|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6784 occurrences of 3457 keywords
|
|
|
Results
Found 17373 publication records. Showing 17373 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Michael Alekhnovich, Eli Ben-Sasson |
Linear Upper Bounds for Random Walk on Small Density Random 3-CNF. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Tracy Tung, Abbas Jamalipour |
Adaptive Location Management Strategy Combining Distance-Based Update and Sectional Paging Techniques. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Hosam M. Mahmoud |
The size of random bucket trees via urn models. |
Acta Informatica |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Khaled El Emam, Saïda Benlarbi, Nishith Goel, Walcélio L. Melo, Hakim Lounis, Shesh N. Rai |
The Optimal Class Size for Object-Oriented Software. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
quality prediction, optimal size, software quality, quality models, object-oriented metrics, software size |
18 | M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan |
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
18 | K. Srinathan, C. Pandu Rangan, V. Kamakoti 0001 |
Toward Optimal Player Weights in Secure Distributed Protocols. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
18 | S. Grace Chang, Bin Yu 0001, Martin Vetterli |
Adaptive wavelet thresholding for image denoising and compression. |
IEEE Trans. Image Process. |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright |
Dynamic Byzantine Quorum Systems. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
fault tolerance, dynamic reconfiguration, quorum systems, Byzantine faults |
18 | Saïda Benlarbi, Khaled El Emam, Nishith Goel, Shesh N. Rai |
Thresholds for Object-Oriented Measures. |
ISSRE |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Thorsten Bernholt, Alexander Gülich, Thomas Hofmeister, Niels Schmitt |
Football Elimination Is Hard to Decide Under the 3-Point-Rule. |
MFCS |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Ivan Damgård, Joe Kilian, Louis Salvail |
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Faiçal Hamidi, Mohamed Naceur Abdelkrim, Houssem Jerbi |
Searching Candidate Lyapunov Function with Threshold Accepting Algorithm. |
CICSyN |
2011 |
DBLP DOI BibTeX RDF |
Lyapunov Fuction, Threshold Accepting Algorithm, Stability |
18 | Hisham Dahshan, James Irvine 0001 |
A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem. |
CNSR |
2010 |
DBLP DOI BibTeX RDF |
MANET, Key Management, Threshold Cryptography |
18 | Cai Biao, Zhishu Li, Zhen Luo |
Threshold Secret Sharing Based Trust Security in Structured P2P Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
trust security, structured trust topology, P2P network, threshold secret sharing |
18 | Wei Wei, Xuanjing Shen, Qingji Qian |
A Local Threshold Segmentation Method Based on Multi-direction Grayscale Wave. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
grayscale wave, local threshold segmentation, image segmentation |
18 | Xue-Bing Wen, Xue-Zhang Liang |
Research on Enhancing Human Finger Vein Pattern Characteristics Based on Adjacent Node Threshold Image Method. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
finger-vein image, adjacentnode threshold image method, contrast enhancement, wavelet denoising |
18 | Jinguo He |
Threshold Selection Using Competitive Algorithm. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
histogram, competitive algorithm, threshold selection |
18 | Minoru Mori, Kunio Kashino |
Fast Template Matching Based on Normalized Cross Correlation Using Adaptive Block Partitioning and Initial Threshold Estimation. |
ISM |
2010 |
DBLP DOI BibTeX RDF |
Successive elimination, Adaptive block partitioning, Initial threshold estimation, Template matching |
18 | Xiujie Zhang, Mingxing He |
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
threshold changeable secret sharing scheme, partial broadcast |
18 | Guoyan Zhang |
Practical Threshold One-Time Proxy Signature Scheme. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
one-time, threshold, proxy signature |
18 | Tomoo Inoue, Nobukazu Izumi, Yuki Yoshikawa, Hideyuki Ichihara |
A Fast Threshold Test Generation Algorithm Based on 5-Valued Logic. |
DELTA |
2010 |
DBLP DOI BibTeX RDF |
