Gotowa bibliografia na temat „Round Complexity”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Round Complexity”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Round Complexity"
Zhang, Feng, Feng Li i Wenzheng Zhang. "Differential-Linear Cryptanalsis on SIMECK32/64 and SIMON32/64". Journal of Physics: Conference Series 2504, nr 1 (1.05.2023): 012068. http://dx.doi.org/10.1088/1742-6596/2504/1/012068.
Pełny tekst źródłaZhang, Kai, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang i Tairong Shi. "Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT". Security and Communication Networks 2022 (25.05.2022): 1–11. http://dx.doi.org/10.1155/2022/3611840.
Pełny tekst źródłaGrošek, Otokar, Peter Horák i Pavol Zajac. "On complexity of round transformations". Discrete Mathematics 309, nr 18 (wrzesień 2009): 5527–34. http://dx.doi.org/10.1016/j.disc.2008.03.020.
Pełny tekst źródłaPandurangan, Gopal, Peter Robinson i Michele Scquizzato. "On the Distributed Complexity of Large-Scale Graph Computations". ACM Transactions on Parallel Computing 8, nr 2 (30.06.2021): 1–28. http://dx.doi.org/10.1145/3460900.
Pełny tekst źródłaXing, Zhaohui, Wenying Zhang i Guoyong Han. "Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP". Wireless Communications and Mobile Computing 2020 (23.11.2020): 1–14. http://dx.doi.org/10.1155/2020/8883557.
Pełny tekst źródłaMagniez, Frédéric, i Ashwin Nayak. "Quantum Distributed Complexity of Set Disjointness on a Line". ACM Transactions on Computation Theory 14, nr 1 (31.03.2022): 1–22. http://dx.doi.org/10.1145/3512751.
Pełny tekst źródłaWeng, Tianling, Tingting Cui, Ting Yang i Yinghua Guo. "Related-Key Differential Attacks on Reduced-Round LBlock". Security and Communication Networks 2022 (16.09.2022): 1–15. http://dx.doi.org/10.1155/2022/8464960.
Pełny tekst źródłaKremer, I., N. Nisan i D. Ron. "On Randomized One-round Communication Complexity". Computational Complexity 8, nr 1 (1.06.1999): 21–49. http://dx.doi.org/10.1007/s000370050018.
Pełny tekst źródłaSong, Junghwan, Kwanhyung Lee i Hwanjin Lee. "Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128". Journal of Applied Mathematics 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/529736.
Pełny tekst źródłaLacko-Bartošová, Lucia. "Linear and differential cryptanalysis of reduced-round AES". Tatra Mountains Mathematical Publications 50, nr 1 (1.12.2011): 51–61. http://dx.doi.org/10.2478/v10127-011-0036-y.
Pełny tekst źródłaRozprawy doktorskie na temat "Round Complexity"
Ravi, Divya. "On the Round Complexity Landscape of Secure Multi-party Computation". Thesis, 2020. https://etd.iisc.ac.in/handle/2005/4809.
Pełny tekst źródłaLin, Kun-Xuan, i 林琨絢. "Low Complexity Packet Scheduling Algorithm: Adaptive Fair Queuing with Round-Robin". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/58810698448679516700.
Pełny tekst źródła國立雲林科技大學
電子與資訊工程研究所
94
The rapid growths of Internet bandwidth and Internet user have increased the complexity of network management. At the same time the contents of transmission in Internet trends to be pluralistic. It is not enough of only relying on the original best-effort IP protocol to support the required quality of service (QoS) for each application. In order to offer steady communication environment and QoS, the moderately bandwidth management is considered in network design. In general, the network bandwidth management can be classified into two parts of packet buffer management and packet scheduling. In this thesis, we target on the design of packet scheduling for the network bandwidth management and propose an Adaptive Fair Queuing with Round Robin (AFQRR) scheme. Based on Round Robin technique, the AFQRR has the properties of lower complexity and higher accuracy. According to the assigning weight of flows, the AFQRR can fairly to allocate the corresponding bandwidth for each flow. In the part of complexity, the computation of both the amount of allowing transmission for each flow and the next transmission flow selection are all of O(1). With the NS2 simulation tool, the simulation results reveal that the AFQRR scheduling algorithm has a better performance in the part of fair bandwidth allocation and of packet delay.
