Digital Library
Search: "[ keyword: Threshold ]" (6)
-
Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication -
ChoonSung Nam, Vol. 17, No. 6, pp. 41-52, Dec. 2016
10.7472/jksii.2016.17.6.41
Keywords: 3D-Touch, Force Touch, Virtual 3D-Touch, Smart Device, force threshold -
Heungmo Ryang, Unil Yun, Chulhong Kim, Vol. 16, No. 6, pp. 89-96, Dec. 2015
10.7472/jksii.2015.16.6.89
Keywords: High utility patterns, Top-K mining, Threshold setting, High utility pattern mining, Top-K high utility pattern mining, Performance Analysis -
Hyeonwoo Kim, Dongwoo Kwon, Hongtaek Ju, Vol. 16, No. 2, pp. 27-40, Apr. 2015
10.7472/jksii.2015.16.2.27
Keywords: Stateless Firewall, Policy Inference, Attack Detection Threshold, Active Probing, Inference Parameters, Sweep-line Algorithm -
Yun-Kyung Kim, Sung-Mok Kim, Hyung-Suk Lho, We-Duke Cho, Vol. 12, No. 3, pp. 17-26, Jun. 2011
Keywords: step count, fri-axial accelerometer, Heuristic Algorithm, Adaptive Threshold Algorithm, Adaptive Locking Period Algorithm -
Oh Heung-Ryongl, Yoon Ho-Sun, Youm Heung-Youl, Vol. 6, No. 3, pp. 17-30, Jun. 2005
Keywords: PAK, MTL, Threshold, Secret Sharing