acceptable faults, threshold test generation, error significance, 5-valued logic, PODEM |
18 | Ilias Diakonikolas, Rocco A. Servedio, Li-Yang Tan, Andrew Wan |
A Regularity Lemma, and Low-Weight Approximators, for Low-Degree Polynomial Threshold Functions. |
CCC |
2010 |
DBLP DOI BibTeX RDF |
Boolean function, regularity lemma, polynomial threshold function |
18 | Ling Luo, Xiying Li |
A Method to Search for Color Segmentation Threshold in Traffic Sign Detection. |
ICIG |
2009 |
DBLP DOI BibTeX RDF |
positive samples, negative samples, threshold search, color segmentation |
18 | Shuhan Wei, Ranran Zhang, Pengyi Hao, Youdong Ding |
Blotch Detection Based on Texture Matching and Adaptive Multi-threshold. |
ICIG |
2009 |
DBLP DOI BibTeX RDF |
Blotch detection, Simplified rank-ordered difference, Iterative algorithm, Adaptive threshold |
18 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
data report authentication, certificateless threshold signature, mobile ad-hoc network |
18 | Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng |
A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
fuzzy identity-based signature, MS-DDHE assumption, bilinear maps, dynamic threshold |
18 | Marek R. Ogiela, Urszula Ogiela |
Secret Sharing Protocol for Linguistic Threshold Schemes. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
secret sharing, information management, threshold schemes |
18 | Jian-Bing Liu, Hong Ren, Zhiming Li |
Simulation Calculation Model of the Threshold Cost for Construction Project Bidding. |
JCAI |
2009 |
DBLP DOI BibTeX RDF |
the threshold cost, construction project, tender quotation price, winning the project, bidding |
18 | Jérémy Barbay, Aleh Veraskouski |
Adaptive Algorithm for Threshold Path Subset Queries. |
SCCC |
2009 |
DBLP DOI BibTeX RDF |
Adaptive, Threshold, Intersection, Labeled Trees |
18 | Yi Zhang, Wenxing Chen |
A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Detecting in whole, Mobile Ad hoc networks, Cheating, Threshold secret sharing |
18 | Shajulin Benedict, V. Vasudevan, R. S. Rejitha |
Threshold Accepting Scheduling Algorithm for Scientific Workflows in Wireless Grids. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
Genetic Algorithm, Scheduling, Grid computing, Simulated Annealing, Threshold Accepting |
18 | Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo |
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystem, Threshold Cryptography, Subliminal Channel |
18 | Ryan O'Donnell, Rocco A. Servedio |
New degree bounds for polynomial threshold functions. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
ptfs, learning, lower bounds, polynomials, duality, degree, formulas, polynomial threshold functions |
18 | Takashi Inukai, Toshiro Hiramoto, Takayasu Sakurai |
Variable threshold CMOS (VTCMOS) in series connected circuits. |
ISLPED |
2001 |
DBLP DOI BibTeX RDF |
body effect factor, degradation factor, series connected circuits, substrate bias, variable threshold voltage CMOS, velocity saturation |
18 | Stephen V. Kosonocky, Michael Immediato, Peter E. Cottrell, Terence B. Hook, Randy W. Mann, Jeff Brown |
Enchanced multi-threshold (MTCMOS) circuits using variable well bias. |
ISLPED |
2001 |
DBLP DOI BibTeX RDF |
leakage control, low power digital circuit design, variable well bias, MTCMOS, multi-threshold |
18 | Jing-Jou Tang |
An Accurate Logic Threshold Voltages Determination Model for CMOS Gates to Facilitate Test Generation and Fault Simulation. |
Asian Test Symposium |
1999 |
DBLP DOI BibTeX RDF |
Logic Threshold Voltage, test generation, fault modeling, fault simulation |
18 | Alioune Ngom, Ivan Stojmenovic, Jovisa D. Zunic |
On the Number of Multilinear Partitions and the Computing Capacity of Multiple-Valued Multiple-Threshold Perceptrons. |
ISMVL |
1999 |
DBLP DOI BibTeX RDF |
k-valued s- threshold perceptron, (k,k)-grid, minimal pair, general position, complexity, partition, separability, multiple-valued logic, Farey sequences |
18 | Ing-Ray Chen, Tao-Hung Hsi |
Threshold-based dynamic admission control algorithms for real-time multimedia servers. |
SAC |
1996 |
DBLP DOI BibTeX RDF |
capacity reservation, threshold-based, real-time, performance analysis, admission control, queueing theory, multimedia servers |
18 | Avrim Blum, Alan M. Frieze, Ravi Kannan, Santosh S. Vempala |
A Polynomial-Time Algorithm for Learning Noisy Linear Threshold Functions. |
FOCS |
1996 |
DBLP DOI BibTeX RDF |
noisy linear threshold function learning, ellipsoid algorithm, separation parameter, input description length, weak hypothesis finding, random classification noise, data outlier removal, learning (artificial intelligence), linear program, polynomial-time algorithm, greedy algorithms, noise tolerance, perceptron algorithm, PAC model |
18 | Anil Kamath, Rajeev Motwani 0001, Krishna V. Palem, Paul G. Spirakis |
Tail Bounds for Occupancy and the Satisfiability Threshold Conjecture |
FOCS |
1994 |
DBLP DOI BibTeX RDF |
tail bounds, satisfiability threshold conjecture, random allocation, random 3-SAT formulas, randomized algorithms, upper bound, probabilistic analysis, structural property, occupancy |
18 | Magnús M. Halldórsson, Jaikumar Radhakrishnan, K. V. Subrahmanyam 0001 |
Directed vs. Undirected Monotone Contact Networks for Threshold Functions |
FOCS |
1993 |
DBLP DOI BibTeX RDF |
Boolean functions complexity, monotone contact networks, almost optimal, lower bound, upper bound, threshold functions |
18 | Jehoshua Bruck, Roman Smolensky |
Polynomial Threshold Functions, AC^0 Functions and Spectral Norms (Extended Abstract) |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
spectral representation, AC functions, spectrum norms, Boolean function, harmonic analysis, polynomial-threshold functions |
18 | Ramamohan Paturi, Michael E. Saks |
On Threshold Circuits for Parity |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
size-depth tradeoffs, almost optimal lower bound, polynomially bounded weights, neural networks, Boolean functions, rational approximation, parity, threshold circuits |
18 | K. Wayne Current, Douglas A. Mow |
Implementing Parallel Counters with Four-Valued Threshold Logic. |
IEEE Trans. Computers |
1979 |
DBLP DOI BibTeX RDF |
Four-valved logic full adders, multivalued logic, threshold logic, parallel counters |
18 | Okihiko Ishizuka |
On Multivalued Multithreshold Networks Composed of Conventional Threshold Elements. |
IEEE Trans. Computers |
1977 |
DBLP DOI BibTeX RDF |
Linear summation, multithreshold function, multithreshold network, multivalued function, nonlinear summation, ternary symmetric function, threshold element, network synthesis |
18 | S. A. Kent |
A High-Speed Threshold Gate Multiplier. |
IEEE Trans. Computers |
1977 |
DBLP DOI BibTeX RDF |
High-speed adder, threshold logic, propagation delay, partial product, parallel multiplication |
18 | Charles R. Baugh, Bruce A. Wooley |
Statistical Analysis of a Differential Threshold Logic Circuit Configuration. |
IEEE Trans. Computers |
1976 |
DBLP DOI BibTeX RDF |
Current-switching circuits, emitter-coupled logic, statistical analysis, integrated circuits, threshold logic |
18 | Colin R. Edwards |
The Application of the Rademacher-Walsh Transform to Boolean Function Classification and Threshold Logic Synthesis. |
IEEE Trans. Computers |
1975 |
DBLP DOI BibTeX RDF |
Boolean function classification, Rademacher-Walsh transform, logic synthesis, threshold logic |
18 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs |
18 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Challenge-response protocols, Parallel repetition with threshold, Direct product theorem |
18 | Robert E. Kooij, Phillip Schumm, Caterina M. Scoglio, Mina Youssef |
A New Metric for Robustness with Respect to Virus Spread. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
virus spread, viral conductance, Robustness, epidemic threshold |
18 | Dimitrios Liarokapis, Ali Shahrabi |
A probability-based adaptive scheme for broadcasting in MANETs. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
adaptive, MANETs, broadcast, probability, threshold |
18 | Sohan Purohit, Martin Margala, Marco Lanuzza, Pasquale Corsonello |
New performance/power/area efficient, reliable full adder design. |
ACM Great Lakes Symposium on VLSI |
2009 |
DBLP DOI BibTeX RDF |
d3l, reliability, dynamic, full-adder, sub-threshold |
18 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
18 | Deyuan Xiao, Gary Chen, Roger Lee, Yung Liu, ChiCheong Shen |
Planar split dual gate MOSFET. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
novel device, planar split dual gate, tunable sub-threshold swing, MOSFET |
18 | Takashi Matsunaka, Takayuki Warabino, Yoji Kishi |
Secure Data Sharing in Mobile Environments. |
MDM |
2008 |
DBLP DOI BibTeX RDF |
mobile computing, data sharing, threshold cryptography |
18 | Mario Aldape-Pérez, Israel Román-Godínez, Oscar Camacho Nieto |
Thresholded Learning Matrix for Efficient Pattern Recalling. |
CIARP |
2008 |
DBLP DOI BibTeX RDF |
Lernmatrix, Supervised Learning, Pattern Classification, Associative Memories, Dynamic Threshold |
18 | Seong-Yoon Shin, Cheng Gao, Seong-Eun Baek, Sangjoon Park, Jung-Hoon Shin, Yang-Won Rhee |
Shot Boundary Detection Using a Global Decision Tree in Ubiquitous Environment. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Global Decision Tree, Global Threshold, Normalization, Shot Boundary Detection |
18 | Won-Hee Kim, Kwang-Seok Moon, Jong-Nam Kim |
Adaptive Shot Change Detection for Hardware Application. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
Adaptive Shot Change Detection, Implementation on PMP, Weighting Variance, Adaptive Threshold |
18 | Gian Luca Marcialis, Ajita Rattani, Fabio Roli |
Biometric Template Update: An Experimental Investigation on the Relationship between Update Errors and Performance Degradation in Face Verification. |
SSPR/SPR |
2008 |
DBLP DOI BibTeX RDF |
Template update, Intra-class variations, Face biometrics, template update errors, Biometrics, impostors, threshold selection |
18 | Ming-Chan You, Cheng-Yi Mao, Jeen-Shing Wang, Fang-Chen Chuang |
A Recursive Parametric Spectral Subtraction Algorithm for Speech Enhancement. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
subtractive-type algorithms, human auditory system, masking threshold, Speech enhancement |
18 | Junna Cheng, Guangrong Ji, Chen Feng |
Image Segmentation Based on Chaos Immune Clone Selection Algorithm. |
ICIC (2) |
2007 |
DBLP DOI BibTeX RDF |
Otsu’s threshold method, Immune clone selection algorithm, Chaos optimization algorithm |
18 | Seon-Do Kang, Hun-Woo Yoo, Dong-Sik Jang |
Color Image Segmentation Based on the Normal Distribution and the Dynamic Thresholding. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Segmentation, Threshold, Merging, Normal Distribution, Standard Deviation, Dividing, Central Limit Theorem |
18 | Alexander A. Sherstov |
Separating AC0 from depth-2 majority circuits. |
STOC |
2007 |
DBLP DOI BibTeX RDF |
AC0, communication complexity, discrepancy, threshold circuits |
18 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs |
18 | Payman Mohassel, Matthew K. Franklin |
Efficient Polynomial Operations in the Shared-Coefficients Setting. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
polynomial operations, threshold homomorphic encryption, privacy-preserving set operations, secure multi-party computation, passive adversary |
18 | Gang Xie 0001, Xuebin Liu, Lifei Wang, Keming Xie |
Rough-Sets-Based Combustion Status Diagnosis. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
threshold segmentation, combustion diagnosis, image process, Rough sets |
18 | Chin-Chen Chang 0001, Chi-Shiang Chan, Yi-Hsuan Fan |
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
Image sharing, (t, n) threshold scheme, vector quantization |
18 | Qiao Zhang, Xu Xu, Yanchun Liang 0001 |
Identification and Speed Control of Ultrasonic Motors Based on Modified Immune Algorithm and Elman Neural Networks. |
RSCTC |
2006 |
DBLP DOI BibTeX RDF |
artificial immune algorithm, ultrasonic motor, control, system identification, dynamic threshold, Elman network |
18 | Lin Guan, Michael E. Woodward, Irfan-Ullah Awan |
Bounding Delay through a Buffer using Dynamic Queue Thresholds. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Queue Threshold, Quality of Service (QoS), Control Strategy, Queueing Delay |
18 | Md. Atiqul Islam, Shamim Akhter, Tamnun E. Mursalin, M. Ashraful Amin |
A Suitable Neural Network to Detect Textile Defects. |
ICONIP (2) |
2006 |
DBLP DOI BibTeX RDF |
Textile defects, threshold decision tree, multi-layer neural networks, resilient back propagation, cross validation |
18 | Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang |
Secure Construction of Virtual Organizations in Grid Computing Systems. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
grid computing system, threshold approach, Virtual organization, system security |
18 | Emil Ong, John Kubiatowicz |
Optimizing Robustness While Generating Shared Secret Safe Primes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Distributed key generation, safe primes, threshold RSA signatures |
18 | Nualsawat Hiransakolwong |
Automated Liver Detection in Ultrasound Images. |
CIVR |
2005 |
DBLP DOI BibTeX RDF |
fully automatic segmentation, local adaptive threshold, Core area, Ultrasound images |
18 | Héctor Sanvicente Sánchez, Juan Frausto Solís, Froilán Imperial-Valenzuela |
Solving SAT Problems with TA Algorithms Using Constant and Dynamic Markov Chains Length. |
AAIM |
2005 |
DBLP DOI BibTeX RDF |
Cooling Scheme, Dynamic Markov Chains, Simulated Annealing, Combinatorial Optimization, SAT problem, Heuristic Optimization, Threshold Accepting |
18 | Frank Sill, Frank Grassert, Dirk Timmermann |
Low power gate-level design with mixed-Vth (MVT) techniques. |
SBCCI |
2004 |
DBLP DOI BibTeX RDF |
MVT, leakage currents, threshold voltage |
18 | John F. Canny, Stephen Sorkin |
Practical Large-Scale Distributed Key Generation. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Distributed Key Generation, Random Walk, Linear Algebra, Discrete Logarithm, Threshold Cryptography |
18 | Pietro Babighian, Luca Benini, Alberto Macii, Enrico Macii |
Post-layout leakage power minimization based on distributed sleep transistor insertion. |
ISLPED |
2004 |
DBLP DOI BibTeX RDF |
sub-threshold current, leakage power, sleep transistor |
18 | Héctor Sanvicente Sánchez, Juan Frausto Solís |
A Method to Establish the Cooling Scheme in Simulated Annealing Like Algorithms. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
Combinatorial Optimization and Heuristic Optimization, Simulated Annealing Like Algorithms, Simulated Annealing, Threshold Accepting |
18 | Luisa Franconi, Silvia Polettini |
Individual Risk Estimation in µ-Argus: A Review. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
Argus software, global risk, individual risk, household data, local suppression, re-identification disclosure, threshold setting, unsafe combinations, data protection |
18 | Li-Liann Lu, Jean-Lien C. Wu, Wei-Yeh Chen |
The Study of Handoff Prediction Schemes for Resource Reservation in Mobile Multimedia Wireless Networks. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
pre-handoff zone, direction weighting, velocity threshold, dynamic resource reservation, admission control |
18 | Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano |
A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
Fault Treatment, Threshold-based mechanisms, CORBA Architectures, Fault Diagnosis, Legacy systems, Software Implemented Fault Tolerance |
18 | K. Srinathan, N. Tharani Rajan, C. Pandu Rangan |
Non-perfect Secret Sharing over General Access Structures. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
non-threshold secret sharing, non-perfect secret sharing |
18 | Nualsawat Hiransakolwong, Piotr S. Windyga, Kien A. Hua, Khanh Vu |
FASU: A Full Automatic Segmenting System for Ultrasound Images. |
WACV |
2002 |
DBLP DOI BibTeX RDF |
Ultrasound image segmentation, peak-and-valley, windows adaptive threshold, core area, Cubic Spline Interpolation, Image smoothing, Hilbert curve |
18 | Vadlamani Ravi, Hans-Jürgen Zimmermann |
A neural network and fuzzy rule base hybrid for pattern classification. |
Soft Comput. |
2001 |
DBLP DOI BibTeX RDF |
Modified threshold accepting, Neural networks, Feature selection, Fuzzy rule bases |
18 | Jaroslav Pokorný, Peter Vojtás |
A Data Model for Flexible Querying. |
ADBIS |
2001 |
DBLP DOI BibTeX RDF |
vague linguistic expressions, fuzzy Datalog, fuzzy relational algebra, threshold computation, flexible querying, fuzzy similarities |
18 | Jovisa D. Zunic |
Digital Partitions Encoding. |
Digital and Image Geometry |
2000 |
DBLP DOI BibTeX RDF |
Linear partitions, discrete moments, pattern recognition, coding, threshold functions |
18 | Dix Jia, Eryk Dutkiewicz, Joe F. Chicharo |
Performance Analysis of QoS Mechanisms in IP Networks. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
Threshold Dropping, QoS, Diffserv, Priority Scheduling |
18 | Liqiong Wei, Kaushik Roy 0001, Vivek De |
Low Voltage Low Power CMOS Design Techniques for Deep Submicron ICs. |
