Computing on an anonymous ring
… problem II if a computation of A started on a configuration R ends with a ring output that is
a … Most problems we consider consist of computing a function f: A computation started with …
a … Most problems we consider consist of computing a function f: A computation started with …
Better computing on the anonymous ring
We consider a bidirectional ring of n processors, where processors are anonymous, ie, are
indistinguishable. In this model it is known that “most” functions (in particular XOR and …
indistinguishable. In this model it is known that “most” functions (in particular XOR and …
Computing on an anonymous network
M Yamashita, T Kameda - … on Principles of distributed computing, 1988 - dl.acm.org
… for anonymous rings. They have characterized the class of functions computable on a ring
… (or bit) complexity of computing a function on a ring. Yamashita and Kameda [YaK87b] have …
… (or bit) complexity of computing a function on a ring. Yamashita and Kameda [YaK87b] have …
The distributed bit complexity of the ring: From the anonymous to the non-anonymous case
… than in the anonymous case. Some techniques developed in this paper for rings are likely to
… ], where the “probabilistic” distributed bit complexity of anonymous rings is shown to be 9(n,/…
… ], where the “probabilistic” distributed bit complexity of anonymous rings is shown to be 9(n,/…
Anonymous wireless rings
… In this paper we have discussed the problem of computing on anonymous wireless rings.
We gave algorithms for input collection, which unlike in the case of the standard hardware …
We gave algorithms for input collection, which unlike in the case of the standard hardware …
On sustainable ring-based anonymous systems
… of ring-based anonymous systems, including popular ring-based anonymous cryptocurrencies
… actions while remaining anonymous among a set of decoy users, known as a “ring” in …
… actions while remaining anonymous among a set of decoy users, known as a “ring” in …
The distributed bit complexity of the ring: From the anonymous to the non-anonymous case
… all the processors in the ring are identical (anonymous [ASW]), … for anonymous rings it takes
f~(n logn) bits to compute any … that the processors are anonymous by allowing each of the …
f~(n logn) bits to compute any … that the processors are anonymous by allowing each of the …
[PDF][PDF] Symmetry and computability in anonymous networks: a brief survey
E Kranakis - Proc. 3rd Int. Conf. on Structural Information and …, 1997 - carleton.ca
… { f is computable on an unoriented ring , f is invariant under cyclic shifts and reversals … rings
of arbitrarily large size. Also, the authors give upper and lower bounds for computing on a ring…
of arbitrarily large size. Also, the authors give upper and lower bounds for computing on a ring…
On recognizing a string on an anonymous ring
E Kranakis, D Krizanc, FL Luccio - Theory of Computing Systems, 2000 - Springer
… compute. On the other hand, Moran and Warmuth [11] gave an (n log n) lower bound for
computing … complexity of computing boolean functions on an anonymous ring by concentrating …
computing … complexity of computing boolean functions on an anonymous ring by concentrating …
A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature
X Zhang, C Ye - Cluster computing, 2022 - Springer
… As we know, conditionally anonymous ring signature can be regarded as a special kind
of ring signature. Under certain conditions, the authority can confirm the actual signer. …
of ring signature. Under certain conditions, the authority can confirm the actual signer. …