219 papers:
- DATE-2015-AmirhosseinRBCM #power management
- An all-digital spike-based ultra-low-power IR-UWB dynamic average threshold crossing scheme for muscle force wireless transmission (MSA, PMR, AB, MC, MM, DD, GM), pp. 1479–1484.
- ICSME-2015-OliveiraVBS #developer #metric #validation
- Validating metric thresholds with developers: An early result (PO, MTV, AB, AS), pp. 546–550.
- SANER-2015-Keivanloo0Z #clone detection #detection #java #repository #scalability
- Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
- STOC-2015-MosselNS #consistency
- Consistency Thresholds for the Planted Bisection Model (EM, JN, AS), pp. 69–75.
- ICALP-v1-2015-CzyzowiczGKKSU #convergence #on the #protocol
- On Convergence and Threshold Properties of Discrete Lotka-Volterra Population Protocols (JC, LG, AK, EK, PGS, PU), pp. 393–405.
- LATA-2015-AmanoS #bound #multi #polynomial
- A Nonuniform Circuit Class with Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower Bounds Against NEXP (KA, AS), pp. 461–472.
- ICML-2015-MiyauchiIFK
- Threshold Influence Model for Allocating Advertising Budgets (AM, YI, TF, NK), pp. 1395–1404.
- SPLC-2015-ValeAFG #case study #comparative #metric #product line
- Defining metric thresholds for software product lines: a comparative study (GV, DA, EF, AFG), pp. 176–185.
- CAV-2015-KonnovVW #abstraction #algorithm #distributed #model checking #smt
- SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms (IK, HV, JW), pp. 85–102.
- CASE-2014-JinNHXC #policy
- Threshold-type admission policy for remanufacturing systems (XJ, JN, SJH, GX, QC), pp. 467–473.
- DAC-2014-ChenWLWSC #design #monitoring #scalability
- Critical Path Monitor Enabled Dynamic Voltage Scaling for Graceful Degradation in Sub-Threshold Designs (YGC, TW, KYL, WYW, YS, SCC), p. 6.
- DATE-2014-GemmekeSSRCA #memory management
- Resolving the memory bottleneck for single supply near-threshold computing (TG, MMS, JS, PR, FC, DA), pp. 1–6.
- DATE-2014-LinWCH #logic
- Rewiring for threshold logic circuit minimization (CCL, CYW, YCC, CYH), pp. 1–6.
- DATE-2014-SilvanoPXS #architecture #manycore
- Voltage island management in near threshold manycore architectures to mitigate dark silicon (CS, GP, SX, ISS), pp. 1–6.
- DATE-2014-ZangenehJ #design #feedback #logic #using
- Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
- ITiCSE-2014-TedreBMC #classification #concept #education #identification #towards
- Towards identification and classification of core and threshold concepts in methodology education in computing (MT, DB, SMB, JCC), pp. 237–242.
- CSMR-WCRE-2014-OliveiraVL #metric #source code
- Extracting relative thresholds for source code metrics (PO, MTV, FPL), pp. 254–263.
- ICSME-2014-OliveiraLVS #metric #named #source code
- RTTool: A Tool for Extracting Relative Thresholds for Source Code Metrics (PO, FPL, MTV, AS), pp. 629–632.
- STOC-2014-Coja-Oghlan #satisfiability
- The asymptotic k-SAT threshold (ACO), pp. 804–813.
- STOC-2014-DeS #approximate #performance #polynomial
- Efficient deterministic approximate counting for low-degree polynomial threshold functions (AD, RAS), pp. 832–841.
- STOC-2014-DingSS #random #satisfiability
- Satisfiability threshold for random regular NAE-SAT (JD, AS, NS), pp. 814–822.
- STOC-2014-Massoulie #community #detection
- Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
- STOC-2014-SharmaV #multi
- Multiway cut, pairwise realizable distributions, and descending thresholds (AS, JV), pp. 724–733.
- STOC-2014-Williams #algorithm #bound #linear
- New algorithms and lower bounds for circuits with linear threshold gates (RW), pp. 194–202.
- CIAA-2014-GusevP #automaton
- Reset Thresholds of Automata with Two Cycle Lengths (VVG, EVP), pp. 200–210.
- ICALP-v1-2014-TulsianiWZ #game studies #graph #parallel #rank
- Optimal Strong Parallel Repetition for Projection Games on Low Threshold Rank Graphs (MT, JW, YZ), pp. 1003–1014.
- CSCW-2014-ChengB #named
- Catalyst: triggering collective action with thresholds (JC, MSB), pp. 1211–1221.
- LCT-NLE-2014-WangLC #learning #online #student
- Low-Achieving Students’ Perceptions of Online Language Learning: A Case of English Proficiency Threshold (ALW, YCL, SFC), pp. 250–258.
- ICML-c2-2014-DaneshmandGSS #algorithm #complexity #network
- Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm (HD, MGR, LS, BS), pp. 793–801.
- ICML-c2-2014-YuanLZ #optimisation
- Gradient Hard Thresholding Pursuit for Sparsity-Constrained Optimization (XY, PL, TZ), pp. 127–135.
- ICPR-2014-AghdamPS #adaptation #probability #segmentation
- Adaptive Probabilistic Thresholding Method for Accurate Breast Region Segmentation in Mammograms (HHA, DP, AS), pp. 3357–3362.
- ICPR-2014-GuptaP #adaptation
- Adaptive-Threshold Region Merging via Path Scanning (GG, AP), pp. 948–953.
- ICPR-2014-MoriKNK #detection #using #video
- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
- KDD-2014-SchubertWK #detection #named #scalability #topic
- SigniTrend: scalable detection of emerging topics in textual streams by hashed significance thresholds (ES, MW, HPK), pp. 871–880.
- KDD-2014-XiangYY
- Simultaneous feature and feature group selection through hard thresholding (SX, TY, JY), pp. 532–541.
- SAC-2014-FoucaultPFB #metric
- Computing contextual metric thresholds (MF, MP, JRF, XB), pp. 1120–1125.
- HPCA-2014-KarpuzcuAK #named #towards
- Accordion: Toward soft Near-Threshold Voltage Computing (URK, IA, NSK), pp. 72–83.
- DATE-2013-CaiHMM #analysis #memory management #modelling
- Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
- DATE-2013-De #design
- Near-threshold voltage design in nanoscale CMOS (VD), p. 612.
- DATE-2013-ZhaoGZ #named #scheduling
- PT-AMC: integrating preemption thresholds into mixed-criticality scheduling (QZ, ZG, HZ), pp. 141–146.
- DocEng-2013-NevesZM #adaptation #algorithm #detection #documentation #image
- An adaptive thresholding algorithm based on edge detection and morphological operations for document images (RFdPN, CZ, CABM), pp. 107–110.
- DRR-2013-LundKR #multi
- Combining multiple thresholding binarization values to improve OCR output (WBL, DJK, EKR).
- ICDAR-2013-ElzobiADES #adaptation #approach #markov #modelling #recognition
- A Hidden Markov Model-Based Approach with an Adaptive Threshold Model for Off-Line Arabic Handwriting Recognition (ME, AAH, LD, ME, AS), pp. 945–949.
- VLDB-2013-GuptaRM #data flow #distributed #query
- Ratio Threshold Queries over Distributed Data Sources (RG, KR, MKM), pp. 565–576.
- STOC-2013-Coja-OghlanP #satisfiability
- Going after the k-SAT threshold (ACO, KP), pp. 705–714.
- DHM-HB-2013-TianYZG #adaptation #representation #self
- Extraction of Light Stripe Centerline Based on Self-adaptive Thresholding and Contour Polygonal Representation (QT, YY, XZ, BG), pp. 292–301.
- ICML-c2-2013-GongZLHY #algorithm #optimisation #problem
- A General Iterative Shrinkage and Thresholding Algorithm for Non-convex Regularized Optimization Problems (PG, CZ, ZL, JH, JY), pp. 37–45.
- ICML-c3-2013-Cuturid
- Mean Reversion with a Variance Threshold (MC, Ad), pp. 271–279.
- ICML-c3-2013-ShenderL #trade-off
- Computation-Risk Tradeoffs for Covariance-Thresholded Regression (DS, JDL), pp. 756–764.
- MLDM-2013-WilliamsHFR #classification #distance #evaluation #probability
- Area under the Distance Threshold Curve as an Evaluation Measure for Probabilistic Classifiers (SW, MH, JDF, DSR), pp. 644–657.
- SIGIR-2013-ScholerKWLW #assessment
- The effect of threshold priming and need for cognition on relevance calibration and assessment (FS, DK, WCW, HSL, WW), pp. 623–632.
- HPCA-2013-KarpuzcuSKT #energy #named #towards
- EnergySmart: Toward energy-efficient manycores for Near-Threshold Computing (URK, AAS, NSK, JT), pp. 542–553.
- HPCA-2013-MahmoodKH #adaptation #architecture #named #scalability
- Macho: A failure model-oriented adaptive cache architecture to enable near-threshold voltage scaling (TM, SK, SH), pp. 532–541.
- DAC-2012-ChangH #power management
- Near-threshold operation for power-efficient computing?: it depends.. (LC, WH), pp. 1159–1163.
- DAC-2012-CropPC #detection #logic #throughput #using
- Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
- DAC-2012-KaulAHAKB #challenge #design
- Near-threshold voltage (NTV) design: opportunities and challenges (HK, MA, SH, AA, RK, SB), pp. 1153–1158.
- DAC-2012-PinckneySDFMSB #performance
- Assessing the performance limits of parallelized near-threshold computing (NRP, KS, RGD, DF, TNM, DS, DB), pp. 1147–1152.
- DAC-2012-SeoDWPCMBM #architecture #process
- Process variation in near-threshold wide SIMD architectures (SS, RGD, MW, YP, CC, SAM, DB, TNM), pp. 980–987.
- DAC-2012-SeversonYD #performance #question #reduction
- Not so fast my friend: is near-threshold computing the answer for power reduction of wireless devices? (MS, KY, YD), pp. 1164–1166.
- STOC-2012-Coja-OghlanP #satisfiability
- Catching the k-NAESAT threshold (ACO, KP), pp. 899–908.
- STOC-2012-Molloy #graph #random
- The freezing threshold for k-colourings of a random graph (MM), pp. 921–930.
- LATA-2012-Roman
- P-NP Threshold for Synchronizing Road Coloring (AR), pp. 480–489.
- ICEIS-v3-2012-TsudaASO #automation #classification
- A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
- CIKM-2012-ShangJLW #learning
- Learning spectral embedding via iterative eigenvalue thresholding (FS, LCJ, YL, FW), pp. 1507–1511.
- ICPR-2012-BoulmerkaA #segmentation #using
- Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
- KDD-2012-HuZLYH #matrix
- Accelerated singular value thresholding for matrix completion (YH, DZ, JL, JY, XH), pp. 298–306.
- LICS-2012-BundalaOW #bound #model checking #on the
- On the Magnitude of Completeness Thresholds in Bounded Model Checking (DB, JO, JW), pp. 155–164.
- DAC-2011-KimG #reliability
- Leakage-aware redundancy for reliable sub-threshold memories (SK, MRG), pp. 435–440.
- DAC-2011-ZhouJBHS #library #standard
- A 40 nm inverse-narrow-width-effect-aware sub-threshold standard cell library (JZ, SJ, BB, LH, JS), pp. 441–446.
- ICDAR-2011-KesidisG #estimation #performance #word
- Efficient Cut-Off Threshold Estimation for Word Spotting Applications (ALK, BG), pp. 279–283.
- ICALP-v2-2011-LibertY #adaptation
- Adaptively Secure Non-interactive Threshold Cryptosystems (BL, MY), pp. 588–600.
- ICEIS-v1-2011-LuoYHJCH #algorithm #named #query
- IRTA: An Improved Threshold Algorithm for Reverse Top-k Queries (CL, FY, WCH, ZJ, DC, SH), pp. 135–140.
- ICEIS-v2-2011-TarsauliyaTS #network #search-based #using
- Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
- ECIR-2011-AddisAV #algorithm #assessment #categorisation #comparative
- A Comparative Experimental Assessment of a Threshold Selection Algorithm in Hierarchical Text Categorization (AA, GA, EV), pp. 32–42.
- SAC-2011-Sanchez-GonzalezRGC #complexity #control flow #metric #modelling #towards
- Towards thresholds of control flow complexity measures for BPMN models (LSG, FR, FG, JC), pp. 1445–1450.
- HPCA-2011-AnsariFGM #design #named #polymorphism #robust
- Archipelago: A polymorphic cache design for enabling robust near-threshold operation (AA, SF, SG, SAM), pp. 539–550.
- CAV-2011-KroeningOSWW #bound #linear #model checking
- Linear Completeness Thresholds for Bounded Model Checking (DK, JO, OS, TW, JW), pp. 557–572.
- VMCAI-2011-ChadhaSV #automaton #probability
- Probabilistic Büchi Automata with Non-extremal Acceptance Thresholds (RC, APS, MV), pp. 103–117.
- DATE-2010-LotzeGM #modelling
- Timing modeling for digital sub-threshold circuits (NL, JG, YM), pp. 299–302.
- SIGMOD-2010-PerezAJ #evaluation #probability #query
- Evaluation of probabilistic threshold queries in MCDB (LLP, SA, CMJ), pp. 687–698.
- SIGMOD-2010-QiJSP #nondeterminism #optimisation #query
- Threshold query optimization for uncertain data (YQ, RJ, SS, SP), pp. 315–326.
- VLDB-2011-SagyKSS10 #difference #distributed #query #representation
- Distributed Threshold Querying of General Functions by a Difference of Monotonic Representation (GS, DK, IS, AS), pp. 46–57.
- ICSM-2010-AlvesYV #benchmark #metric
- Deriving metric thresholds from benchmark data (TLA, CY, JV), pp. 1–10.
- STOC-2010-DiakonikolasHKMRST #bound #polynomial
- Bounding the average sensitivity and noise sensitivity of polynomial threshold functions (ID, PH, AK, RM, PR, RAS, LYT), pp. 533–542.
- STOC-2010-GaoW #random
- Load balancing and orientability thresholds for random hypergraphs (PG, NCW), pp. 97–104.
- STOC-2010-MekaZ #generative #polynomial #pseudo
- Pseudorandom generators for polynomial threshold functions (RM, DZ), pp. 427–436.
- ICALP-v1-2010-Cheraghchi #adaptation #testing
- Improved Constructions for Non-adaptive Threshold Group Testing (MC), pp. 552–564.
- ICALP-v1-2010-DietzfelbingerGMMPR #satisfiability
- Tight Thresholds for Cuckoo Hashing via XORSAT (MD, AG, MM, AM, RP, MR), pp. 213–225.
- ICALP-v1-2010-GuptaNR #algorithm #optimisation #robust
- Thresholded Covering Algorithms for Robust and Max-min Optimization (AG, VN, RR), pp. 262–274.
- CIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query #using
- Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
- CIKM-2010-KotaN #behaviour #network #social
- Threshold behavior of incentives in social networks (NK, YN), pp. 1461–1464.
- ICPR-2010-BushraOEO #detection #linear
- QRS Complex Detection by Non Linear Thresholding of Modulus Maxima (BJ, OB, EF, OL), pp. 4500–4503.
- ICPR-2010-ChenZCY #image #segmentation
- Active Contours with Thresholding Value for Image Segmentation (GC, HZ, IC, WY), pp. 2266–2269.
- ICPR-2010-FuGJ #image #segmentation
- Patchy Aurora Image Segmentation Based on ALBP and Block Threshold (RF, XG, YJ), pp. 3380–3383.
- ICPR-2010-KiwanukaW #automation
- Automatic Attribute Threshold Selection for Blood Vessel Enhancement (FNK, MHFW), pp. 2314–2317.
- ICPR-2010-MakiharaHY #how #question
- How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
- ICPR-2010-Ramirez-OrtegonR10a #documentation
- Transition Thresholds for Binarization of Historical Documents (MARO, RR), pp. 2362–2365.
- SAT-2010-BoufkhadH #bound #satisfiability
- Non Uniform Selection of Solutions for Upper Bounding the 3-SAT Threshold (YB, TH), pp. 99–112.
- SAT-2010-RathiARS #bound #random #satisfiability
- Bounds on Threshold of Regular Random k-SAT (VR, EA, LKR, MS), pp. 264–277.
- CASE-2009-KumarB #multi
- Multi-agent model for threshold constrained portfolio selection (RK, SB), pp. 140–145.
- DAC-2009-BawiecN #logic #synthesis
- Boolean logic function synthesis for generalised threshold gate circuits (MAB, MN), pp. 83–86.
- ICDAR-2009-EstradaT
- Manuscript Bleed-through Removal via Hysteresis Thresholding (RE, CT), pp. 753–757.
- ICDAR-2009-Tanaka #documentation #image
- Threshold Correction of Document Image Binarization for Ruled-line Extraction (HT), pp. 541–545.
- STOC-2009-RabaniS #linear
- Explicit construction of a small epsilon-net for linear threshold functions (YR, AS), pp. 649–658.
- HIMI-DIE-2009-NakagawaNM #using
- Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
- SIGIR-2009-ArampatzisKR #optimisation #using
- Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
- CASE-2008-KuanCJ #modelling
- Method for proposing sort screen thresholds based on modeling etest/sort-class in semiconductor manufacturing (WKY, LCC, WJL), pp. 236–241.
- DAC-2008-FeldmannASSBG #analysis #modelling #multi
- Driver waveform computation for timing analysis with multiple voltage threshold driver models (PF, SA, DS, GS, RB, HG), pp. 425–428.
- DAC-2008-YeLNC #modelling #simulation #statistics
- Statistical modeling and simulation of threshold variation under dopant fluctuations and line-edge roughness (YY, FL, SRN, YC), pp. 900–905.
- DocEng-2008-SturgillS #algorithm #approach #recognition
- An optical character recognition approach to qualifying thresholding algorithms (MS, SJS), pp. 263–266.
- DRR-2008-ShafaitKB #adaptation #image #implementation #performance #using
- Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
- SIGMOD-2008-HuaPZL #approach #nondeterminism #probability #query #ranking
- Ranking queries on uncertain data: a probabilistic threshold approach (MH, JP, WZ, XL), pp. 673–686.
- MSR-2008-HataMK #precise #using
- An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
- ICALP-A-2008-KempeRUW #bound #fault tolerance #quantum
- Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing (JK, OR, FU, RdW), pp. 845–856.
- CHI-2008-GaverBLPBBHKVW
- Threshold devices: looking out from the home (WWG, AB, AL, SP, JB, JB, JH, TK, NV, AW), pp. 1429–1438.
- ICPR-2008-XiaoCZ #correlation
- Entropic thresholding based on gray-level spatial correlation histogram (YX, ZC, TZ), pp. 1–4.
- SIGIR-2008-LeeKJ #algorithm #constraints #learning
- Fixed-threshold SMO for Joint Constraint Learning Algorithm of Structural SVM (CL, HK, MGJ), pp. 829–830.
- SIGIR-2008-ScholerT
- Relevance thresholds in system evaluations (FS, AT), pp. 693–694.
- SAT-2008-Gao #algorithm #complexity #problem #random
- Random Instances of W[2]-Complete Problems: Thresholds, Complexity, and Algorithms (YG), pp. 91–104.
- DAC-2007-GuSK #modelling #random #statistics
- Width-dependent Statistical Leakage Modeling for Random Dopant Induced Threshold Voltage Shift (JG, SSS, CHK), pp. 87–92.
- DATE-2007-MogalB #architecture #reduction
- Microarchitecture floorplanning for sub-threshold leakage reduction (HM, KB), pp. 1238–1243.
- DocEng-2007-LuT #documentation #image
- Thresholding of badly illuminated document images through photometric correction (SL, CLT), pp. 3–8.
- DocEng-2007-Mello #algorithm #documentation #image
- A new Tsallis entropy-based thresholding algorithm for images of historical documents (CABM), pp. 32–34.
- ICDAR-2007-MelloBZM #algorithm #performance
- An Efficient Thresholding Algorithm for Brazilian Bank Checks (CABM, BLDB, CZ, VM), pp. 193–197.
- ECIR-2007-KimY #collaboration #effectiveness
- An Effective Threshold-Based Neighbor Selection in Collaborative Filtering (THK, SBY), pp. 712–715.
- DATE-2006-AmelifardFP #using
- Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
- DATE-2006-RaychowdhuryPBR #case study #comparative #power management
- Ultralow power computing with sub-threshold leakage: a comparative study of bulk and SOI technologies (AR, BCP, SB, KR), pp. 856–861.
- SIGMOD-2006-KeralapuraCR #distributed #monitoring
- Communication-efficient distributed monitoring of thresholded counts (RK, GC, JR), pp. 289–300.
- SIGMOD-2006-SharfmanSK #approach #data type #distributed #geometry #monitoring
- A geometric approach to monitoring threshold functions over distributed data streams (IS, AS, DK), pp. 301–312.
- ITiCSE-2006-EckerdalMMRSZ #concept #education
- Putting threshold concepts into context in computer science education (AE, RM, JEM, MR, KS, CZ), pp. 103–107.
- STOC-2006-Weitz #independence #set
- Counting independent sets up to the tree threshold (DW), pp. 140–149.
- ICALP-v1-2006-Reichardt #fault tolerance #quantum
- Fault-Tolerance Threshold for a Distance-Three Quantum Code (BR), pp. 50–61.
- ICALP-v1-2006-UchizawaDM #complexity #energy
- Energy Complexity and Entropy of Threshold Circuits (KU, RJD, WM), pp. 631–642.
- CIKM-2006-SchutzeVP #classification #performance
- Performance thresholding in practical text classification (HS, EV, JOP), pp. 662–671.
- ICPR-v2-2006-HautiereA #approach
- Visible Edges Thresholding: a HVS based Approach (NH, DA), pp. 155–158.
- DAC-2005-GaoH #multi #reduction
- Total power reduction in CMOS circuits via gate sizing and multiple threshold voltages (FG, JPH), pp. 31–36.
- DATE-2005-KitaharaKMSF #design #multi #power management #reduction
- Area-Efficient Selective Multi-Threshold CMOS Design Methodology for Standby Leakage Power Reduction (TK, NK, FM, KS, TF), pp. 646–647.
- DLT-2005-Ananichev #automaton
- The Mortality Threshold for Partially Monotonic Automata (DSA), pp. 112–121.
- SAT-J-2004-Sinopalnikov05 #random #satisfiability
- Satisfiability Threshold of the Skewed Random k-SAT (DAS), pp. 263–275.
- SAT-2005-SeitzAO #behaviour #random #satisfiability
- Threshold Behaviour of WalkSAT and Focused Metropolis Search on Random 3-Satisfiability (SS, MA, PO), pp. 475–481.
- DAC-2004-BasuLWMB #optimisation #power management
- Simultaneous optimization of supply and threshold voltages for low-power and high-performance circuits in the leakage dominant era (AB, SCL, VW, AM, KB), pp. 884–887.
- DATE-v2-2004-ZhangGZJ #logic #network #optimisation #synthesis
- Synthesis and Optimization of Threshold Logic Networks with Application to Nanotechnologies (RZ, PG, LZ, NKJ), pp. 904–909.
- PODS-2004-GarofalakisK #metric
- Deterministic Wavelet Thresholding for Maximum-Error Metrics (MNG, AK), pp. 166–176.
- VLDB-2004-ChengXPSV #nondeterminism #performance #probability #query
- Efficient Indexing Methods for Probabilistic Threshold Queries over Uncertain Data (RC, YX, SP, RS, JSV), pp. 876–887.
- STOC-2004-GoelRK #geometry #graph #random
- Sharp thresholds For monotone properties in random geometric graphs (AG, SR, BK), pp. 580–586.
- ICEIS-v1-2004-LuciaST #clone detection #identification #similarity #using #web
- Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
- ICPR-v2-2004-FeiginS #adaptation #functional #segmentation
- Segmentation and Denoising via an Adaptive Threshold Mumford-Shah-like Functional (MF, NAS), pp. 98–101.
- ICPR-v2-2004-HeY #adaptation #detection
- Curvature Scale Space Corner Detector with Adaptive Threshold and Dynamic Region of Support (XCH, NHCY), pp. 791–794.
- SAC-2004-BaralisCG #classification #on the
- On support thresholds in associative classification (EB, SC, PG), pp. 553–558.
- SAC-2004-VukadinovicT
- RED with Dynamic Thresholds for improved fairness (VV, LT), pp. 371–372.
- SAC-2004-XueguangH #contract #protocol
- Further extensions of FIPA Contract Net Protocol: threshold plus DoA (XC, HS), pp. 45–51.
- DAC-2003-LeeB #reduction
- Static leakage reduction through simultaneous threshold voltage and state assignment (DL, DB), pp. 191–194.
- ICDAR-2003-LeedhamYTTM #algorithm #comparison #documentation #image #segmentation
- Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images (GL, YC, KT, JHNT, LM), p. 859–?.
- ICDAR-2003-WuA #approach #automation #multi #using
- Automatic Thresholding of Gray-level Using Multi-stage Approach (SW, AA), pp. 493–497.
- STOC-2003-AchlioptasP #random #satisfiability
- The threshold for random k-SAT is 2k (ln 2 — O(k)) (DA, YP), pp. 223–231.
- STOC-2003-ODonnellS #bound #polynomial
- New degree bounds for polynomial threshold functions (RO, RAS), pp. 325–334.
- CIAA-2003-Trakhtman #complexity #testing
- Reducing the Time Complexity of Testing for Local Threshold Testability (AT), pp. 141–149.
- ICEIS-v2-2003-RajR #concept #database #documentation #retrieval
- Mapping Documents Onto Concept Databases for Threshold-Based Retrieval (PCRR, SR), pp. 336–343.
- CIKM-2003-ShanahanR #classification
- Boosting support vector machines for text classification through parameter-free threshold relaxation (JGS, NR), pp. 247–254.
- ICML-2003-Mesterharm #algorithm #multi #using
- Using Linear-threshold Algorithms to Combine Multi-class Sub-experts (CM), pp. 544–551.
- SAC-2003-HuangXSP #mining
- Mining Confident Colocation Rules without A Support Threshold (YH, HX, SS, JP), pp. 497–501.
- SAT-2003-Chen #algorithm #satisfiability
- An Algorithm for SAT Above the Threshold (HC), pp. 14–24.
- SAT-2003-MaarenN
- Hidden Threshold Phenomena for Fixed-Density SAT-formulae (HvM, LvN), pp. 135–149.
- DAC-2002-JungKK #logic
- Low-swing clock domino logic incorporating dual supply and dual threshold voltages (SOJ, KWK, SMK), pp. 467–472.
- DATE-2002-JungKK #logic #performance #synthesis
- Dual Threshold Voltage Domino Logic Synthesis for High Performance with Noise and Power Constrain (SOJ, KWK, SMK), pp. 260–265.
- STOC-2002-Molloy02a #constraints #modelling #problem #random
- Models and thresholds for random constraint satisfaction problems (MM), pp. 209–217.
- ICPR-v3-2002-DuC #detection #image #video
- Thresholding Video Images for Text Detection (EYD, CIC), p. 919–?.
- SAC-2002-BoughanemT #adaptation #incremental #learning
- Incremental adaptive filtering: profile learning and threshold calibration (MB, MT), pp. 640–644.
- LCTES-SCOPES-2002-KimHK #design #object-oriented #realtime #scheduling
- Perfecting preemption threshold scheduling for object-oriented real-time system design: from the perspective of real-time synchronization (SK, SH, THK), pp. 223–232.
- SAT-2002-FriezeW #named #satisfiability
- k-SAT: A tight threshold for moderately growing k (AF, NW), p. 6.
- DAC-2001-KimJSLK #optimisation #using
- Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
- STOC-2001-AchlioptasBM #complexity #proving
- A sharp threshold in proof complexity (DA, PB, MSOM), pp. 337–346.
- STOC-2001-BorgsCP #clustering #integer #problem #scalability
- Sharp threshold and scaling window for the integer partitioning problem (CB, JTC, BP), pp. 330–336.
- ICEIS-v1-2001-Rao #algorithm #clustering #multi
- An Algorithm for Determining Subspaces Containing Clusters with Multiple Minimum Density Thresholds for Numerical Data (PRR), pp. 530–532.
- SIGIR-2001-ArampatzisH #adaptation #classification #optimisation
- The Score-Distributional Threshold Optimization for Adaptive Binary Classification Tasks (AA, AvH), pp. 285–293.
- SIGIR-2001-Yang #case study #categorisation
- A Study on Thresholding Strategies for Text Categorization (YY), pp. 137–145.
- SIGIR-2001-ZhangC #estimation
- Maximum Likelihood Estimation for Filtering Thresholds (YZ, JPC), pp. 294–302.
- SAC-2001-AsciaCP #adaptation #fuzzy #performance
- An adaptive fuzzy threshold scheme for high performance shared-memory switches (GA, VC, DP), pp. 456–461.
- SAT-2001-KaporisKSVZ #revisited #satisfiability
- The unsatisfiability threshold revisited (ACK, LMK, YCS, MV, MZ), pp. 81–95.
- ICPR-v1-2000-Fernandez #similarity #using
- Implicit Model-Oriented Optimal Thresholding Using the Komolgorov-Smirnov Similarity Measure (XF), pp. 1466–1469.
- ICPR-v1-2000-PaquisLK #classification #using
- Road Surface Classification by Thresholding Using Morphological Pyramid (SP, VL, HK), pp. 1334–1337.
- ICPR-v3-2000-BouttePLC #adaptation
- Texel Extraction on Inclined Textures by Adaptive Thresholding of Local Scales (LB, JP, SL, PC), pp. 3560–3563.
- ICPR-v3-2000-GarciaV #geometry #image
- Acceleration of Thresholding and Labeling Operations through Geometric Processing of Gray-Level Images (MAG, BXV), pp. 3429–3432.
- ICPR-v3-2000-LuoT #approach #multi #using
- Multi-Level Thresholding: Maximum Entropy Approach Using ICM (XL, JT), pp. 3786–3789.
- ICPR-v3-2000-RubertoDKJ00a #automation #image #using
- Automatic Thresholding of Infected Blood Images Using Granulometry and Regional Extrema (CDR, AGD, SK, BJ), pp. 3445–3448.
- ICPR-v3-2000-SugiyamaA #detection #reliability
- Edge Detection Method Based on Edge Reliability with Fixed Thresholds: Consideration of Uniformity and Gradation (TS, KA), pp. 3660–3663.
- ICPR-v4-2000-GotoA #multi
- Character Pattern Extraction Based on Local Multilevel Thresholding and Region Growing (HG, HA), pp. 4430–4433.
- ICPR-v4-2000-OhyamaWKTS #automation #detection
- Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method (WO, TW, FK, ST, KS), pp. 4320–4323.
- SIGIR-2000-ZhaiJE #adaptation #approach #heuristic #learning
- Exploration of a heuristic approach to threshold learning in adaptive filtering (CZ, PJ, DAE), pp. 360–362.
- DAC-1999-JohnsonSR #performance
- Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS (MCJ, DS, KR), pp. 442–445.
- DAC-1999-SirichotiyakulEOZDPB #power management
- Stand-by Power Minimization Through Simultaneous Threshold Voltage Selection and Circuit Sizing (SS, TE, CO, JZ, AD, RP, DB), pp. 436–441.
- WIA-1999-Trahtman #algorithm #automaton #finite #testing #verification
- An Algorithm to Verify Local Threshold Testability of Deterministic Finite Automata (ANT), pp. 164–173.
- DAC-1998-WeiCJRD #design #optimisation #performance
- Design and Optimization of Low Voltage High Performance Dual Threshold CMOS Circuits (LW, ZC, MJ, KR, VD), pp. 489–494.
- ICPR-1998-CaiL #algorithm
- A new thresholding algorithm based on all-pole model (JC, ZQL), pp. 34–36.
- ICPR-1998-ChengC #2d #fuzzy
- Thresholding based on fuzzy partition of 2D histogram (HDC, YHC), pp. 1616–1618.
- ICPR-1998-WuML #effectiveness #image
- An effective entropic thresholding for ultrasonic images (LW, SM, HL), pp. 1552–1554.
- ICPR-1998-ZhaoO #adaptation #clustering
- Adaptive local thresholding with fuzzy-validity-guided spatial partitioning (XZ, SHO), pp. 988–990.
- LICS-1998-JohannsenP #on the #proving
- On Proofs about Threshold Circuits and Counting Hierarchies (JJ, CP), pp. 444–452.
- DAC-1997-KaoCA #multi
- Transistor Sizing Issues and Tool For Multi-Threshold CMOS Technology (JK, AC, DA), pp. 409–414.
- ICDAR-1997-AbakBS #algorithm #evaluation #performance #recognition
- The Performance Evaluation of Thresholding Algorithms for Optical character Recognition (ATA, UB, BS), pp. 697–700.
- STOC-1996-Feige #approximate #set
- A Threshold of ln n for Approximating Set Cover (Preliminary Version) (UF), pp. 314–318.
- ICPR-1996-DeruyverH #automation #image #multi #segmentation #using
- Automatic multi-thresholdable image segmentation by using separating bipoints (AD, YH), pp. 457–461.
- SAC-1996-ChenH #algorithm #multi #realtime
- Threshold-based dynamic admission control algorithms for real-time multimedia servers (IRC, THH), pp. 224–229.
- ICDAR-v1-1995-Don #documentation #image
- A noise attribute thresholding method for document image binarization (HSD), pp. 231–234.
- ICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #using #verification
- Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
- ICDAR-v2-1995-TsengLT #image #segmentation
- Circular histogram thresholding for color image segmentation (DCT, YFL, CTT), pp. 673–676.
- STOC-1995-RaschleS #graph #recognition
- Recognition of graphs with threshold dimension two (TR, KS), pp. 650–661.
- ICML-1995-Littlestone #algorithm #learning
- Comparing Several Linear-threshold Learning Algorithms on Tasks Involving Superfluous Attributes (NL), pp. 353–361.
- ICML-1995-MaassW #learning #performance
- Efficient Learning with Virtual Threshold Gates (WM, MKW), pp. 378–386.
- STOC-1994-KrauseP #on the #power of
- On the computational power of depth 2 circuits with threshold and modulo gates (MK, PP), pp. 48–57.
- ICDAR-1993-LiuFS #algorithm #documentation #image
- An object attribute thresholding algorithm for document image binarization (YL, RF, SNS), pp. 278–281.
- ICDAR-1993-ParkerJS #using
- Thresholding using an illumination model (JRP, CJ, AGS), pp. 270–273.
- ICDAR-1993-Pavlidis #image #using
- Threshold selection using second derivatives of the gray scale image (TP), pp. 274–277.
- STOC-1993-GoldmannK #simulation
- Simulating threshold circuits by majority circuits (MG, MK), pp. 551–560.
- STOC-1993-ImpagliazzoPS #trade-off
- Size-depth trade-offs for threshold circuits (RI, RP, MES), pp. 541–550.
- ML-1991-OliveiraS #concept #learning #network
- Learning Concepts by Synthesizing Minimal Threshold Gate Networks (ALO, ALSV), pp. 193–197.
- STOC-1987-ShelahS #graph #random
- Threshold Spectra for Random Graphs (SS, JS), pp. 421–424.
- STOC-1984-Boppana #bound
- Threshold Functions and Bounded Depth Monotone Circuits (RBB), pp. 475–479.
- POPL-1977-Lang #call-by #evaluation #semantics
- Threshold Evaluation and the Semantics of Call by Value, Assignment and Generic Procedures (BL), pp. 227–237.