Sciweavers

3356 search results - page 5 / 672
» Thresholds and Expectation Thresholds
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
14 years 1 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
DM
2008
52views more  DM 2008»
13 years 7 months ago
On the pebbling threshold of paths and the pebbling threshold spectrum
Andrzej Czygrinow, Glenn H. Hurlbert
CAISE
2005
Springer
14 years 1 months ago
Estimating Recall and Precision for Vague Queries in Databases
In vague queries, a user enters a value that represents some real world object and expects as the result the set of database values that represent this real world object even with ...
Raquel Kolitski Stasiu, Carlos A. Heuser, Roberto ...
IACR
2011
152views more  IACR 2011»
12 years 7 months ago
Rational distance-bounding protocols over noisy channels
We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels i...
Long H. Nguyen
ITC
1996
IEEE
99views Hardware» more  ITC 1996»
13 years 11 months ago
Detecting Delay Flaws by Very-Low-Voltage Testing
The detectability of delay flaws can be improved by testing CMOS IC's with a very low supply voltage -between 2 and 2.5 times the threshold voltage Vt of the transistors. A d...
Jonathan T.-Y. Chang, Edward J. McCluskey