Sciweavers

3356 search results - page 17 / 672
» Thresholds and Expectation Thresholds
Sort
View
ASIACRYPT
2001
Springer
15 years 4 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
AAAI
2006
15 years 1 months ago
Thresholding for Making Classifiers Cost-sensitive
In this paper we propose a very simple, yet general and effective method to make any cost-insensitive classifiers (that can produce probability estimates) cost-sensitive. The meth...
Victor S. Sheng, Charles X. Ling
IM
2008
14 years 11 months ago
The Structure of Geographical Threshold Graphs
We analyze the structure of random graphs generated by the geographical threshold model. The model is a generalization of random geometric graphs. Nodes are distributed in space, a...
Milan Bradonjic, Aric A. Hagberg, Allon G. Percus
ICPR
2008
IEEE
15 years 6 months ago
Double-edge-model based character stroke extraction from complex backgrounds
Global gray-level thresholding techniques such as Otsu’s method, and local gray-level thresholding techniques such as adaptive thresholding method are powerful in extracting cha...
Jing Yu, Lei Huang, Changping Liu
SAT
2004
Springer
117views Hardware» more  SAT 2004»
15 years 5 months ago
A Random Constraint Satisfaction Problem That Seems Hard for DPLL
Abstract. This paper discusses an NP-complete constraint satisfaction problem which appears to share many of the threshold characteristics of SAT but is similar to XOR-SAT and so i...
Harold S. Connamacher