|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6784 occurrences of 3457 keywords
|
|
|
Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Vassilis P. Plagianakos, George D. Magoulas, Michael N. Vrahatis |
Evolutionary training of hardware realizable multilayer perceptrons. |
Neural Comput. Appl. |
2006 |
DBLP DOI BibTeX RDF |
Neural networks with threshold activations, Integer weight neural networks, Integer programming, Differential evolution, Feedforward neural networks, Unconstrained optimization, Backpropagation algorithm, Steepest descent |
29 | Punam K. Saha, Jayaram K. Udupa |
Optimum Image Thresholding via Class Uncertainty and Region Homogeneity. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2001 |
DBLP DOI BibTeX RDF |
threshold energy, segmented image information, Image segmentation, uncertainty, scale, thresholding, homogeneity |
29 | Wentong Cai 0001, Francis B. S. Lee, L. Chen |
An Auto-Adaptive Dead Reckoning Algorithm for Distributed Interactive Simulation. |
Workshop on Parallel and Distributed Simulation |
1999 |
DBLP DOI BibTeX RDF |
Distributed Interactive Simulation (DIS), Relevance Filtering, Area of Interest (AOI), Sensitive Region (SR), Multi-level Threshold, Adaptive Algorithm, Dead Reckoning, Extrapolation |
28 | Kristoffer Arnsfelt Hansen, Vladimir V. Podolskii |
Exact Threshold Circuits. |
CCC |
2010 |
DBLP DOI BibTeX RDF |
Exact Threshold Functions, Boolean Circuits, Threshold Functions |
28 | Rakesh K. Sinha, Jayram S. Thathachar |
Efficient Oblivious Branching Programs for Threshold Functions |
FOCS |
1994 |
DBLP DOI BibTeX RDF |
oblivious branching programs, rectifier-switching network, upper bound, branching programs, threshold functions, threshold function |
28 | Alexander Thomasian, Victor F. Nicola |
Performance Evaluation of a Threshold Policy for Scheduling Readers and Writers. |
IEEE Trans. Computers |
1993 |
DBLP DOI BibTeX RDF |
multiserver system, threshold fastest emptying, vacationing server model, simulation, scheduling, scheduling, performance evaluation, parallel processing, concurrency control, Markov processes, queueing theory, readers, Markovian model, closed-form expressions, writers, threshold policy |
28 | Jaikumar Radhakrishnan |
Better Bounds for Threshold Formulas |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
stronger monotone contact networks model, better bounds, nearly optimal bounds, threshold formulas, monotone formula, computation, threshold functions |
28 | Andrew Chi-Chih Yao |
On ACC and Threshold Circuits |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
ACC, two-level circuits, symmetric-function gate, depth-3 threshold circuits, language, computing power, threshold circuits, AND gates |
28 | Johan Håstad, Mikael Goldmann |
On the Power of Small-Depth Threshold Circuits |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
monotone weighted threshold circuit, small-depth threshold circuits, bottom fan-in, AND, OR circuits, functions, monotone functions |
28 | Eric Allender |
A Note on the Power of Threshold Circuits |
FOCS |
1989 |
DBLP DOI BibTeX RDF |
unbounded-fan-in circuits, depth-three threshold circuits, polynomial hierarchy, threshold circuits, AND gates, OR gates |
28 | Peng Jiang, Qingbo Huang, Yaguang Kong, Li Chai 0001 |
Research on a Denoising Method Based on Wavelet Packet Shrinkage for Pulp. |
IMSCCS (1) |
2006 |
DBLP DOI BibTeX RDF |
wavelet packet shrinkage, pulp thickness, threshold, threshold function |
28 | Maria J. Avedillo, José M. Quintana, Hamid El Alami, Antonio Jiménez-Calderón |
A Practical Parallel Architecture for Stacks Filters. |
J. VLSI Signal Process. |
2004 |
DBLP DOI BibTeX RDF |
stack filters, threshold decomposition, threshold logic, non-linear filters |
28 | Christian Cachin, Klaus Kursawe, Victor Shoup |
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). |
PODC |
2000 |
DBLP DOI BibTeX RDF |
asynchronous consensus, crytographic common coin, dual-threshold schemes, Byzantine faults, threshold signatures |
28 | Edith Cohen |
Learning Noisy Perceptrons by a Perceptron in Polynomial Time. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
noisy perceptron learning, linear threshold functions, labeled examples, random classification noise, PAC learnable, linear thresholds, single threshold function, machine learning, polynomial time, learning by example, hypothesis |
28 | Igor Tatarinov, Alex Rousskov, Valery Soloviev |
Static caching in Web servers. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
implementation complexity an, static caching, cache policies, LRU-threshold, LFU, LRU-SIZE, LRU-MIN, LRU-k-threshold, Pitkow/Recker policy, Web document access patterns, request log file, small cache sizes, primary Web servers, CPU overhead, performance analysis, cache performance, log files, online front-ends |
28 | Tsutomu Sasao, Jon T. Butler |
Planar Multiple-Valued Decision Diagrams. |
ISMVL |
1995 |
DBLP DOI BibTeX RDF |
planar multiple-valued decision diagrams, monotone increasing functions, binary functions, field programmable gate arrays, programmable logic arrays, multivalued logic circuits, threshold logic, symmetric functions, threshold functions |
26 | Nikhil Tripathi, Amit M. Bhosle, Debasis Samanta, Ajit Pal |
Optimal Assignment of High Threshold Voltage for Synthesizing Dual Threshold CMOS Circuits. |
VLSI Design |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Yuanqiang Huang, Yongjian Wang, Yinan Ren, Bingheng Yan, Zhongzhi Luan, Depei Qian |
Reducing Communication Overhead in Threshold Monitoring with Arithmetic Aggregation. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Kei Uchizawa, Takao Nishizeki, Eiji Takimoto |
Energy Complexity and Depth of Threshold Circuits. |
FCT |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park |
Fair Threshold Decryption with Semi-Trusted Third Parties. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Abdourrahmane M. Atto, Dominique Pastor, Grégoire Mercier |
Detection threshold for non-parametric estimation. |
Signal Image Video Process. |
2008 |
DBLP DOI BibTeX RDF |
Sparse transform, Non-parametric detection, Wavelet transform, Soft thresholding, Non-parametric estimation |
26 | Maurice Herlihy, Flavio Paiva Junqueira, Keith Marzullo, Lucia Draque Penso |
Optimizing Threshold Protocols in Adversarial Structures. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yongqiang Zhang 0001, Lili Wu, Jianguang Zhao |
A New Threshold Method Exploration about Wavelet De-noising. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Rocco A. Servedio |
Every Linear Threshold Function has a Low-Weight Approximator. |
Comput. Complex. |
2007 |
DBLP DOI BibTeX RDF |
Subject classification. 06E30, 52C07, 52C35, 68Q15, 68Q32 |
26 | Kei Uchizawa, Eiji Takimoto |
An Exponential Lower Bound on the Size of Constant-Depth Threshold Circuits with Small Energy Complexity. |
CCC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan Bentwich |
The duality principle: irreducibility of sub-threshold psychophysical computation to neuronal brain activation. |
Synth. |
2006 |
DBLP DOI BibTeX RDF |
Materialistic reductionism, Duality principle, Body-mind, Binding problem, Computation, Psychophysics, Neuroscience |
26 | B. Chung, J. B. Kuo |
Gate-Level Dual-Threshold Static Power Optimization Methodology (GDSPOM) Using Path-Based Static Timing Analysis (STA) Technique. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Masakazu Hioki, Takashi Kawanami, Toshiyuki Tsutsumi, Tadashi Nakagawa, Toshihiro Sekigawa, Hanpei Koike |
Evaluation of granularity on threshold voltage control in flex power FPGA. |
FPGA |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ben Reichardt |
Fault-Tolerance Threshold for a Distance-Three Quantum Code. |
ICALP (1) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai |
A Proactive Secret Sharing for Server Assisted Threshold Signatures. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
Fault tolerant and Distributed Computing, Secret sharing |
26 | Qingwu Li, Chunyuan He |
Application of Wavelet Threshold to Image De-noising. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yumiko Kimura, Daishi Watabe, Hideyashu Sai, Osamu Nakamura |
New Threshold Setting Method for the Extraction of Facial Areas and the Recognition of Facial Expressions. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Johannes Aßfalg, Hans-Peter Kriegel, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz |
TQuEST: Threshold Query Execution for Large Sets of Time Series. |
EDBT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ning Hu, Deyun Zhang, Fubao Wang |
Dynamic Threshold Scheme Used in Directed Diffusion. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee |
A Simplified Approach to User Controllable Threshold Signatures. |
CEC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Yuvraj Singh Dhillon, Abdulkadir Utku Diril, Abhijit Chatterjee, Hsien-Hsin S. Lee |
Algorithm for Achieving Minimum Energy Consumption in CMOS Circuits Using Multiple Supply and Threshold Voltages at the Module Level. |
ICCAD |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Chan-Gun Lee, Aloysius K. Mok, Prabhudev Konana |
Monitoring of Timing Constraints with Confidence Threshold Requirements. |
RTSS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Marius Padure, Sorin Cotofana, Stamatis Vassiliadis |
Design and experimental results of a CMOS flip-flop featuring embedded threshold logic. |
