The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threshold with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1962 (22) 1963-1964 (23) 1965 (27) 1966 (19) 1967-1968 (34) 1969 (22) 1970 (18) 1971-1972 (23) 1973-1974 (17) 1975-1977 (19) 1978-1979 (18) 1980-1981 (21) 1982-1983 (17) 1984-1985 (39) 1986 (17) 1987 (25) 1988 (37) 1989 (36) 1990 (52) 1991 (62) 1992 (40) 1993 (77) 1994 (95) 1995 (108) 1996 (93) 1997 (159) 1998 (131) 1999 (236) 2000 (280) 2001 (314) 2002 (436) 2003 (533) 2004 (741) 2005 (965) 2006 (1157) 2007 (1149) 2008 (1269) 2009 (908) 2010 (477) 2011 (441) 2012 (474) 2013 (491) 2014 (507) 2015 (563) 2016 (596) 2017 (513) 2018 (621) 2019 (655) 2020 (637) 2021 (619) 2022 (649) 2023 (720) 2024 (171)
Publication types (Num. hits)
article(7521) book(5) data(5) incollection(70) inproceedings(9727) phdthesis(44) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6784 occurrences of 3457 keywords

Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Michael Alekhnovich, Eli Ben-Sasson Linear Upper Bounds for Random Walk on Small Density Random 3-CNF. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Tracy Tung, Abbas Jamalipour Adaptive Location Management Strategy Combining Distance-Based Update and Sectional Paging Techniques. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Hosam M. Mahmoud The size of random bucket trees via urn models. Search on Bibsonomy Acta Informatica The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Khaled El Emam, Saïda Benlarbi, Nishith Goel, Walcélio L. Melo, Hakim Lounis, Shesh N. Rai The Optimal Class Size for Object-Oriented Software. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality prediction, optimal size, software quality, quality models, object-oriented metrics, software size
18M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18K. Srinathan, C. Pandu Rangan, V. Kamakoti 0001 Toward Optimal Player Weights in Secure Distributed Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18S. Grace Chang, Bin Yu 0001, Martin Vetterli Adaptive wavelet thresholding for image denoising and compression. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright Dynamic Byzantine Quorum Systems. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fault tolerance, dynamic reconfiguration, quorum systems, Byzantine faults
18Saïda Benlarbi, Khaled El Emam, Nishith Goel, Shesh N. Rai Thresholds for Object-Oriented Measures. Search on Bibsonomy ISSRE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Thorsten Bernholt, Alexander Gülich, Thomas Hofmeister, Niels Schmitt Football Elimination Is Hard to Decide Under the 3-Point-Rule. Search on Bibsonomy MFCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Ivan Damgård, Joe Kilian, Louis Salvail On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Faiçal Hamidi, Mohamed Naceur Abdelkrim, Houssem Jerbi Searching Candidate Lyapunov Function with Threshold Accepting Algorithm. Search on Bibsonomy CICSyN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Lyapunov Fuction, Threshold Accepting Algorithm, Stability
18Hisham Dahshan, James Irvine 0001 A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem. Search on Bibsonomy CNSR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANET, Key Management, Threshold Cryptography
18Cai Biao, Zhishu Li, Zhen Luo Threshold Secret Sharing Based Trust Security in Structured P2P Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust security, structured trust topology, P2P network, threshold secret sharing
18Wei Wei, Xuanjing Shen, Qingji Qian A Local Threshold Segmentation Method Based on Multi-direction Grayscale Wave. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF grayscale wave, local threshold segmentation, image segmentation
18Xue-Bing Wen, Xue-Zhang Liang Research on Enhancing Human Finger Vein Pattern Characteristics Based on Adjacent Node Threshold Image Method. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF finger-vein image, adjacentnode threshold image method, contrast enhancement, wavelet denoising
18Jinguo He Threshold Selection Using Competitive Algorithm. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF histogram, competitive algorithm, threshold selection
18Minoru Mori, Kunio Kashino Fast Template Matching Based on Normalized Cross Correlation Using Adaptive Block Partitioning and Initial Threshold Estimation. Search on Bibsonomy ISM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Successive elimination, Adaptive block partitioning, Initial threshold estimation, Template matching
