Digital Library
Search: "[ keyword: Threshold ]" (6)
-
Cheong-Hyeon Choi, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication -
ChoonSung Nam, Vol. 17, No. 6, pp. 41-52, Dec. 2016
10.7472/jksii.2016.17.6.41
Keywords: 3D-Touch, Force Touch, Virtual 3D-Touch, Smart Device, force threshold -
Heungmo Ryang, Unil Yun, Chulhong Kim, Vol. 16, No. 6, pp. 89-96, Dec. 2015
10.7472/jksii.2015.16.6.89
Keywords: High utility patterns, Top-K mining, Threshold setting, High utility pattern mining, Top-K high utility pattern mining, Performance Analysis -
Hyeonwoo Kim, Dongwoo Kwon, Hongtaek Ju, Vol. 16, No. 2, pp. 27-40, Apr. 2015
10.7472/jksii.2015.16.2.27
Keywords: Stateless Firewall, Policy Inference, Attack Detection Threshold, Active Probing, Inference Parameters, Sweep-line Algorithm -
Yun-Kyung Kim, Sung-Mok Kim, Hyung-Suk Lho, We-Duke Cho, Vol. 12, No. 3, pp. 17-26, Jun. 2011
Keywords: step count, fri-axial accelerometer, Heuristic Algorithm, Adaptive Threshold Algorithm, Adaptive Locking Period Algorithm -
Oh Heung-Ryongl, Yoon Ho-Sun, Youm Heung-Youl, Vol. 6, No. 3, pp. 17-30, Jun. 2005
Keywords: PAK, MTL, Threshold, Secret Sharing
Category Search
Publications
-
Vol. 25, 2024
-
Vol. 24, 2023
-
Vol. 23, 2022
-
Vol. 22, 2021
-
Vol. 21, 2020
-
Vol. 20, 2019
-
Vol. 19, 2018
-
Vol. 18, 2017
-
Vol. 17, 2016
-
Vol. 16, 2015
-
Vol. 15, 2014
-
Vol. 14, 2013
-
Vol. 13, 2012
-
Vol. 12, 2011
-
Vol. 11, 2010
-
Vol. 10, 2009
-
Vol. 9, 2008
-
Vol. 8, 2007
-
Vol. 7, 2006
-
Vol. 6, 2005
-
Vol. 5, 2004
-
Vol. 4, 2003
-
Vol. 3, 2002
-
Vol. 2, 2001
-
Vol. 1, 2000