Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Ying Chen 0014, Liang Lei, Zhi-Cheng Ji, Jian-Fen Sun |
Adaptive Wavelet Threshold for Image Denoising by Exploiting Inter-scale Dependency. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
wavelet transform, statistical modeling, image denoising, adaptive thresholding |
19 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Masayuki Kikuchi, Kazuaki Masuda |
Effect of figural perception on contrast detection threshold of colinear gabor patches. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Toshinori Araki |
Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Katsuhide Fujita, Takayuki Ito 0001 |
A Preliminary Analysis of Computational Complexity of the Threshold Adjusting Mechanism in Multi-issue Negotiations. |
Web Intelligence/IAT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ahmed Shebaita, Yehea I. Ismail |
Variable Threshold Voltage Design Scheme for CMOS Tapered Buffers. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Nizamettin Aydin |
DWT Based Adaptive Threshold Determination in Embolic Signal Detection. |
AHS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mini Nanua, David T. Blaauw |
Investigating Crosstalk in Sub-Threshold Circuits. |
ISQED |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Sorin Iftene, Manuela Grindei |
Weighted Threshold RSA Based on the Chinese Remainder Theorem. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Manish Dev Shrimali, Guoguang He, Sudeshna Sinha, Kazuyuki Aihara |
Control and Synchronization of Chaotic Neurons Under Threshold Activated Coupling. |
ICANN (1) |
2007 |
DBLP DOI BibTeX RDF |
Control and Synchronization, Chaotic dynamics |
19 | Hiroaki Inayoshi, Takio Kurita |
Binarizing Training Samples with Multi-threshold for Viola-Jones Face Detector. |
ICONIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ning Ma, Martin Bouchard 0001, Rafik A. Goubran |
Speech enhancement using a masking threshold constrained Kalman filter and its heuristic implementations. |
IEEE Trans. Speech Audio Process. |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Tartary, Huaxiong Wang |
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Aßfalg, Hans-Peter Kriegel, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz |
Threshold Similarity Queries in Large Time Series Databases. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jun Chen, Zheng Zhou |
Interference Resistant Adaptive Threshold Acquisition Algorithm for DS-UWB Systems. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Identity-Based Threshold Proxy Signature Scheme with Known Signers. |
TAMC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Cheoljoo Jeong, Steven M. Nowick |
Optimal Technology Mapping and Cell Merger for Asynchronous Threshold Networks. |
ASYNC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hae Young Lee, Tae Ho Cho |
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. |
MICAI |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jen-Ho Yang, Chin-Chen Chang 0001, Chih-Hung Wang |
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Kyong-Cheol Ko, Oh-Hyung Kang, Chang-Woo Lee, Ki-Hong Park, Yang-Won Rhee |
Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Roberto De Prisco, Alfredo De Santis |
Cheating Immune (2, n)-Threshold Visual Secret Sharing. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Shoji Hirano, Shusaku Tsumoto |
A Framework for Unsupervised Selection of Indiscernibility Threshold in Rough Clustering. |
RSCTC |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Rough Sets, Indiscernibility |
19 | Stefan Dobrev, Rastislav Kralovic, Richard Královic, Nicola Santoro |
On Fractional Dynamic Faults with Threshold. |
SIROCCO |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Rui Zhang, Niraj K. Jha |
State Encoding of Finite-State Machines Targeting Threshold and Majority Logic Based Implementations with Application to Nanotechnologies. |
VLSI Design |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Roopak Suri, C. M. Markan |
Threshold Trimming Based Design of a CMOS Programmable Operational Amplifier. |
VLSI Design |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Fagen Li, Yupu Hu, Shuanggen Liu |
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Rocco A. Servedio |
Every Linear Threshold Function has a Low-Weight Approximator. |
CCC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, Chong-Sun Hwang, SangKeun Lee 0001 |
Threshold Authenticated Key Configuration Scheme Based on Multi-layer Clustering in Mobile Ad Hoc. |
APWeb Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Aßfalg, Hans-Peter Kriegel, Peer Kröger, Peter Kunath, Alexey Pryakhin, Matthias Renz |
Similarity Search on Time Series Based on Threshold Queries. |
EDBT |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Kenneth C. Young, James J. H. Cook, Jennifer M. Oduko |
Automated and Human Determination of Threshold Contrast for Digital Mammography Systems. |
Digital Mammography / IWDM |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Saravanan Vijayakumaran, Tan F. Wong, Sandeep R. Aedudodla |
On the asymptotic performance of threshold-based acquisition systems in multipath fading channels. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Fredrik Athley |
Threshold region performance of maximum likelihood direction of arrival estimators. |
IEEE Trans. Signal Process. |
2005 |
DBLP DOI BibTeX RDF |
|
19 | David Haccoun, Christian Cardinal |
High-rate punctured convolutional self-doubly orthogonal codes for iterative threshold decoding. |