18Xiujie Zhang, Mingxing He Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threshold changeable secret sharing scheme, partial broadcast
18Guoyan Zhang Practical Threshold One-Time Proxy Signature Scheme. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF one-time, threshold, proxy signature
18Tomoo Inoue, Nobukazu Izumi, Yuki Yoshikawa, Hideyuki Ichihara A Fast Threshold Test Generation Algorithm Based on 5-Valued Logic. Search on Bibsonomy DELTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF acceptable faults, threshold test generation, error significance, 5-valued logic, PODEM
18Ilias Diakonikolas, Rocco A. Servedio, Li-Yang Tan, Andrew Wan A Regularity Lemma, and Low-Weight Approximators, for Low-Degree Polynomial Threshold Functions. Search on Bibsonomy CCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Boolean function, regularity lemma, polynomial threshold function
18Ling Luo, Xiying Li A Method to Search for Color Segmentation Threshold in Traffic Sign Detection. Search on Bibsonomy ICIG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF positive samples, negative samples, threshold search, color segmentation
18Shuhan Wei, Ranran Zhang, Pengyi Hao, Youdong Ding Blotch Detection Based on Texture Matching and Adaptive Multi-threshold. Search on Bibsonomy ICIG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blotch detection, Simplified rank-ordered difference, Iterative algorithm, Adaptive threshold
18Piyi Yang, Zhenfu Cao, Xiaolei Dong Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data report authentication, certificateless threshold signature, mobile ad-hoc network
18Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fuzzy identity-based signature, MS-DDHE assumption, bilinear maps, dynamic threshold
18Marek R. Ogiela, Urszula Ogiela Secret Sharing Protocol for Linguistic Threshold Schemes. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret sharing, information management, threshold schemes
18Jian-Bing Liu, Hong Ren, Zhiming Li Simulation Calculation Model of the Threshold Cost for Construction Project Bidding. Search on Bibsonomy JCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF the threshold cost, construction project, tender quotation price, winning the project, bidding
18Jérémy Barbay, Aleh Veraskouski Adaptive Algorithm for Threshold Path Subset Queries. Search on Bibsonomy SCCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive, Threshold, Intersection, Labeled Trees
18Yi Zhang, Wenxing Chen A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Detecting in whole, Mobile Ad hoc networks, Cheating, Threshold secret sharing
18Shajulin Benedict, V. Vasudevan, R. S. Rejitha Threshold Accepting Scheduling Algorithm for Scientific Workflows in Wireless Grids. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Genetic Algorithm, Scheduling, Grid computing, Simulated Annealing, Threshold Accepting
18Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystem, Threshold Cryptography, Subliminal Channel
18Ryan O'Donnell, Rocco A. Servedio New degree bounds for polynomial threshold functions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ptfs, learning, lower bounds, polynomials, duality, degree, formulas, polynomial threshold functions
18Takashi Inukai, Toshiro Hiramoto, Takayasu Sakurai Variable threshold CMOS (VTCMOS) in series connected circuits. Search on Bibsonomy ISLPED The full citation details ... 2001 DBLP  DOI  BibTeX  RDF body effect factor, degradation factor, series connected circuits, substrate bias, variable threshold voltage CMOS, velocity saturation
18Stephen V. Kosonocky, Michael Immediato, Peter E. Cottrell, Terence B. Hook, Randy W. Mann, Jeff Brown Enchanced multi-threshold (MTCMOS) circuits using variable well bias. Search on Bibsonomy ISLPED The full citation details ... 2001 DBLP  DOI  BibTeX  RDF leakage control, low power digital circuit design, variable well bias, MTCMOS, multi-threshold
18Jing-Jou Tang An Accurate Logic Threshold Voltages Determination Model for CMOS Gates to Facilitate Test Generation and Fault Simulation. Search on Bibsonomy Asian Test Symposium The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Logic Threshold Voltage, test generation, fault modeling, fault simulation
18Alioune Ngom, Ivan Stojmenovic, Jovisa D. Zunic On the Number of Multilinear Partitions and the Computing Capacity of Multiple-Valued Multiple-Threshold Perceptrons. Search on Bibsonomy ISMVL The full citation details ... 1999 DBLP  DOI  BibTeX  RDF k-valued s- threshold perceptron, (k,k)-grid, minimal pair, general position, complexity, partition, separability, multiple-valued logic, Farey sequences
18Ing-Ray Chen, Tao-Hung Hsi Threshold-based dynamic admission control algorithms for real-time multimedia servers. Search on Bibsonomy SAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF capacity reservation, threshold-based, real-time, performance analysis, admission control, queueing theory, multimedia servers
18Avrim Blum, Alan M. Frieze, Ravi Kannan, Santosh S. Vempala A Polynomial-Time Algorithm for Learning Noisy Linear Threshold Functions. Search on Bibsonomy FOCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF noisy linear threshold function learning, ellipsoid algorithm, separation parameter, input description length, weak hypothesis finding, random classification noise, data outlier removal, learning (artificial intelligence), linear program, polynomial-time algorithm, greedy algorithms, noise tolerance, perceptron algorithm, PAC model
18Anil Kamath, Rajeev Motwani 0001, Krishna V. Palem, Paul G. Spirakis Tail Bounds for Occupancy and the Satisfiability Threshold Conjecture Search on Bibsonomy FOCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF tail bounds, satisfiability threshold conjecture, random allocation, random 3-SAT formulas, randomized algorithms, upper bound, probabilistic analysis, structural property, occupancy
18Magnús M. Halldórsson, Jaikumar Radhakrishnan, K. V. Subrahmanyam 0001 Directed vs. Undirected Monotone Contact Networks for Threshold Functions Search on Bibsonomy FOCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF Boolean functions complexity, monotone contact networks, almost optimal, lower bound, upper bound, threshold functions
18Jehoshua Bruck, Roman Smolensky Polynomial Threshold Functions, AC^0 Functions and Spectral Norms (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF spectral representation, AC functions, spectrum norms, Boolean function, harmonic analysis, polynomial-threshold functions
18Ramamohan Paturi, Michael E. Saks On Threshold Circuits for Parity Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF size-depth tradeoffs, almost optimal lower bound, polynomially bounded weights, neural networks, Boolean functions, rational approximation, parity, threshold circuits
18K. Wayne Current, Douglas A. Mow Implementing Parallel Counters with Four-Valued Threshold Logic. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1979 DBLP  DOI  BibTeX  RDF Four-valved logic full adders, multivalued logic, threshold logic, parallel counters
18Okihiko Ishizuka On Multivalued Multithreshold Networks Composed of Conventional Threshold Elements. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1977 DBLP  DOI  BibTeX  RDF Linear summation, multithreshold function, multithreshold network, multivalued function, nonlinear summation, ternary symmetric function, threshold element, network synthesis
18S. A. Kent A High-Speed Threshold Gate Multiplier. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1977 DBLP  DOI  BibTeX  RDF High-speed adder, threshold logic, propagation delay, partial product, parallel multiplication
18Charles R. Baugh, Bruce A. Wooley Statistical Analysis of a Differential Threshold Logic Circuit Configuration. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1976 DBLP  DOI  BibTeX  RDF Current-switching circuits, emitter-coupled logic, statistical analysis, integrated circuits, threshold logic
18Colin R. Edwards The Application of the Rademacher-Walsh Transform to Boolean Function Classification and Threshold Logic Synthesis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1975 DBLP  DOI  BibTeX  RDF Boolean function classification, Rademacher-Walsh transform, logic synthesis, threshold logic
18Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs
18Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Challenge-response protocols, Parallel repetition with threshold, Direct product theorem
18Robert E. Kooij, Phillip Schumm, Caterina M. Scoglio, Mina Youssef A New Metric for Robustness with Respect to Virus Spread. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virus spread, viral conductance, Robustness, epidemic threshold
18Dimitrios Liarokapis, Ali Shahrabi A probability-based adaptive scheme for broadcasting in MANETs. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive, MANETs, broadcast, probability, threshold
