Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Varsha Dani"'
Publikováno v:
Structural Information and Communication Complexity ISBN: 9783031327322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c319306fc8e7e2b16b31b0bef3688838
https://doi.org/10.1007/978-3-031-32733-9_16
https://doi.org/10.1007/978-3-031-32733-9_16
Publikováno v:
PODC
We consider networks of small, autonomous devices that communicate with each other wirelessly. Minimizing energy usage is an important consideration in designing algorithms for such networks, as battery life is a crucial and limited resource. Working
Publikováno v:
ICDCN
A group of n players wants to run a distributed protocol ρ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows P, is able to maliciously flip bits on the channels. Can we efficiently
Publikováno v:
PODC
We consider a model of energy complexity in Radio Networks in which transmitting or listening on the channel costs one unit of energy and computation is free. This simplified model captures key aspects of battery-powered sensors: that battery life is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::95baa44fd95f34a041d0d8afd5181aa5
Publikováno v:
PODC
A group of n players wants to run a distributed protocol ℘ over a network where communication occurs via private point-to-point channels. Can we efficiently simulate ℘ in the presence of an adversary who knows ℘ and is able to maliciously flip
Publikováno v:
Random Structures & Algorithms. 49:742-765
In the rendezvous problem, two parties with different labelings of the vertices of a complete graph are trying to meet at some vertex at the same time. It is well-known that if the parties have predetermined roles, then the strategy where one of them
Publikováno v:
Distributed Computing. 30:193-229
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secur
Publikováno v:
PODC
Energy is often the most constrained resource in networks of battery-powered devices, and as devices become smaller, they spend a larger fraction of their energy on communication (transceiver usage) not computation. As an imperfect proxy for true ene
Publikováno v:
Proceedings of the AAAI Conference on Artificial Intelligence. 32
Mechanisms for aggregating the preferences of agents in elections need to balance many different considerations, including efficiency, information elicited from agents, and manipulability. We consider the utilitarian social welfare of mechanisms for
Autor:
Seth Pettie, Jeremy T. Fineman, Varsha Dani, Seth Gilbert, Michael A. Bender, Mahnush Movahedi, Jared Saia, Maxwell Young
Publikováno v:
ACM SIGACT News. 46:57-71
The point of adversarial analysis is to model the worst-case performance of an algorithm. Unfortunately, this analysis may not always reect performance in practice because the adversarial assumption can be overly pessimistic. In such cases, several t