Computing on an anonymous ring

H Attiya, M Snir, MK Warmuth - Journal of the ACM (JACM), 1988 - dl.acm.org
… problem II if a computation of A started on a configuration R ends with a ring output that is
a … Most problems we consider consist of computing a function f: A computation started with …

Better computing on the anonymous ring

H Attiya, M Snir - Journal of Algorithms, 1991 - Elsevier
We consider a bidirectional ring of n processors, where processors are anonymous, ie, are
indistinguishable. In this model it is known that “most” functions (in particular XOR and …

Computing on an anonymous network

M Yamashita, T Kameda - … on Principles of distributed computing, 1988 - dl.acm.org
… for anonymous rings. They have characterized the class of functions computable on a ring
… (or bit) complexity of computing a function on a ring. Yamashita and Kameda [YaK87b] have …

The distributed bit complexity of the ring: From the anonymous to the non-anonymous case

HL Bodlaender, S Moran, MK Warmuth - Information and computation, 1994 - Elsevier
… than in the anonymous case. Some techniques developed in this paper for rings are likely to
… ], where the “probabilistic” distributed bit complexity of anonymous rings is shown to be 9(n,/…

Anonymous wireless rings

K Diks, E Kranakis, A Malinowski, A Pelc - Theoretical Computer Science, 1995 - Elsevier
… In this paper we have discussed the problem of computing on anonymous wireless rings.
We gave algorithms for input collection, which unlike in the case of the standard hardware …

On sustainable ring-based anonymous systems

SSM Chow, C Egger, RWF Lai… - … IEEE 36th Computer …, 2023 - ieeexplore.ieee.org
… of ring-based anonymous systems, including popular ring-based anonymous cryptocurrencies
… actions while remaining anonymous among a set of decoy users, known as a “ring” in …

The distributed bit complexity of the ring: From the anonymous to the non-anonymous case

HL Bodlaender, S Moran, MK Warmuth - … on Fundamentals of Computation …, 1989 - Springer
… all the processors in the ring are identical (anonymous [ASW]), … for anonymous rings it takes
f~(n logn) bits to compute any … that the processors are anonymous by allowing each of the …

[PDF][PDF] Symmetry and computability in anonymous networks: a brief survey

E Kranakis - Proc. 3rd Int. Conf. on Structural Information and …, 1997 - carleton.ca
… { f is computable on an unoriented ring , f is invariant under cyclic shifts and reversals … rings
of arbitrarily large size. Also, the authors give upper and lower bounds for computing on a ring

On recognizing a string on an anonymous ring

E Kranakis, D Krizanc, FL Luccio - Theory of Computing Systems, 2000 - Springer
compute. On the other hand, Moran and Warmuth [11] gave an (n log n) lower bound for
computing … complexity of computing boolean functions on an anonymous ring by concentrating …

A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature

X Zhang, C Ye - Cluster computing, 2022 - Springer
… As we know, conditionally anonymous ring signature can be regarded as a special kind
of ring signature. Under certain conditions, the authority can confirm the actual signer. …