Sciweavers

3356 search results - page 59 / 672
» Thresholds and Expectation Thresholds
Sort
View
CSREASAM
2006
13 years 10 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
DICTA
2003
13 years 10 months ago
Color Image Segmentation based on Automatic Derivation of Local Thresholds
 In this paper a new method for color image segmentation is presented.  The  proposed  algorithm  divides  the  image  into  homogeneous  regions  by  deriva...
Ety Navon, Ofer Miller, Amir Averbuch
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 8 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
CSDA
2007
105views more  CSDA 2007»
13 years 8 months ago
GSA-based maximum likelihood estimation for threshold vector error correction model
The log-likelihood function of threshold vector error correction models is neither differentiable, nor smooth with respect to some parameters. Therefore, it is very difficult to ...
Zheng Yang, Zheng Tian, Zixia Yuan
CORR
2008
Springer
161views Education» more  CORR 2008»
13 years 7 months ago
An application of the Threshold Accepting metaheuristic for curriculum based course timetabling
The article presents a local search approach for the solution of timetabling problems in general, with a particular implementation for competition track 3 of the International Time...
Martin Josef Geiger