Sciweavers

3356 search results - page 26 / 672
» Thresholds and Expectation Thresholds
Sort
View
EUROSSC
2007
Springer
14 years 2 months ago
Behavior Detection Based on Touched Objects with Dynamic Threshold Determination Model
We are developing a context-aware application for use in homes, which detects high-level user behavior, such as “leaving the home” and “going to bed”, and provides services...
Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shim...
ICANN
2007
Springer
14 years 2 months ago
Control and Synchronization of Chaotic Neurons Under Threshold Activated Coupling
Abstract. We have studied the spatiotemporal behaviour of threshold coupled chaotic neurons. We observe that the chaos is controlled by threshold activated coupling, and the system...
Manish Dev Shrimali, Guoguang He, Sudeshna Sinha, ...
PROVSEC
2007
Springer
14 years 2 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
ISLPED
1999
ACM
177views Hardware» more  ISLPED 1999»
14 years 29 days ago
Low power synthesis of dual threshold voltage CMOS VLSI circuits
The use of dual threshold voltages can significantly reduce the static power dissipated in CMOS VLSI circuits. With the supply voltage at 1V and threshold voltage as low as 0.2V ...
Vijay Sundararajan, Keshab K. Parhi
ISW
1997
Springer
14 years 23 days ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang