Login / Signup
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions).
Alexander R. Block
Divya Gupta
Hemanta K. Maji
Hai H. Nguyen
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
asymptotically optimal
asymptotic optimality
arrival rate
heavy traffic
state dependent
optimal policy
real time
learning algorithm
decision making
lower bound
call center
additive error