18Sohan Purohit, Martin Margala, Marco Lanuzza, Pasquale Corsonello New performance/power/area efficient, reliable full adder design. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF d3l, reliability, dynamic, full-adder, sub-threshold
18Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa Tag-KEM/DEM: A New Framework for Hybrid Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption
18Deyuan Xiao, Gary Chen, Roger Lee, Yung Liu, ChiCheong Shen Planar split dual gate MOSFET. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF novel device, planar split dual gate, tunable sub-threshold swing, MOSFET
18Takashi Matsunaka, Takayuki Warabino, Yoji Kishi Secure Data Sharing in Mobile Environments. Search on Bibsonomy MDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile computing, data sharing, threshold cryptography
18Mario Aldape-Pérez, Israel Román-Godínez, Oscar Camacho Nieto Thresholded Learning Matrix for Efficient Pattern Recalling. Search on Bibsonomy CIARP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Lernmatrix, Supervised Learning, Pattern Classification, Associative Memories, Dynamic Threshold
18Seong-Yoon Shin, Cheng Gao, Seong-Eun Baek, Sangjoon Park, Jung-Hoon Shin, Yang-Won Rhee Shot Boundary Detection Using a Global Decision Tree in Ubiquitous Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Global Decision Tree, Global Threshold, Normalization, Shot Boundary Detection
18Won-Hee Kim, Kwang-Seok Moon, Jong-Nam Kim Adaptive Shot Change Detection for Hardware Application. Search on Bibsonomy ISICA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Adaptive Shot Change Detection, Implementation on PMP, Weighting Variance, Adaptive Threshold
18Gian Luca Marcialis, Ajita Rattani, Fabio Roli Biometric Template Update: An Experimental Investigation on the Relationship between Update Errors and Performance Degradation in Face Verification. Search on Bibsonomy SSPR/SPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Template update, Intra-class variations, Face biometrics, template update errors, Biometrics, impostors, threshold selection
18Ming-Chan You, Cheng-Yi Mao, Jeen-Shing Wang, Fang-Chen Chuang A Recursive Parametric Spectral Subtraction Algorithm for Speech Enhancement. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF subtractive-type algorithms, human auditory system, masking threshold, Speech enhancement
18Junna Cheng, Guangrong Ji, Chen Feng Image Segmentation Based on Chaos Immune Clone Selection Algorithm. Search on Bibsonomy ICIC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Otsu’s threshold method, Immune clone selection algorithm, Chaos optimization algorithm
18Seon-Do Kang, Hun-Woo Yoo, Dong-Sik Jang Color Image Segmentation Based on the Normal Distribution and the Dynamic Thresholding. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Segmentation, Threshold, Merging, Normal Distribution, Standard Deviation, Dividing, Central Limit Theorem
18Alexander A. Sherstov Separating AC0 from depth-2 majority circuits. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AC0, communication complexity, discrepancy, threshold circuits
18Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs
18Payman Mohassel, Matthew K. Franklin Efficient Polynomial Operations in the Shared-Coefficients Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polynomial operations, threshold homomorphic encryption, privacy-preserving set operations, secure multi-party computation, passive adversary
18Gang Xie 0001, Xuebin Liu, Lifei Wang, Keming Xie Rough-Sets-Based Combustion Status Diagnosis. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF threshold segmentation, combustion diagnosis, image process, Rough sets
18Chin-Chen Chang 0001, Chi-Shiang Chan, Yi-Hsuan Fan A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Image sharing, (t, n) threshold scheme, vector quantization
18Qiao Zhang, Xu Xu, Yanchun Liang 0001 Identification and Speed Control of Ultrasonic Motors Based on Modified Immune Algorithm and Elman Neural Networks. Search on Bibsonomy RSCTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF artificial immune algorithm, ultrasonic motor, control, system identification, dynamic threshold, Elman network
18Lin Guan, Michael E. Woodward, Irfan-Ullah Awan Bounding Delay through a Buffer using Dynamic Queue Thresholds. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Queue Threshold, Quality of Service (QoS), Control Strategy, Queueing Delay
