochastic approach, Fitting parameters using genetic algorithms, Simulation, DNA computing
25Wen-Guey Tzeng, Zhi-Jia Tzeng Robust Forward-Secure Signature Schemes with Proactive Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF signature, threshold, forward security, proactive
25Felip Manyà, Ramón Béjar, Gonzalo Escalada-Imaz The satisfiability problem in regular CNF-formulas. Search on Bibsonomy Soft Comput. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Multiple-valued regular CNF-formulas, benchmarks, threshold, satisfiability problem
25Silke Kreitz, Andreas Hess 0001, T.-H. Anderson Direct enumeration and size classification of soil bacteria using confocal laser scanning microscopy and image analysis. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF soil, optical microscopy, cellular biophysics, biological techniques, measurement by laser beam, size classification, soil bacteria, bacteria enumeration, confocal laser scanning microscopy, microbiology, sharpening filter, background correction, area measurement, background particles elimination, automatic image analysis, biological research technique, image processing, biology computing, threshold selection
25Sylvain Lauzac, Taieb Znati Comparative evaluation of cooperative plan execution strategies in multiagent environments. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cooperative plan execution strategies, multiagent environments, coordinated action, dynamically changing environment, dynamic threshold-based scheme, client-initiated strategy, server-initiated strategy, hybrid strategy, load balancing, resource allocation, planning (artificial intelligence), client-server systems, cooperative systems, communication overhead, comparative analysis, distributed agents
24Christian Cachin, Klaus Kursawe, Victor Shoup Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Asynchronous consensus, Cryptographic common coin, Dual-threshold schemes, Byzantine faults, Threshold signatures
Displaying result #201 - #300 of 17373 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license