Sciweavers

2059 search results - page 23 / 412
» A Directed Threshold - Signature Scheme
Sort
View
145
Voted
CLA
2006
15 years 3 months ago
Direct Factorization by Similarity of Fuzzy Concept Lattices by Factorization of Input Data
The paper presents additional results on factorization by similarity of fuzzy concept lattices. A fuzzy concept lattice is a hierarchically ordered collection of clusters extracted...
Radim Belohlávek, Jan Outrata, Vilém...
105
Voted
IJON
2008
177views more  IJON 2008»
15 years 1 months ago
An asynchronous recurrent linear threshold network approach to solving the traveling salesman problem
In this paper, an approach to solving the classical Traveling Salesman Problem (TSP) using a recurrent network of linear threshold (LT) neurons is proposed. It maps the classical ...
Eu Jin Teoh, Kay Chen Tan, H. J. Tang, Cheng Xiang...
VC
2008
93views more  VC 2008»
15 years 1 months ago
Efficient product sampling using hierarchical thresholding
Abstract We present an efficient method for importance sampling the product of multiple functions. Our algorithm computes a quick approximation of the product on-the-fly, based on ...
Fabrice Rousselle, Petrik Clarberg, Luc Leblanc, V...
78
Voted
INFOCOM
2009
IEEE
15 years 8 months ago
A Threshold Based MAC Protocol for Cooperative MIMO Transmissions
— This paper develops a distributed, threshold based MAC protocol for cooperative Multi Input Multi Output (MIMO) transmissions in distributed wireless systems. The protocol uses...
Haiming Yang, Hsin-Yi Shen, Biplab Sikdar, Shivkum...
ASIACRYPT
1999
Springer
15 years 6 months ago
Periodical Multi-secret Threshold Cryptosystems
A periodical multi-secret threshold cryptosystem enables a sender to encrypt a message by using a cyclical sequence of keys which are shared by n parties and periodically updated. ...
Masayuki Numao