Sciweavers

269 search results - page 9 / 54
» random 2001
Sort
View
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding
ESA
2001
Springer
97views Algorithms» more  ESA 2001»
14 years 2 months ago
Splitting a Delaunay Triangulation in Linear Time
Computing the Delaunay triangulation of n points requires usually a minimum of (n log n) operations, but in some special cases where some additional knowledge is provided, faster a...
Bernard Chazelle, Olivier Devillers, Ferran Hurtad...
TC
2008
13 years 9 months ago
The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks. With inherent topology independence and low state mai...
Ming Zhong, Kai Shen, Joel I. Seiferas
WSC
2001
13 years 11 months ago
Efficient simulation for discrete path-dependent option pricing
In this paper we present an algorithm for simulating functions of the minimum and terminal value for a random walk with Gaussian increments. These expectations arise in connection...
James M. Calvin
ICCS
2001
Springer
14 years 2 months ago
On Parallel Pseudo-Random Number Generation
Parallel computing has been touted as the pinnacle of high performance digital computing by many. However, many problems remain intractable using deterministic algorithms. Randomiz...
Chih Jeng Kenneth Tan