نتایج جستجو برای: threshold access structures

تعداد نتایج: 880041  

2015
Rohit Lorenzo Saurabh Chaudhury

In this paper a new SRAM cell is designed with a body bias controller to control leakage, speed and stability. A novel controller circuit is proposed to control the value of threshold voltage. Operation of the proposed controller is based on word line signal levels. In order to reduce sub threshold leakage current, the NMOS access and driver transistor is adjusted to a higher threshold voltage....

Journal: :CoRR 2005
Hao Chen

It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink( see [17], [18] a...

2006
Uwe Tangen

Several types of micro-controllers are put into a primordial soup abstracted as a ring. The special feature of this setup is that self-replication is not possible. Microcontrollers only have access to foreign program-code not to their own. It turns out that the seeding programs vanish long before being able to proliferate when each program is automatically granted access to the neighboring code...

Journal: :International Journal of Image, Graphics and Signal Processing 2014

2001
Jay R. Moorman John W. Lockwood

This paper presents a call admission control (CAC) algorithm that aids in the Quality of Service (QoS) support in a wireless network base station. The Threshold Access Sharing (TAS) scheme provides improved performance over generalized methods of current CAC algorithms. The TAS algorithm relies on a prioritization of admitted traffic through bandwidth thresholds. This is particularly vital for ...

Journal: :IET Information Security 2015
Nasrollah Pakniat Mahnaz Noroozi Ziba Eslami

A distributed key generation (DKG) protocol is a central component in distributed cryptosystems. It allows a group of participants to jointly generate a pair of keys (private key and public key) without assuming any trusted participant. The public key is output in clear but only authorised subgroups of participants are able to reconstruct or use the private key. Existing literature on DKG proto...

Journal: :J. Visual Communication and Image Representation 2014
Nasrollah Pakniat Mahnaz Noroozi Ziba Eslami

A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...

Journal: :PLoS Biology 2007
Antoine Del Cul Sylvain Baillet Stanislas Dehaene

When a flashed stimulus is followed by a backward mask, subjects fail to perceive it unless the target-mask interval exceeds a threshold duration of about 50 ms. Models of conscious access postulate that this threshold is associated with the time needed to establish sustained activity in recurrent cortical loops, but the brain areas involved and their timing remain debated. We used high-density...

2007
Frédéric Cuppens Céline Coma

There has been for several years a growing interest in defining new access control models and administration facilities for these models. Several models have observed that only structuring the model using the concept of roles as in RBAC is not sufficient to administer decentralized enterprises. These models have suggested to consider new concepts such as organization (as in OrBAC) or domain (as...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید