Sciweavers

525 search results - page 76 / 105
» Threshold Schemes with Disenrollment
Sort
View
EUROCRYPT
2004
Springer
15 years 5 months ago
Practical Large-Scale Distributed Key Generation
Generating a distributed key, where a constant fraction of the players can reconstruct the key, is an essential component of many largescale distributed computing tasks such as ful...
John F. Canny, Stephen Sorkin
INFOCOM
2003
IEEE
15 years 5 months ago
Impact of Interferences on Connectivity in Ad Hoc Networks
Abstract— We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set...
Olivier Dousse, François Baccelli, Patrick ...
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
15 years 5 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
COLT
2003
Springer
15 years 5 months ago
Maximum Margin Algorithms with Boolean Kernels
Recent work has introduced Boolean kernels with which one can learn linear threshold functions over a feature space containing all conjunctions of length up to k (for any 1 ≤ k ...
Roni Khardon, Rocco A. Servedio

Publication
336views
15 years 5 months ago
A Discriminative approach for Wavelet Shrinkage Denoising
This paper suggests a discriminative approach for wavelet denoising where a set of mapping functions (MF) are applied to the transform coefficients in an attempt to produce a noi...
Yacov Hel-Or and Doron Shaked