Sciweavers

397 search results - page 6 / 80
» The Threshold of Event Simultaneity
Sort
View
IEEECIT
2005
IEEE
14 years 28 days ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
BIOSYSTEMS
2008
75views more  BIOSYSTEMS 2008»
13 years 7 months ago
Using matrix of thresholding partial correlation coefficients to infer regulatory network
DNA arrays measure the expression levels for thousands of genes simultaneously under different conditions. These measurements reflect many aspects of the underlying biological pro...
Lide Han, Jun Zhu
ICCD
2005
IEEE
124views Hardware» more  ICCD 2005»
14 years 4 months ago
A Thermally-Aware Methodology for Design-Specific Optimization of Supply and Threshold Voltages in Nanometer Scale ICs
As CMOS technology scales deeper into the nanometer regime, factors such as leakage power and chip temperature emerge as critically important concerns for VLSI design. This paper,...
Sheng-Chih Lin, Navin Srivastava, Kaustav Banerjee
CONNECTION
2006
101views more  CONNECTION 2006»
13 years 7 months ago
Learning acceptable windows of contingency
By learning a range of possible times over which the effect of an action can take place, a robot can reason more effectively about causal and contingent relationships in the world...
Kevin Gold, Brian Scassellati
IPPS
2007
IEEE
14 years 1 months ago
Aggregate Threshold Queries in Sensor Networks
— An important class of queries over sensor networks are network-wide aggregation queries. In this work we study a class of aggregation queries which we refer to as aggregate thr...
Izchak Sharfman, Assaf Schuster, Daniel Keren