FRIOLO, DANIELE. "New perspectives in multi-party computation: low round complexity from new assumptions, financial fairness and public verifiability". Doctoral thesis, 2021. http://hdl.handle.net/11573/1566920.
Pełny tekst źródłaLapointe, Rébecca. "Complexité de la communication sur un canal avec délai". Thèse, 2014. http://hdl.handle.net/1866/10686.
Pełny tekst źródłaWe introduce a new communication complexity model in which we want to determine how much time of communication is needed by two players in order to execute arbitrary tasks on a channel with delay d. We establish a few basic lower and upper bounds and compare this new model to existing models such as the classical and quantum two-party models of communication. We show that the standard communication complexity of a function, modulo a factor of d/ lg d, constitutes an upper bound to its communication complexity on a delayed channel. We introduce a few examples on which a clever strategy depending on the delay procures a significant advantage over the naïve implementation of an optimal communication protocol. We then show that a delayed channel can be used to implement a cryptographic bit swap, but is insufficient on its own to implement an oblivious transfer scheme.
Książki na temat "Round Complexity"
Round Table on Law and Semiotics (6th 1992 Penn State University--Berks). Flux, complexity, and illusion: Sixth Round Table on Law and Semiotics. New York: P. Lang, 1993.
Znajdź pełny tekst źródłaCole, Richard. The APRAM -- the rounds complexity measure and the explicit costs of synchronization. New York: Courant Institute of Mathematical Sciences, New York University, 1991.
Znajdź pełny tekst źródłaFlux, Complexity, and Illusion: Sixth Round Table on Law and Semiotics (Semiotics and the Human Sciences). Peter Lang Publishing, 1993.
Znajdź pełny tekst źródłavan Es, Bart. 5. Character. Oxford University Press, 2016. http://dx.doi.org/10.1093/actrade/9780198723356.003.0006.
Pełny tekst źródłaZajicek, Ofer, i Richard Cole. APRAM -- the Rounds Complexity Measure and the Explicit Costs of Synchronization. Creative Media Partners, LLC, 2018.
Znajdź pełny tekst źródłaMarat, Erica. The Politics of Police Reform. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190861490.001.0001.
Pełny tekst źródłaJohansen, Bruce, i Adebowale Akande, red. Nationalism: Past as Prologue. Nova Science Publishers, Inc., 2021. http://dx.doi.org/10.52305/aief3847.
Pełny tekst źródłaCzęści książek na temat "Round Complexity"
Farley, Thomas. "Unraveling the Complexity of Market Structure". W Equity Trading Round-Up, 117–30. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51015-2_8.
Pełny tekst źródłaGarg, Sanjam, Pratyay Mukherjee, Omkant Pandey i Antigoni Polychroniadou. "The Exact Round Complexity of Secure Computation". W Advances in Cryptology – EUROCRYPT 2016, 448–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49896-5_16.
Pełny tekst źródłaCohen, Tzafrir, Joe Kilian i Erez Petrank. "Responsive Round Complexity and Concurrent Zero-Knowledge". W Advances in Cryptology — ASIACRYPT 2001, 422–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45682-1_25.
Pełny tekst źródłaChardouvelis, Orestis, i Giulio Malavolta. "The Round Complexity of Quantum Zero-Knowledge". W Theory of Cryptography, 121–48. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90459-3_5.
Pełny tekst źródłaGarg, Sanjam, Mohammad Mahmoody, Daniel Masny i Izaak Meckler. "On the Round Complexity of OT Extension". W Lecture Notes in Computer Science, 545–74. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96878-0_19.
Pełny tekst źródłaKublenz, Simeon, Sebastian Siebertz i Alexandre Vigny. "Constant Round Distributed Domination on Graph Classes with Bounded Expansion". W Structural Information and Communication Complexity, 334–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79527-6_19.
Pełny tekst źródłaPatra, Arpita, Ashish Choudhary, Tal Rabin i C. Pandu Rangan. "The Round Complexity of Verifiable Secret Sharing Revisited". W Advances in Cryptology - CRYPTO 2009, 487–504. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03356-8_29.
Pełny tekst źródłaChoudhury, Ashish, Kaoru Kurosawa i Arpita Patra. "The Round Complexity of Perfectly Secure General VSS". W Lecture Notes in Computer Science, 143–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20728-0_14.
Pełny tekst źródłaKiayias, Aggelos, i Serdar Pehlivanoglu. "Improving the Round Complexity of Traitor Tracing Schemes". W Applied Cryptography and Network Security, 273–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13708-2_17.
Pełny tekst źródłaKozachinskiy, Alexander. "Making Randomness Public in Unbounded-Round Information Complexity". W Lecture Notes in Computer Science, 296–309. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20297-6_19.
Pełny tekst źródłaStreszczenia konferencji na temat "Round Complexity"
Patt-Shamir, Boaz, i Marat Teplitsky. "The round complexity of distributed sorting". W the 30th annual ACM SIGACT-SIGOPS symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1993806.1993851.
Pełny tekst źródłaBeaver, D., S. Micali i P. Rogaway. "The round complexity of secure protocols". W the twenty-second annual ACM symposium. New York, New York, USA: ACM Press, 1990. http://dx.doi.org/10.1145/100216.100287.
Pełny tekst źródłaKremer, Ilan, Noam Nisan i Dana Ron. "On randomized one-round communication complexity". W the twenty-seventh annual ACM symposium. New York, New York, USA: ACM Press, 1995. http://dx.doi.org/10.1145/225058.225277.
Pełny tekst źródłaGoyal, Vipul, i Abhishek Jain. "On the round complexity of covert computation". W the 42nd ACM symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1806689.1806717.
Pełny tekst źródłaSanghvi, Saurabh, i Salil Vadhan. "The round complexity of two-party random selection". W the thirty-seventh annual ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1060590.1060641.
Pełny tekst źródłaGanesh, Chaya, i Arpita Patra. "Broadcast Extensions with Optimal Communication and Round Complexity". W PODC '16: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2933057.2933082.
Pełny tekst źródłaApplebaum, Benny, Eliran Kachlon i Arpita Patra. "The Round Complexity of Statistical MPC with Optimal Resiliency". W STOC '23: 55th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3564246.3585228.
Pełny tekst źródłaGaray, Juan A., Jonathan Katz, Chiu-Yuen Koo i Rafail Ostrovsky. "Round Complexity of Authenticated Broadcast with a Dishonest Majority". W 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.4389534.
Pełny tekst źródłaGaray, Juan A., Jonathan Katz, Chiu-Yuen Koo i Rafail Ostrovsky. "Round Complexity of Authenticated Broadcast with a Dishonest Majority". W 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.44.
Pełny tekst źródłaIto, Tsuyoshi, Hirotada Kobayashi i Keiji Matsumoto. "Oracularization and Two-Prover One-Round Interactive Proofs against Nonlocal Strategies". W 2009 24th Annual IEEE Conference on Computational Complexity (CCC). IEEE, 2009. http://dx.doi.org/10.1109/ccc.2009.22.
Pełny tekst źródłaRaporty organizacyjne na temat "Round Complexity"
Eiber. L51786 Development of Optimized Nondestructive Inspection Methods for Hot Tap Branch Connection Welds. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 1998. http://dx.doi.org/10.55274/r0010388.
Pełny tekst źródłaLeis, Brian, i Xian-Kui Zhu. PR-003-063509-R01 Models for Predicting Delayed Fatigue Failure of Pipelines at Mechanical Damage. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2018. http://dx.doi.org/10.55274/r0011489.
Pełny tekst źródła