macrophage 发表于 2025-3-26 21:11:13

Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph,ependently with a fixed probability . (and, thus, is perfectly secure with a probability of .). Using these pre-shared, possibly leaked keys, we want two designated players to share a common one-bit secret key in cooperation with other players so that Eve’s knowledge about the generated secret key w

适宜 发表于 2025-3-27 01:26:13

http://reply.papertrans.cn/103/10201/1020040/1020040_32.png

发怨言 发表于 2025-3-27 06:38:44

Approximating Partially Bounded Degree Deletion on Directed Graphs,y remaining vertex . is no larger than .(.). It is a classic problem in graph theory and various results have been obtained including an approximation ratio of . [.], where . is the maximum degree bound..This paper considers BDD on . graphs containing . vertices, which we call .. Despite such a natu

轨道 发表于 2025-3-27 13:07:20

http://reply.papertrans.cn/103/10201/1020040/1020040_34.png

跳动 发表于 2025-3-27 16:09:43

http://reply.papertrans.cn/103/10201/1020040/1020040_35.png

希望 发表于 2025-3-27 18:04:14

http://reply.papertrans.cn/103/10201/1020040/1020040_36.png

公共汽车 发表于 2025-3-28 01:11:11

http://reply.papertrans.cn/103/10201/1020040/1020040_37.png

alcoholism 发表于 2025-3-28 04:15:01

Two New Schemes in the Bitprobe Model,e literature. One such scheme is to store three elements using two queries in the adaptive bitprobe model. Previously, the maximum number of elements that can be handled using two queries in the adaptive model is two, which is due to Radhakrishnan . [.]. A corollary of this result is an explicit sch

BLOT 发表于 2025-3-28 06:32:41

Random Popular Matchings with Incomplete Preference Lists,e problem of matching every person with a unique item. A matching . is . if for any other matching ., the number of people who prefer . to . is not less than the number of those who prefer . to .. For given . and ., consider the probability of existence of a popular matching when each person’s prefe

镀金 发表于 2025-3-28 11:22:33

Faster Network Algorithms Based on Graph Decomposition,ata structures) from a given graph, then use them for solving the problems. A basic problem is an all pairs maximum flow problem, which consists of two stages. In a preprocessing stage we construct an index, and in a query stage we process the query using the index. We can solve all pairs maximum fl
页: 1 2 3 [4] 5 6 7 8
查看完整版本: Titlebook: WALCOM: Algorithms and Computation; 12th International C M. Sohel Rahman,Wing-Kin Sung,Ryuhei Uehara Conference proceedings 2018 Springer I