Results 1  10
of
32,827
Separating deterministic from nondeterministic NOF multiparty communication complexity (Extended Abstract)
 IN ICALP
, 2007
"... We solve some fundamental problems in the numberonforehead (NOF) kparty communication model. We show that there exists a function which has at most logarithmic communication complexity for randomized protocols with a onesided error probability of 1/3 but which has linear communication complexit ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
complexity for deterministic protocols. The result is true for k = n O(1) players, where n is the number of bits on each players ’ forehead. This separates the analogues of RP and P in the NOF communication model. We also show that there exists a function which has constant randomized complexity for public
Security and Composition of Multiparty Cryptographic Protocols
 JOURNAL OF CRYPTOLOGY
, 1998
"... We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation. The definiti ..."
Abstract

Cited by 465 (19 self)
 Add to MetaCart
We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation
Separating Deterministic from Randomized Multiparty Communication Complexity
, 2008
"... We solve some fundamental problems in the numberonforehead (NOF) kplayer communication model. We show that there exists a function which has at most logarithmic communication complexity for randomized protocols with a onesided error probability of 1/3 but which has linear communication complex ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
complexity for deterministic protocols. The result is true for k = nO(1) players, where n is the number of bits on each players ’ forehead. This separates the analogues of RP and P in the NOF communication model. We also show that there exists a function which has constant randomized complexity for public
Monotone Complexity
, 1990
"... We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple ..."
Abstract

Cited by 2837 (11 self)
 Add to MetaCart
We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a
A theory of communicating sequential processes
, 1984
"... A mathematical model for communicating sequential processes is given, and a number of its interesting and useful properties are stated and proved. The possibilities of nondetermimsm are fully taken into account. ..."
Abstract

Cited by 4135 (17 self)
 Add to MetaCart
A mathematical model for communicating sequential processes is given, and a number of its interesting and useful properties are stated and proved. The possibilities of nondetermimsm are fully taken into account.
The NOF Multiparty Communication Complexity of Composed Functions
"... We study the kparty ‘number on the forehead ’ communication complexity of composed functions f ◦ g, where f: {0,1} n → {±1}, g: {0,1} k → {0,1} and for (x1,...,xk) ∈ ({0,1} n) k, f ◦g(x1,...,xk) = f (...,g(x1,i,...,xk,i),...). We show that there is an O(log 3 n) cost simultaneous protocol for SYM ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
We study the kparty ‘number on the forehead ’ communication complexity of composed functions f ◦ g, where f: {0,1} n → {±1}, g: {0,1} k → {0,1} and for (x1,...,xk) ∈ ({0,1} n) k, f ◦g(x1,...,xk) = f (...,g(x1,i,...,xk,i),...). We show that there is an O(log 3 n) cost simultaneous protocol
Dryad: Distributed DataParallel Programs from Sequential Building Blocks
 In EuroSys
, 2007
"... Dryad is a generalpurpose distributed execution engine for coarsegrain dataparallel applications. A Dryad application combines computational “vertices ” with communication “channels ” to form a dataflow graph. Dryad runs the application by executing the vertices of this graph on a set of availa ..."
Abstract

Cited by 730 (27 self)
 Add to MetaCart
of available computers, communicating as appropriate through files, TCP pipes, and sharedmemory FIFOs. The vertices provided by the application developer are quite simple and are usually written as sequential programs with no thread creation or locking. Concurrency arises from Dryad scheduling vertices to run
Separating NOF communication . . .
, 2008
"... We provide a nonexplicit separation of the numberonforehead communication complexity classes RP and NP when the number of players is up to δ · logn for any δ < 1. Recent lower bounds on SetDisjointness [10, 7] provide an explicit separation between these classes when the number of players is ..."
Abstract
 Add to MetaCart
We provide a nonexplicit separation of the numberonforehead communication complexity classes RP and NP when the number of players is up to δ · logn for any δ < 1. Recent lower bounds on SetDisjointness [10, 7] provide an explicit separation between these classes when the number of players
BDI Agents: From Theory to Practice
 IN PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS (ICMAS95
, 1995
"... The study of computational agents capable of rational behaviour has received a great deal of attention in recent years. Theoretical formalizations of such agents and their implementations have proceeded in parallel with little or no connection between them. This paper explores a particular typ ..."
Abstract

Cited by 880 (3 self)
 Add to MetaCart
type of rational agent, a BeliefDesire Intention (BDI) agent. The primary aim of this paper is to integrate (a) the theoretical foundations of BDI agents from both a quantitative decisiontheoretic perspective and a symbolic reasoning perspective; (b) the implementations of BDI agents from
Bandera: Extracting Finitestate Models from Java Source Code
 IN PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING
, 2000
"... Finitestate verification techniques, such as model checking, have shown promise as a costeffective means for finding defects in hardware designs. To date, the application of these techniques to software has been hindered by several obstacles. Chief among these is the problem of constructing a fini ..."
Abstract

Cited by 653 (35 self)
 Add to MetaCart
), and difficult to optimize (which is necessary to combat the exponential complexity of verification algorithms). In this paper, we describe an integrated collection of program analysis and transformation components, called Bandera, that enables the automatic extraction of safe, compact finitestate models from
Results 1  10
of
32,827