IEEE Trans. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Piotr Patronik |
Delay Testability Properties of Circuits Implementing Threshold and Symmetric Functions. |
DSD |
2005 |
DBLP DOI BibTeX RDF |
|
19 | ShiNing Li, JiPing Fang, Zheng Qin, Xingshe Zhou 0001 |
A Dynamic Threshold and Subsection Control TCP Slow-Start Algorithm. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang |
An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Steven Hsu, Amit Agarwal 0001, Kaushik Roy 0001, Ram Krishnamurthy 0001, Shekhar Borkar |
An 8.3GHz dual supply/threshold optimized 32b integer ALU-register file loop in 90nm CMOS. |
ISLPED |
2005 |
DBLP DOI BibTeX RDF |
dual-Vt/Vcc, flip-flop, hot spot, level converter |
19 | Nikhil Jayakumar, Sunil P. Khatri |
Minimum Energy Near-threshold Network of PLA based Design. |
ICCD |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Germán Sáez |
On Threshold Self-healing Key Distribution Schemes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Zhenjie Huang, Dan Chen, Yumin Wang |
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Yin-Ling Cheung, Ada Wai-Chee Fu |
Mining Frequent Itemsets without Support Threshold: With and without Item Constraints. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
N-most interesting itemsets, item constraints, Association rules, FP-tree |
19 | Pirouz Zarrinkhat, Amir H. Banihashemi |
Threshold values and convergence properties of majority-based algorithms for decoding regular low-density parity-check codes. |
IEEE Trans. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine |
Threshold Password-Based Authentication Using Bilinear Pairings. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Francisco Antonio Pujol López, Juan Manuel García Chamizo, Mar Pujol López, Ramón Rizo Aldeguer, Maria José Pujol |
Selection of an Automated Morphological Gradient Threshold for Image Segmentation. |
CIARP |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Vijay Degalahal, Rajaraman Ramanarayanan, Narayanan Vijaykrishnan, Yuan Xie 0001, Mary Jane Irwin |
The Effect of Threshold Voltages on the Soft Error Rate. |
ISQED |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Raquel Montes Diez, Cristina Conde, Enrique Cabello |
Automatic Detection of the Optimal Acceptance Threshold in a Face Verification System. |
ECCV Workshop BioAW |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Francisco Antonio Pujol López, Pablo Suau Pérez, Mar Pujol López, Ramón Rizo Aldeguer, Maria José Pujol |
Selection of an Automated Morphological Gradien Threshold for Image Segmentation. Application to Vision-Based Path Planning. |
IBERAMIA |
2004 |
DBLP DOI BibTeX RDF |
|
19 | J. Ramiro Martinez de Dios, Aníbal Ollero |
A Multiresolution Threshold Selection Method Based on Training. |
ICIAR (1) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Volkan Kursun, Eby G. Friedman |
Domino logic with variable threshold voltage keeper. |
IEEE Trans. Very Large Scale Integr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Marius Padure, Sorin Cotofana, Stamatis Vassiliadis |
CMOS Implementation of Generalized Threshold Functions. |
IWANN (2) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Snorre Aunet, Morten Hartmann |
Real-Time Reconfigurable Linear Threshold Elements and Some Applications to Neural Hardware. |
ICES |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Dervis Z. Deniz, Nagla O. Mohamed |
Performance Analysis of the Threshold CAC Strategy for Multimedia Traffic in Wireless Networks. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
A Separable Threshold Ring Signature Scheme. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Peter Celinski, Derek Abbott, Sorin Dan Cotofana |
Area efficient, high speed parallel counter circuits using charge recycling threshold logic. |
ISCAS (5) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Seong-Ook Jung, Ki-Wook Kim, Sung-Mo Kang |
Dual Threshold Voltage Domino Logic Synthesis for High Performance with Noise and Power Constrain. |
DATE |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Michaël Quisquater, Bart Preneel, Joos Vandewalle |
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Michel Portal, L. Forli, Didier Née |
Floating-gate EEPROM cell: threshold voltage sensibility to geometry. |
ISCAS (1) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Mehdi Homayounpour |
Speaker Model and Decision Threshold Updating in Speaker Verification. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Tohru Ishihara, Kunihiro Asada |
A system level memory power optimization technique using multiple supply and threshold voltages. |
ASP-DAC |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Douglas R. Stinson, Reto Strobl |
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Joshua L. Garrett, Mircea R. Stan |
Active threshold compensation circuit for improved performance in cooled CMOS systems. |
ISCAS (4) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
Undetachable Threshold Signatures. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
19 | Stanislaw Jarecki, Anna Lysyanskaya |
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Hendrawan Soeleman, Kaushik Roy 0001 |
Digital CMOS logic operation in the sub-threshold region. |
ACM Great Lakes Symposium on VLSI |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Masaki Hashizume, Hiroyuki Yotsuyanagi, Takeomi Tamesada, Masashi Takeda |
Testability Analysis of IDDQ Testing with Large Threshold Value. |
