Sciweavers

11547 search results - page 127 / 2310
» Quantum computing and communication
Sort
View
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
15 years 9 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 4 months ago
Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity
A Direct Sum Theorem holds in a model of computation, when for every problem solving some k input instances together is k times as expensive as solving one. We show that Direct Su...
Rahul Jain, Hartmut Klauck, Miklos Santha
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 4 months ago
Geometry and the complexity of matrix multiplication
We survey results in algebraic complexity theory, focusing on matrix multiplication. Our goals are (i.) to show how open questions in algebraic complexity theory are naturally pose...
J. M. Landsberg
JCC
2008
76views more  JCC 2008»
15 years 4 months ago
Effects of spin-orbit coupling on magnetic properties of discrete and extended magnetic systems
: In accounting for the magnetic properties of discrete and extended compounds with unpaired spins, it is crucial to know the nature of their ground and low-lying excited states. I...
Dadi Dai, Hongjun Xiang, Myung-Hwan Whangbo
PC
2007
284views Management» more  PC 2007»
15 years 4 months ago
Implementation and evaluation of shared-memory communication and synchronization operations in MPICH2 using the Nemesis communic
This paper presents the implementation of MPICH2 over the Nemesis communication subsystem and the evaluation of its shared-memory performance. We describe design issues as well as...
Darius Buntinas, Guillaume Mercier, William Gropp