18Md. Atiqul Islam, Shamim Akhter, Tamnun E. Mursalin, M. Ashraful Amin A Suitable Neural Network to Detect Textile Defects. Search on Bibsonomy ICONIP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Textile defects, threshold decision tree, multi-layer neural networks, resilient back propagation, cross validation
18Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang Secure Construction of Virtual Organizations in Grid Computing Systems. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF grid computing system, threshold approach, Virtual organization, system security
18Emil Ong, John Kubiatowicz Optimizing Robustness While Generating Shared Secret Safe Primes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed key generation, safe primes, threshold RSA signatures
18Nualsawat Hiransakolwong Automated Liver Detection in Ultrasound Images. Search on Bibsonomy CIVR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fully automatic segmentation, local adaptive threshold, Core area, Ultrasound images
18Héctor Sanvicente Sánchez, Juan Frausto Solís, Froilán Imperial-Valenzuela Solving SAT Problems with TA Algorithms Using Constant and Dynamic Markov Chains Length. Search on Bibsonomy AAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cooling Scheme, Dynamic Markov Chains, Simulated Annealing, Combinatorial Optimization, SAT problem, Heuristic Optimization, Threshold Accepting
18Frank Sill, Frank Grassert, Dirk Timmermann Low power gate-level design with mixed-Vth (MVT) techniques. Search on Bibsonomy SBCCI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MVT, leakage currents, threshold voltage
18John F. Canny, Stephen Sorkin Practical Large-Scale Distributed Key Generation. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Distributed Key Generation, Random Walk, Linear Algebra, Discrete Logarithm, Threshold Cryptography
18Pietro Babighian, Luca Benini, Alberto Macii, Enrico Macii Post-layout leakage power minimization based on distributed sleep transistor insertion. Search on Bibsonomy ISLPED The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sub-threshold current, leakage power, sleep transistor
18Héctor Sanvicente Sánchez, Juan Frausto Solís A Method to Establish the Cooling Scheme in Simulated Annealing Like Algorithms. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Combinatorial Optimization and Heuristic Optimization, Simulated Annealing Like Algorithms, Simulated Annealing, Threshold Accepting
18Luisa Franconi, Silvia Polettini Individual Risk Estimation in µ-Argus: A Review. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Argus software, global risk, individual risk, household data, local suppression, re-identification disclosure, threshold setting, unsafe combinations, data protection
18Li-Liann Lu, Jean-Lien C. Wu, Wei-Yeh Chen The Study of Handoff Prediction Schemes for Resource Reservation in Mobile Multimedia Wireless Networks. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pre-handoff zone, direction weighting, velocity threshold, dynamic resource reservation, admission control
18Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fault Treatment, Threshold-based mechanisms, CORBA Architectures, Fault Diagnosis, Legacy systems, Software Implemented Fault Tolerance
18K. Srinathan, N. Tharani Rajan, C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF non-threshold secret sharing, non-perfect secret sharing
18Nualsawat Hiransakolwong, Piotr S. Windyga, Kien A. Hua, Khanh Vu FASU: A Full Automatic Segmenting System for Ultrasound Images. Search on Bibsonomy WACV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Ultrasound image segmentation, peak-and-valley, windows adaptive threshold, core area, Cubic Spline Interpolation, Image smoothing, Hilbert curve
18Vadlamani Ravi, Hans-Jürgen Zimmermann A neural network and fuzzy rule base hybrid for pattern classification. Search on Bibsonomy Soft Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Modified threshold accepting, Neural networks, Feature selection, Fuzzy rule bases
18Jaroslav Pokorný, Peter Vojtás A Data Model for Flexible Querying. Search on Bibsonomy ADBIS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vague linguistic expressions, fuzzy Datalog, fuzzy relational algebra, threshold computation, flexible querying, fuzzy similarities
18Jovisa D. Zunic Digital Partitions Encoding. Search on Bibsonomy Digital and Image Geometry The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Linear partitions, discrete moments, pattern recognition, coding, threshold functions
18Dix Jia, Eryk Dutkiewicz, Joe F. Chicharo Performance Analysis of QoS Mechanisms in IP Networks. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Threshold Dropping, QoS, Diffserv, Priority Scheduling
