Sciweavers

2059 search results - page 25 / 412
» A Directed Threshold - Signature Scheme
Sort
View
120
Voted
ICMCS
2006
IEEE
113views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Steganalysis based on Markov Model of Thresholded Prediction-Error Image
A steganalysis system based on 2-D Markov chain of thresholded prediction-error image is proposed in this paper. Image pixels are predicted with their neighboring pixels, and the ...
Dekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan
TCC
2010
Springer
178views Cryptology» more  TCC 2010»
15 years 10 months ago
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new choice of parameters. By a recent classical reduction by Peikert we prove the scheme sema...
Rikke Bendlin, Ivan Damgård
AUSDM
2006
Springer
137views Data Mining» more  AUSDM 2006»
15 years 5 months ago
A Study of Local and Global Thresholding Techniques in Text Categorization
Feature Filtering is an approach that is widely used for dimensionality reduction in text categorization. In this approach feature scoring methods are used to evaluate features le...
Nayer M. Wanas, Dina A. Said, Nevin M. Darwish, Na...
129
Voted
TWC
2008
154views more  TWC 2008»
15 years 1 months ago
Threshold Selection for SNR-based Selective Digital Relaying in Cooperative Wireless Networks
This paper studies selective relaying schemes based on signal-to-noise-ratio (SNR) to minimize the end-to-end (e2e) bit error rate (BER) in cooperative digital relaying systems usi...
Furuzan Atay Onat, Abdulkareem Adinoyi, Yijia Fan,...
CORR
2007
Springer
126views Education» more  CORR 2007»
15 years 1 months ago
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
—This paper addresses three issues in the field of ad hoc network capacity: the impact of i) channel fading, ii) channel inversion power control, and iii) threshold–based sche...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal