Communication complexity

Results: 253



#Item
61

Communication Complexity ———– vs. ———– Partition Numbers (Based on 2 papers to appear at FOCS)

Add to Reading List

Source URL: www.cs.utoronto.ca

Language: English - Date: 2015-10-02 01:49:17
    62Multiplication / Matrix theory / Numerical linear algebra / Matrix multiplication algorithm / Analysis of algorithms / Computational complexity theory / Matrix multiplication / Matrix / Parallel computing / Multiplication algorithm / Algorithm / Time complexity

    Communication Optimal Parallel Multiplication of Sparse Random Matrices∗ Grey Ballard Aydın Buluç

    Add to Reading List

    Source URL: gauss.cs.ucsb.edu

    Language: English - Date: 2013-05-20 18:41:58
    63Theoretical computer science / Academia / Computer science / Computational complexity theory / Algorithms / Streaming algorithm / Symposium on Discrete Algorithms / Communication complexity / Bernard Chazelle / Machtey Award

    Amit Chakrabarti Curriculum Vitae April 2014 Associate Professor Department of Computer Science

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2015-10-14 21:30:58
    64Theory of computation / Theoretical computer science / Computational complexity theory / Computing / Communication / Communication complexity / Quantum complexity theory / Quantum information science / Pointer / Communications protocol / ACC0 / Transmission Control Protocol

    PDF Document

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2014-03-05 21:08:38
    65

    Simplified Lower Bounds on the Multiparty Communication Complexity of Disjointness Anup Rao∗1 and Amir Yehudayoff†2 1 Department of Computer Science and Engineering

    Add to Reading List

    Source URL: drops.dagstuhl.de

    Language: English - Date: 2015-05-27 10:18:38
      66Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

      Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-04 05:09:56
      67Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

      An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-07-21 08:57:56
      68Complexity classes / Probabilistic complexity theory / Zero-knowledge proof / Probabilistically checkable proof / NP / Proof of knowledge / IP / Non-interactive zero-knowledge proof / Soundness / Cryptography / Cryptographic protocols / Theoretical computer science

      Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2013-10-04 08:09:02
      69Complexity classes / Technical communication / NP / Specification / Algorithm / Earth / Mathematics / Technology / Joint Polar Satellite System / National Oceanic and Atmospheric Administration / NPOESS

      Microsoft Word00087_OAD-VIIRS-SIA-EDR_B.docx

      Add to Reading List

      Source URL: suomi.gsfc.nasa.gov

      Language: English - Date: 2013-06-10 12:07:10
      70Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

      Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2010-11-25 08:58:28
      UPDATE