Login / Signup

Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions).

Alexander R. BlockDivya GuptaHemanta K. MajiHai H. Nguyen
Published in: TCC (2) (2018)
Keyphrases
  • asymptotically optimal
  • asymptotic optimality
  • arrival rate
  • service rates
  • heavy traffic
  • neural network
  • optimal policy
  • reinforcement learning
  • real time
  • queueing networks
  • state dependent