ISCAS (5) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Xiaohong Yuan, Mohammad Ilyas |
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Yih Huang, David Rine, Xunhua Wang |
A JCA-Based Implementation Framework for Threshold Cryptography. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Liqiong Wei, Zhanping Chen, Kaushik Roy 0001, Mark C. Johnson, Yibin Ye, Vivek De |
Design and optimization of dual-threshold circuits for low-voltage low-power applications. |
IEEE Trans. Very Large Scale Integr. Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Liqiong Wei, Zhanping Chen, Mark Johnson, Kaushik Roy 0001, Vivek De |
Design and Optimization of Low Voltage High Performance Dual Threshold CMOS Circuits. |
DAC |
1998 |
DBLP DOI BibTeX RDF |
low power, synthesis, placement, flip-flops, voltage scaling, codec, MPEG4, level converters, design automatian |
26 | Yenjo Han, Lane A. Hemaspaandra, Thomas Thierauf |
Threshold Computation and Cryptographic Security. |
ISAAC |
1993 |
DBLP DOI BibTeX RDF |
|
26 | David Chaum |
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
26 | Karla Taboada, Kaoru Shimada, Shingo Mabu, Kotaro Hirasawa, Jinglu Hu |
Association rule mining for continuous attributes using genetic network programming. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
association rules mining, genetic network programming, continuous attributes |
26 | Prakash Kolan, Ram Vaithilingam, Ram Dantu |
Automatic Calibration Using Receiver Operating Characteristics Curves. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Padmavathi Mundur, Arun K. Sood, Robert Simon |
Class-based access control for distributed video-on-demand systems. |
IEEE Trans. Circuits Syst. Video Technol. |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Maria J. Avedillo, José M. Quintana, Héctor Pettenghi |
Logic Models Supporting the Design of MOBILE-based RTD Circuits. |
ASAP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Secure commercial applications, Access Control, Authorization, Distributed system security |
26 | Yang Wang 0008, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos |
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Zbigniew M. Wójcik |
Solving the Localization-Detection Trade-Off In Shadow Recognition Problem Using Rough Sets. |
Rough Sets and Current Trends in Computing |
2000 |
DBLP DOI BibTeX RDF |
|
26 | G. R. Blakley, Catherine Meadows 0001 |
Security of Ramp Schemes. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
26 | J. Gary Augustson, Jack Minker |
An Analysis of Some Graph Theoretical Cluster Techniques. |
J. ACM |
1970 |
DBLP DOI BibTeX RDF |
|
25 | Yuval Emek, Amos Korman |
Efficient threshold detection in a distributed environment: extended abstract. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
threshold detection, transmission complexity, message complexity |
25 | Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne P. Burleson |
Low-power sub-threshold design of secure physical unclonable functions. |
ISLPED |
2010 |
DBLP DOI BibTeX RDF |
embedded system security, sub-threshold circuits, RFID, physical unclonable function |
25 | Bin Yang 0002, Hua Lu 0001, Christian S. Jensen |
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
indoor moving objects, probabilistic threshold k nearest neighbor queries, symbolic indoor space, uncertainty |
25 | Jinhui Wang, Lei Zuo, Na Gong, Daming Gao, Shuqin Geng, Wang Zhang, Ligang Hou, Xiaohong Peng, Wuchen Wu |
Estimation for Speed and Leakage Power of Dual Threshold Domino OR Based on Wavelet Neural Networks. |
ISNN (1) |
2009 |
DBLP DOI BibTeX RDF |
Dual threshold domino OR, Leakage power, Speed, Wavelet Neural Networks |
25 | Markus Behle |
On threshold BDDs and the optimal variable ordering problem. |
J. Comb. Optim. |
2008 |
DBLP DOI BibTeX RDF |
Threshold BDD, 0/1 integer programming, Optimal variable ordering, Variable ordering spectrum, Binary decision diagram, Knapsack |
25 | William W. Gaver, Andy Boucher 0002, Andy Law, Sarah Pennington, John Bowers 0001, Jacob Beaver, Jan Humble, Tobie Kerridge, Nicolas Villar, Alex Wilkie |
Threshold devices: looking out from the home. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
threshold devices, ubiquitous computing, home |
25 | Hiroyuki Yamahara, Fumiko Harada, Hideyuki Takada, Hiromitsu Shimakawa |
Personalizing Threshold Values on Behavior Detection with Collaborative Filtering. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
context, threshold, behavior, proactive, ambient |
25 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Threshold Multi Authority ABE, Without a central authority |
25 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
25 | Kamer Kaya, Ali Aydin Selçuk |
Robust Threshold Schemes Based on the Chinese Remainder Theorem. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal |
25 | Yun Ye, Frank Liu 0001, Sani R. Nassif, Yu Cao 0001 |
Statistical modeling and simulation of threshold variation under dopant fluctuations and line-edge roughness. |
DAC |
2008 |
DBLP DOI BibTeX RDF |
atomistic simulations, line-edge roughness, non-rectangular gate, random dopant fluctuations, threshold variation, predictive modeling, SPICE simulation |
25 | Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai |
An Efficient Threshold Multi-group-Secret Sharing Scheme. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold |
25 | Bo Zhai, Ronald G. Dreslinski, David T. Blaauw, Trevor N. Mudge, Dennis Sylvester |
Energy efficient near-threshold chip multi-processing. |
ISLPED |
2007 |
DBLP DOI BibTeX RDF |
near-threshold, energy efficient, CMP, subthreshold |
25 | Xiangxue Li, Dong Zheng 0001, Kefei Chen |
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. |
ICA3PP |
2007 |
DBLP DOI BibTeX RDF |
characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature |
25 | Dimitri Efrosinin, Lothar Breuer |
Threshold policies for controlled retrial queues with heterogeneous servers. |
Ann. Oper. Res. |
2006 |
DBLP DOI BibTeX RDF |
Retrial queueing system, Controllable queueing systems, Monotonicity of optimal policies, Threshold levels, Optimal Control, Numerical analysis, MAP, PH |
25 | Hiroki Koga, Etsuyo Ueda |
Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing |
25 | Chin-Chen Chang 0001, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang |
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
Group-oriented signature, (t, n) threshold signature, replay attack, message recovery, data linkage |
25 | Zhihua Cui, Jianchao Zeng 0001, Guoji Sun |
Adaptive Velocity Threshold Particle Swarm Optimization. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
velocity threshold, evolution programming, Particle swarm optimization |
25 | Zhiyu Liu, Volkan Kursun |
Robust Dynamic Node Low Voltage Swing Domino Logic with Multiple Threshold Voltages. |
ISQED |
2006 |
DBLP DOI BibTeX RDF |
Low Voltage Swing, Gate Oxide Leakage, Domino Logic, Subthreshold Leakage, Dual Threshold Voltage |
25 | Hossein Ghodosi, Josef Pieprzyk |
An Ideal and Robust Threshold RSA. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Threshold RSA, Robust Systems, Ideal Secret Sharing Schemes |
25 | Dessislava Nikolova, Benny Van Houdt, Chris Blondia |
Dynamic Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks with Threshold Reporting. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Ethernet passive optical network (EPON), threshold reporting, dynamic bandwidth allocation |
25 | David Rousseau, François Chapeau-Blondeau |
Neuronal Signal Transduction Aided by Noise at Threshold and at Saturation. |
Neural Process. Lett. |
2004 |
DBLP DOI BibTeX RDF |
neuronal transmission, noise, threshold, saturation, stochastic resonance |
25 | Steve Ferrera, Nicholas P. Carter |
A magnetoelectronic macrocell employing reconfigurable threshold logic. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
PLA/CPLD, magnetoelectronic circuits, wired-and logic, threshold logic, lookup table, non-volatility |
25 | Seungjoo Kim, Dongho Won |
Threshold Entrusted Undeniable Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Entrusted undeniable signature, Undeniable signature, Threshold signature |
25 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack |
25 | Adrian Vasilache, Jie Li 0002, Hisao Kameda |
Threshold-Based Load Balancing for Multiple Home Agents in Mobile IP Networks. |
Telecommun. Syst. |
2003 |
DBLP DOI BibTeX RDF |
multiple home agents, load balancing, mobile networking, mobile IP, threshold |
25 | Mingyan Li, Radha Poovendran |
Broadcast Enforced Threshold Schemes with Disenrollment. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
threshold schemes with disenrollment, entropy, secret sharing |
25 | Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng |
A Threshold GQ Signature Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
threshold signature scheme, GQ signature scheme |
25 | Valeriu Beiu |
Constructive Threshold Logic Addition A Synopsis of the Last Decade. |
ICANN |
2003 |
DBLP DOI BibTeX RDF |
circuit/VLSI complexity, addition, Threshold logic |
25 | Josef Pieprzyk, Xian-Mo Zhang |
Ideal Threshold Schemes from MDS Codes. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Cheating Detection and Identification, Secret Sharing, Threshold Schemes |
25 | Josef Pieprzyk, Xian-Mo Zhang |
Ideal Threshold Schemes from Orthogonal Arrays. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Orthogonal Arrays, Nonlinear Functions, Threshold Secret Sharing, Cheating Detection |
25 | Luigi Romano, Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo |
Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications. |
SRDS |
2002 |
DBLP DOI BibTeX RDF |
Threshold mechanisms, Diagnosis, COTS, Legacy systems, Distributed architectures |
25 | Pierre-Alain Fouque, Jacques Stern |
Fully Distributed Threshold RSA under Standard Assumptions. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Threshold RSA key generation and signature |
25 | Zi-Chen Li, Jun-Mei Zhang, Jun Luo, William Song, Yi-Qi Dai |
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers. |
ISEC |
2001 |
DBLP DOI BibTeX RDF |
Threshold digital signature, Information security, Traceable |
25 | Takao Waho, Kazufumi Hattori, Kouji Honda |
Novel Resonant-Tunneling Multiple-Threshold Logic Circuit Based on Switching Sequence Detection. |
ISMVL |
2000 |
DBLP DOI BibTeX RDF |
Multiple-threshold, analog-to-digital converter, Resonant-tunneling diode |
25 | Frank Yeong-Chyang Shih, Owen Robert Mitchell |
Threshold Decomposition of Gray-Scale Morphology into Binary Morphology. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1989 |
DBLP DOI BibTeX RDF |
gray-scale morphology, binary morphology, multiple binary signals, threshold decomposition architecture, parallel processing, VLSI, VLSI, parallel architectures, computerised picture processing, computerised picture processing, stacking, digital signal processing chips, logic gates |
25 | Zhi-Hua Zhou, Xu-Ying Liu |
Training Cost-Sensitive Neural Networks with Methods Addressing the Class Imbalance Problem. |
IEEE Trans. Knowl. Data Eng. |
2006 |
DBLP DOI BibTeX RDF |
threshold-moving, data mining, neural networks, Machine learning, sampling, ensemble learning, cost-sensitive learning, class imbalance learning |
25 | Nikhil Jayakumar, Rajesh Garg, Bruce Gamache, Sunil P. Khatri |
A PLA based asynchronous micropipelining approach for subthreshold circuit design. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
micro-pipelining, asynchronous, PLA, sub-threshold |
25 | Lyes Khoukhi, Soumaya Cherkaoui |
FuzzyCCG: a fuzzy logic QoS approach for congestiosn control in wireless ad hoc networks. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
threshold management, QoS, fuzzy logic, congestion control, wireless mobile ad hoc networks |
25 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
25 | Akio Nishikawa, Masayuki Yamamura, Masami Hagiya |
DNA computation simulator based on abstract bases. |
Soft Comput. |
2001 |
DBLP DOI BibTeX RDF |
Threshold approach, Stochastic approach, Fitting parameters using genetic algorithms, Simulation, DNA computing |
25 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Robust Forward-Secure Signature Schemes with Proactive Security. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
signature, threshold, forward security, proactive |
25 | Felip Manyà, Ramón Béjar, Gonzalo Escalada-Imaz |
The satisfiability problem in regular CNF-formulas. |
Soft Comput. |
1998 |
DBLP DOI BibTeX RDF |
Multiple-valued regular CNF-formulas, benchmarks, threshold, satisfiability problem |
25 | Silke Kreitz, Andreas Hess 0001, T.-H. Anderson |
Direct enumeration and size classification of soil bacteria using confocal laser scanning microscopy and image analysis. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
soil, optical microscopy, cellular biophysics, biological techniques, measurement by laser beam, size classification, soil bacteria, bacteria enumeration, confocal laser scanning microscopy, microbiology, sharpening filter, background correction, area measurement, background particles elimination, automatic image analysis, biological research technique, image processing, biology computing, threshold selection |
25 | Sylvain Lauzac, Taieb Znati |
Comparative evaluation of cooperative plan execution strategies in multiagent environments. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
cooperative plan execution strategies, multiagent environments, coordinated action, dynamically changing environment, dynamic threshold-based scheme, client-initiated strategy, server-initiated strategy, hybrid strategy, load balancing, resource allocation, planning (artificial intelligence), client-server systems, cooperative systems, communication overhead, comparative analysis, distributed agents |
24 | Christian Cachin, Klaus Kursawe, Victor Shoup |
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Asynchronous consensus, Cryptographic common coin, Dual-threshold schemes, Byzantine faults, Threshold signatures |
Displaying result #201 - #300 of 17373 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|