18Liqiong Wei, Kaushik Roy 0001, Vivek De Low Voltage Low Power CMOS Design Techniques for Deep Submicron ICs. Search on Bibsonomy VLSI Design The full citation details ... 2000 DBLP  DOI  BibTeX  RDF low voltage low power, multiple threshold voltages, multiple supply voltages and leakage control
18Ramón Béjar, Felip Manyà Phase Transitions in the Regular Random 3-SAT Problem. Search on Bibsonomy ISMIS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF regular CNF formulas, benchmarks, satisfiability, threshold, Multiple-valued logics, phase transitions
18Wan-Ching Chen, Peter I. Rockett Bayesian Labelling of Corners Using a Grey-Level Corner Image Model. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Bayesian labelling, grey-level corner image model, MLP feedforward neural network, threshold-free corner detector, approximate Bayesian posterior probabilities, binary labels, pattern space sampling, classifier generalisation, low level feature extraction, robustness, backpropagation, Bayes methods, corner detection, statistical pattern recognition, real images, training data
18Yu-Yau Guo, Jien-Chung Lo, Cecilia Metra Fast and area-time efficient Berger code checkers. Search on Bibsonomy DFT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Berger code checker, ratioed FET circuit, area-time efficiency, resistive breaks, VLSI, defects, error detection codes, bridges, speed, threshold function, 32 bit, 1.2 micron
18Dan Boneh, Matthew K. Franklin Efficient Generation of Shared RSA Keys (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA, Threshold Cryptography, Multiparty computation, Primality testing
18Stasys Jukna Finite Limits and Monotone Computations: The Lower Bounds Criterion. Search on Bibsonomy CCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF real gates, lower bounds, threshold gates, monotone circuits
18José Miguel-Alonso, Agustin Arruabarrena, Ramón Beivide, José A. B. Fortes An Empirical Evaluation of Techniques for Parallel Discrete-Event Simulation of Interconnection Networks. Search on Bibsonomy PDP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF interconnnection networks, synchronous simulation, Intel Paragon multicomputer, model decomposition, collaborative logical processes, process synchronization overhead, causal restrictions, message-passing network models, performance threshold, load level, scalability, parallel programming, virtual machines, message passing, multiprocessor interconnection networks, discrete event simulation, synchronisation, software performance evaluation, workload, empirical evaluation, parallel discrete-event simulation, optimistic simulation, network size, model parameters, simulator performance, message length, conservative simulation, processor number
18Alfredo Restrepo, Alejandro Naranjo, Magdalenu Valderrama, Mauricio Daniels, Ramiro de la Vega Designing OSED's (order statistic edge detectors). Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF order statistic edge detector, order statistic filters, moving quasiranges, threshold level, edge contrast, SNR conditions, window size five, edge detection, statistical analysis, outliers, nonlinear filters, variances, linear combinations, error probabilities, expectations, error statistics, OSED
18Aditya Agrawal, Magdy A. Bayoumi, Amr Elchouemi A new ATM congestion control scheme for shared buffer switch architectures. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF pre-emptive congestion control scheme, shared buffer switch architectures, rate-based feedback scheme, guaranteed service traffic, continuous bit-rate traffic, leaky bucket mechanism, backward explicit congestion notification feedback scheme, mean inter-arrival time, buffer threshold throttle factor, cell reject throttle factor, rate reduction delta, transient behaviour, filter time, asynchronous transfer mode, ATM networks, simulation model, ATM switch, dynamic bandwidth allocation, best-effort traffic, variable bit-rate traffic, predictive scheme
18Eddy Mayoraz On the Power of Networks of Majority Functions. Search on Bibsonomy IWANN The full citation details ... 1991 DBLP  DOI  BibTeX  RDF linear threshold function, synaptic weights quantization, majority functions, neural network, circuit complexity
15Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
15Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 17373 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license