نتایج جستجو برای: n threshold policy
تعداد نتایج: 1334510 فیلتر نتایج به سال:
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
We consider multicomponent maintenance systems with an F -failure group age-replacement policy: it keeps failed components idling until F components are failed and then replaces all failed components together with the nonfailed components whose age has passed the critical threshold age n for components of type n. With each maintenance action, costs are associated. We derive various unbiased gra...
Objective: Diabetic patients suffer from different types of complications associated with peripheral nerves. A clear manifestation of these complications is found in the mouth where neuropathies commonly occur. The measurement of electrical stimulation threshold of teeth signifies premature involvement of peripheral nerves in the teeth. The aim of present study is to compare pulp tester respons...
T paper presents a project management policy in which the appearance of software faults during system construction is used to determine the timing of system integration activities (e.g., team meetings, analyzing modules for interface inconsistencies, system fault correction, and so on). System integration is performed only if a threshold fault count has been exceeded; otherwise, module developm...
BACKGROUND In many countries, the incremental cost-effectiveness ratio (ICER) is used to assess whether an intervention is worth its costs. At the same time, policy makers often feel uncomfortable with refusing reimbursement of any intervention purely on the basis of the fact that the ICER exceeds a specific threshold value. Reluctance to define a single threshold value for the ICER seems to ha...
We consider a retailer with limited inventories of identically priced, substitutable products. Customers arrive sequentially and the firm decides which subset of products to offer to each arriving customer depending on the customer’s preferences, the inventory levels, and the remaining time in the season. We show that the optimal assortment policy is to offer all available products if the custo...
We present a comprehensive steady-state analysis of threshold-ALOHA, distributed age-aware modification slotted ALOHA proposed in recent literature. In each terminal suspends its transmissions until the Age Information (AoI) status update flow it is sending reaches certain threshold ?. Once age exceeds ?, attempts transmission with constant probability ? slot, as standard ALOHA. analyze time-av...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید