Sciweavers

3356 search results - page 73 / 672
» Thresholds and Expectation Thresholds
Sort
View
CRYPTO
1992
Springer
168views Cryptology» more  CRYPTO 1992»
14 years 25 days ago
Threshold Schemes with Disenrollment
Blakley, Blakley, Chan and Massey conjectured a lower bound on the entropy of broadcast messages in threshold schemes with disenrollment. In an effort to examine the conjecture, w...
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James ...
BIOSYSTEMS
2008
75views more  BIOSYSTEMS 2008»
13 years 9 months ago
Using matrix of thresholding partial correlation coefficients to infer regulatory network
DNA arrays measure the expression levels for thousands of genes simultaneously under different conditions. These measurements reflect many aspects of the underlying biological pro...
Lide Han, Jun Zhu
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 8 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
IJON
2008
177views more  IJON 2008»
13 years 8 months ago
An asynchronous recurrent linear threshold network approach to solving the traveling salesman problem
In this paper, an approach to solving the classical Traveling Salesman Problem (TSP) using a recurrent network of linear threshold (LT) neurons is proposed. It maps the classical ...
Eu Jin Teoh, Kay Chen Tan, H. J. Tang, Cheng Xiang...
JCM
2008
74views more  JCM 2008»
13 years 8 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...