Sciweavers

3356 search results - page 17 / 672
» Thresholds and Expectation Thresholds
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
AAAI
2006
13 years 10 months ago
Thresholding for Making Classifiers Cost-sensitive
In this paper we propose a very simple, yet general and effective method to make any cost-insensitive classifiers (that can produce probability estimates) cost-sensitive. The meth...
Victor S. Sheng, Charles X. Ling
IM
2008
13 years 8 months ago
The Structure of Geographical Threshold Graphs
We analyze the structure of random graphs generated by the geographical threshold model. The model is a generalization of random geometric graphs. Nodes are distributed in space, a...
Milan Bradonjic, Aric A. Hagberg, Allon G. Percus
ICPR
2008
IEEE
14 years 3 months ago
Double-edge-model based character stroke extraction from complex backgrounds
Global gray-level thresholding techniques such as Otsu’s method, and local gray-level thresholding techniques such as adaptive thresholding method are powerful in extracting cha...
Jing Yu, Lei Huang, Changping Liu
SAT
2004
Springer
117views Hardware» more  SAT 2004»
14 years 1 months ago
A Random Constraint Satisfaction Problem That Seems Hard for DPLL
Abstract. This paper discusses an NP-complete constraint satisfaction problem which appears to share many of the threshold characteristics of SAT but is similar to XOR-SAT and so i...
Harold S. Connamacher