DFT |
2000 |
DBLP DOI BibTeX RDF |
|
19 | J. Joseph Clement, Stefan P. Riege, Radenko Cvijetic, Carl V. Thompson |
Methodology for electromigration critical threshold design rule evaluation. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Maarten Jansen, Adhemar Bultheel |
Multiple wavelet threshold estimation by generalized cross validation for images with correlated noise. |
IEEE Trans. Image Process. |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Ran Canetti, Shafi Goldwasser |
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Adaptive Security for Threshold Cryptosystems. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
19 | José Ruiz 0001, Salvador España Boquera, Pedro García 0001 |
Locally Threshold Testable Languages in Strict Sense: Application to the Inference Problem. |
ICGI |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Victor Shoup, Rosario Gennaro |
Securing Threshold Cryptosystems against Chosen Ciphertext Attack. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Peter Damaschke |
The Algorithmic Complexity of Chemical Threshold Testing. |
CIAC |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Michel Renovell, P. Huc, Yves Bertrand |
The Logic Threshold Based Voting: A Model for Local Feedback Bridging Fault. |
EDCC |
1996 |
DBLP DOI BibTeX RDF |
Test, Fault Modelling, Bridging Fault |
19 | Susan K. Langford |
Threshold DSS Signatures without a Trusted Party. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
19 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
19 | Gilles Zémor |
Threshold effects in codes. |
Algebraic Coding |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Alexis Maciel, Denis Thérien |
Threshold Circuits for Iterated Multiplication: Using AC0 for Free. |
STACS |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Jun Tarui |
Randomized Polynomials, Threshold Circuits, and the Polynomial Hierarchy. |
STACS |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Hee-Seok Oh, Donghoh Kim, Yongdai Kim |
Robust wavelet shrinkage using robust selection of thresholds. |
Stat. Comput. |
2009 |
DBLP DOI BibTeX RDF |
Pseudo data, Robust smoothing, SURE, Wavelets, Cross-validation |
18 | Neeraj Jaggi, Koushik Kar, Ananth Krishnamurthy |
Near-optimal activation policies in rechargeable sensor networks under spatial correlations. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
rechargeable sensors, sensor activation, Sensor networks, energy-efficiency, coverage, spatial correlations |
18 | Eleazar Eskin |
Increasing Power in Association Studies by Using Linkage Disequilibrium Structure and Molecular Function as Prior Information. |
RECOMB |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Sonia Chernova, Manuela M. Veloso |
Multi-thresholded approach to demonstration selection for interactive robot learning. |
HRI |
2008 |
DBLP DOI BibTeX RDF |
learning from demonstration, human-robot interaction |
18 | Dong Zheng 0004, Weiyan Ge, Junshan Zhang |
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
distributed opportunistic scheduling, ad-hoc networks, game theory, optimal stopping |
18 | Yinghui Zhou, Dezhong Zheng |
Flame Temperature Field Measurement Using Improved Generalized Cross Validation Method. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Yang Xiao 0001, Hui Chen 0001 |
Optimal Callback with Two-Level Adaptation for Wireless Data Access. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
wireless data access, Adaptive, cache, strong consistency, callback |
18 | Jianchuan Xing, Zhishu Li, Liangyin Chen |
Using Simulation to Improve the Flexibility of Adaptive Workflow Models Based on Temporal Logic. |
SEAL |
2006 |
DBLP DOI BibTeX RDF |
simulation, temporal logic, flexibility, adaptive workflow |
18 | Yihua Zhu 0001, Victor C. M. Leung |
A Fuzzy Distance-Based Location Management Scheme for PCS Networks. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Ronghong Mo, Yong Huat Chew |
Capacity of Rate Adaptive MQAM Systems in the Presence of Channel Estimation Errors under BER Constraint. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Yu-Hui Huang, Po-Yuan Chen, TingTing Hwang |
Switching-activity driven gate sizing and Vth assignment for low power design. |
ASP-DAC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Burak Kantarci, Sema F. Oktug |
Path Loss Rate Driven Burst Assembly in OBS Networks. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Nikolay N. Elkin, Anatoly P. Napartovich, Dmitri V. Vysotsky, Vera N. Troshchieva |
Round-Trip Operator Technique Applied for Optical Resonators with Dispersion Elements. |
Numerical Methods and Applications |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Distributing the Encryption and Decryption of a Block Cipher. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
thereshold cryptography, block cipher, secret sharing, shared computation |
18 | Ali Saman Tosun |
Constrained Declustering. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
high-dimensional data, spatial data, declustering, parallel disks |
18 | David J. Roberts 0001, Damien Marshall, Rob Aspin, Seamus C. McLoone, Declan Delaney, Tomás Ward |
Exploring the Use of Local Consistency Measures as Thresholds for Dead Reckoning Update Packet Generation. |
DS-RT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Sonia González, Angeles G. Navarro, Juan López, Emilio L. Zapata |
Two Hybrid Multicast Algorithms for Optimizing Resources in a Distributed VoD System. |
MMM |
2004 |
DBLP DOI BibTeX RDF |
|