Publication | Closed Access
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)
484
Citations
0
References
1988
Year
Unknown Venue
Every function of n inputs can be efficiently computed by a complete network of n processors in such a way that: