Sciweavers

1301 search results - page 74 / 261
» Bounded Version Vectors
Sort
View
157
Voted
FCT
2005
Springer
15 years 9 months ago
On the Black-Box Complexity of Sperner's Lemma
We present several results on the complexity of various forms of Sperner’s Lemma in the black-box model of computing. We give a deterministic algorithm for Sperner problems over ...
Katalin Friedl, Gábor Ivanyos, Miklos Santh...
ICQNM
2008
IEEE
138views Chemistry» more  ICQNM 2008»
15 years 10 months ago
Multiparty Distributed Compression of Quantum Information
—We study a protocol in which many parties use quantum communication to transfer a shared state to a receiver without communicating with each other. This protocol is a multiparty...
David Avis, Patrick Hayden, Ivan Savov
147
Voted
CORR
2006
Springer
117views Education» more  CORR 2006»
15 years 3 months ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
124
Voted
CORR
2006
Springer
98views Education» more  CORR 2006»
15 years 3 months ago
Reversal Complexity Revisited
We study a generalized version of reversal bounded Turing machines where, apart from several tapes on which the number of head reversals is bounded by r(n), there are several furth...
André Hernich, Nicole Schweikardt
128
Voted
CORR
2011
Springer
163views Education» more  CORR 2011»
14 years 10 months ago
Statistical Analysis of Link Scheduling on Long Paths
We study how the choice of packet scheduling algorithms influences end-to-end performance on long network paths. Taking a network calculus approach, we consider both deterministi...
Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Al...