Sciweavers

525 search results - page 15 / 105
» Threshold Schemes with Disenrollment
Sort
View
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
ISM
2008
IEEE
161views Multimedia» more  ISM 2008»
14 years 4 months ago
Deblocking of Block-Transform Compressed Images Using Phase-Adaptive Shifted Thresholding
Many popular image compression schemes are based on block-transform coding, a technique where images are broken into small blocks of pixels prior to transformation and compression...
Alexander Wong, William Bishop
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 10 months ago
A geometric approach to monitoring threshold functions over distributed data streams
Monitoring data streams in a distributed system is the focus of much research in recent years. Most of the proposed schemes, however, deal with monitoring simple aggregated values...
Izchak Sharfman, Assaf Schuster, Daniel Keren
DM
2011
264views Education» more  DM 2011»
13 years 5 months ago
Connectivity threshold and recovery time in rank-based models for complex networks
The World Wide Web may be viewed as a graph each of whose vertices corresponds to a static HTML web page, and each of whose edges corresponds to a hyperlink from one web page to an...
Pawel Pralat
SCALESPACE
2009
Springer
14 years 4 months ago
An Unconstrained Multiphase Thresholding Approach for Image Segmentation
Abstract. In this paper we provide a method to find global minimizers of certain non-convex 2-phase image segmentation problems. This is achieved by formulating a convex minimizat...
Benjamin Berkels