VLSI Design |
2000 |
DBLP DOI BibTeX RDF |
low voltage low power, multiple threshold voltages, multiple supply voltages and leakage control |
18 | Ramón Béjar, Felip Manyà |
Phase Transitions in the Regular Random 3-SAT Problem. |
ISMIS |
1999 |
DBLP DOI BibTeX RDF |
regular CNF formulas, benchmarks, satisfiability, threshold, Multiple-valued logics, phase transitions |
18 | Wan-Ching Chen, Peter I. Rockett |
Bayesian Labelling of Corners Using a Grey-Level Corner Image Model. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
Bayesian labelling, grey-level corner image model, MLP feedforward neural network, threshold-free corner detector, approximate Bayesian posterior probabilities, binary labels, pattern space sampling, classifier generalisation, low level feature extraction, robustness, backpropagation, Bayes methods, corner detection, statistical pattern recognition, real images, training data |
18 | Yu-Yau Guo, Jien-Chung Lo, Cecilia Metra |
Fast and area-time efficient Berger code checkers. |
DFT |
1997 |
DBLP DOI BibTeX RDF |
Berger code checker, ratioed FET circuit, area-time efficiency, resistive breaks, VLSI, defects, error detection codes, bridges, speed, threshold function, 32 bit, 1.2 micron |
18 | Dan Boneh, Matthew K. Franklin |
Efficient Generation of Shared RSA Keys (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
RSA, Threshold Cryptography, Multiparty computation, Primality testing |
18 | Stasys Jukna |
Finite Limits and Monotone Computations: The Lower Bounds Criterion. |
CCC |
1997 |
DBLP DOI BibTeX RDF |
real gates, lower bounds, threshold gates, monotone circuits |
18 | José Miguel-Alonso, Agustin Arruabarrena, Ramón Beivide, José A. B. Fortes |
An Empirical Evaluation of Techniques for Parallel Discrete-Event Simulation of Interconnection Networks. |
PDP |
1996 |
DBLP DOI BibTeX RDF |
interconnnection networks, synchronous simulation, Intel Paragon multicomputer, model decomposition, collaborative logical processes, process synchronization overhead, causal restrictions, message-passing network models, performance threshold, load level, scalability, parallel programming, virtual machines, message passing, multiprocessor interconnection networks, discrete event simulation, synchronisation, software performance evaluation, workload, empirical evaluation, parallel discrete-event simulation, optimistic simulation, network size, model parameters, simulator performance, message length, conservative simulation, processor number |
18 | Alfredo Restrepo, Alejandro Naranjo, Magdalenu Valderrama, Mauricio Daniels, Ramiro de la Vega |
Designing OSED's (order statistic edge detectors). |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
order statistic edge detector, order statistic filters, moving quasiranges, threshold level, edge contrast, SNR conditions, window size five, edge detection, statistical analysis, outliers, nonlinear filters, variances, linear combinations, error probabilities, expectations, error statistics, OSED |
18 | Aditya Agrawal, Magdy A. Bayoumi, Amr Elchouemi |
A new ATM congestion control scheme for shared buffer switch architectures. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
pre-emptive congestion control scheme, shared buffer switch architectures, rate-based feedback scheme, guaranteed service traffic, continuous bit-rate traffic, leaky bucket mechanism, backward explicit congestion notification feedback scheme, mean inter-arrival time, buffer threshold throttle factor, cell reject throttle factor, rate reduction delta, transient behaviour, filter time, asynchronous transfer mode, ATM networks, simulation model, ATM switch, dynamic bandwidth allocation, best-effort traffic, variable bit-rate traffic, predictive scheme |
18 | Eddy Mayoraz |
On the Power of Networks of Majority Functions. |
IWANN |
1991 |
DBLP DOI BibTeX RDF |
linear threshold function, synaptic weights quantization, majority functions, neural network, circuit complexity |
15 | Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner |
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
15 | Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen |
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
Displaying result #601 - #700 of 17373 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|