Sciweavers

2990 search results - page 65 / 598
» Thresholding for Change Detection
Sort
View
ICDCN
2009
Springer
14 years 3 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
14 years 20 days ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
TWC
2008
154views more  TWC 2008»
13 years 8 months ago
Threshold Selection for SNR-based Selective Digital Relaying in Cooperative Wireless Networks
This paper studies selective relaying schemes based on signal-to-noise-ratio (SNR) to minimize the end-to-end (e2e) bit error rate (BER) in cooperative digital relaying systems usi...
Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan,...
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 8 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
WWW
2005
ACM
14 years 9 months ago
Web log mining with adaptive support thresholds
With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are bas...
Jian Chih Ou, Chang-Hung Lee, Ming-Syan Chen