Sciweavers

3356 search results - page 140 / 672
» Thresholds and Expectation Thresholds
Sort
View
DSN
2000
IEEE
15 years 5 months ago
Dynamic Byzantine Quorum Systems
Byzantine quorum systems [13] enhance the availability and efficiency of fault-tolerant replicated services when servers may suffer Byzantine failures. An important limitation of...
Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkh...
TRECVID
2007
15 years 1 months ago
BUPT at TRECVID 2007: Shot Boundary Detection
In this paper we describe our methodologies and evaluation results for the shot boundary detection at TRECVID 2007. We submitted 10 runs results based on SVM classifiers and sever...
Zhi-Cheng Zhao, Xing Zeng, Tao Liu, An-Ni Cai
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 7 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
JSAC
2011
105views more  JSAC 2011»
14 years 7 months ago
Capacity- and Bayesian-Based Cognitive Sensing with Location Side Information
— We investigate spectrum sensing by energy detection based on two different objective functions: a Bayesian sensing cost or the network weighted sum capacity. The Bayesian cost ...
Peng Jia, Mai Vu, Tho Le-Ngoc, Seung-Chul Hong, Va...
111
Voted
ISBI
2011
IEEE
14 years 4 months ago
Discriminative persistent homology of brain networks
It is known that the brain network has small-world and scalefree topology, but the network structures drastically change depending on how to threshold a connectivity matrix. The e...
Hyekyoung Lee, Moo K. Chung, Hyejin Kang, Bung-Nyu...