We present several results on the complexity of various forms of Sperner’s Lemma in the black-box model of computing. We give a deterministic algorithm for Sperner problems over ...
Development of a software system from existing components can surely have various benefits, but can also entail a series of problems. One type of problems is caused by a limited ...
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
In recent years particle ...lters have been applied to a variety of state estimation problems. A particle ...lter is a sequential Monte Carlo Bayesian estimator of the posterior d...
We consider the problem of constructing binary space partitions (BSPs) for orthogonal subdivisions (space filling packings of boxes) in d-space. We show that a subdivision with n...