Sciweavers

3356 search results - page 58 / 672
» Thresholds and Expectation Thresholds
Sort
View
EVOW
2004
Springer
14 years 2 months ago
Evolutionary Search of Thresholds for Robust Feature Set Selection: Application to the Analysis of Microarray Data
Abstract. We deal with two important problems in pattern recognition that arise in the analysis of large datasets. While most feature subset selection methods use statistical techn...
Carlos Cotta, Christian Sloper, Pablo Moscato
ICICS
2001
Springer
14 years 1 months ago
Threshold Undeniable RSA Signature Scheme
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almo...
Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Z...
ASIACRYPT
1999
Springer
14 years 1 months ago
Periodical Multi-secret Threshold Cryptosystems
A periodical multi-secret threshold cryptosystem enables a sender to encrypt a message by using a cyclical sequence of keys which are shared by n parties and periodically updated. ...
Masayuki Numao
INFOCOM
1998
IEEE
14 years 29 days ago
Threshold Autoregressive Models for VBR MPEG Video Traces
In this paper variable bit rate VBR Moving Picture Experts Group (MPEG) coded full-motion video traffic is modeled by a nonlinear time-series process. The threshold autoregressive ...
Bongseog Jang, Charles Thomson
EUC
2008
Springer
13 years 10 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...