Login / Signup
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions).
Alexander R. Block
Divya Gupta
Hemanta K. Maji
Hai H. Nguyen
Published in:
TCC (2) (2018)
Keyphrases
</>
asymptotically optimal
asymptotic optimality
arrival rate
service rates
heavy traffic
neural network
optimal policy
reinforcement learning
real time
queueing networks
state dependent