The SCEAS System
Navigation Menu

Conferences in DBLP

Symposium on the Theory of Computing (STOC) (stoc)
2009 (conf/stoc/2009)


  1. The work of Leslie Valiant. [Citation Graph (, )][DBLP]


  2. Message passing algorithms and improved LP decoding. [Citation Graph (, )][DBLP]


  3. List decoding tensor products and interleaved codes. [Citation Graph (, )][DBLP]


  4. Artin automorphisms, cyclotomic function fields, and folded list-decodable codes. [Citation Graph (, )][DBLP]


  5. A deterministic reduction for the gap minimum distance problem: [extended abstract]. [Citation Graph (, )][DBLP]


  6. 3-query locally decodable codes of subexponential length. [Citation Graph (, )][DBLP]


  7. Exact learning of random DNF over the uniform distribution. [Citation Graph (, )][DBLP]


  8. Polynomial-time theory of matrix groups. [Citation Graph (, )][DBLP]


  9. Affine dispersers from subspace polynomials. [Citation Graph (, )][DBLP]


  10. On oblivious PTAS's for nash equilibrium. [Citation Graph (, )][DBLP]


  11. The extended BG-simulation and the characterization of t-resiliency. [Citation Graph (, )][DBLP]


  12. An efficient algorithm for partial order production. [Citation Graph (, )][DBLP]


  13. A nearly optimal oracle for avoiding failed vertices and edges. [Citation Graph (, )][DBLP]


  14. Distributed (delta+1)-coloring in linear (in delta) time. [Citation Graph (, )][DBLP]


  15. Near-perfect load balancing by randomized rounding. [Citation Graph (, )][DBLP]


  16. New direct-product testers and 2-query PCPs. [Citation Graph (, )][DBLP]


  17. On proximity oblivious testing. [Citation Graph (, )][DBLP]


  18. Testing juntas nearly optimally. [Citation Graph (, )][DBLP]


  19. Green's conjecture and testing linear-invariant properties. [Citation Graph (, )][DBLP]


  20. Athena lecture: Controlling Access to Programs? [Citation Graph (, )][DBLP]


  21. Fully homomorphic encryption using ideal lattices. [Citation Graph (, )][DBLP]


  22. A unified framework for concurrent security: universal composability from stand-alone non-malleability. [Citation Graph (, )][DBLP]


  23. Non-malleability amplification. [Citation Graph (, )][DBLP]


  24. Approximating edit distance in near-linear time. [Citation Graph (, )][DBLP]


  25. Numerical linear algebra in the streaming model. [Citation Graph (, )][DBLP]


  26. A fast and efficient algorithm for low-rank approximation of a matrix. [Citation Graph (, )][DBLP]


  27. An improved constant-time approximation algorithm for maximum~matchings. [Citation Graph (, )][DBLP]


  28. Finding sparse cuts locally using evolving sets. [Citation Graph (, )][DBLP]


  29. On the geometry of graphs with a forbidden minor. [Citation Graph (, )][DBLP]


  30. Twice-ramanujan sparsifiers. [Citation Graph (, )][DBLP]


  31. Max cut and the smallest eigenvalue. [Citation Graph (, )][DBLP]


  32. Homology flows, cohomology cuts. [Citation Graph (, )][DBLP]


  33. Integrality gaps for Sherali-Adams relaxations. [Citation Graph (, )][DBLP]


  34. Sherali-adams relaxations of the matching polytope. [Citation Graph (, )][DBLP]


  35. CSP gaps and reductions in the lasserre hierarchy. [Citation Graph (, )][DBLP]


  36. Linear time approximation schemes for the Gale-Berlekamp game and related minimization problems. [Citation Graph (, )][DBLP]


  37. Non-monotone submodular maximization under matroid and knapsack constraints. [Citation Graph (, )][DBLP]


  38. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. [Citation Graph (, )][DBLP]


  39. A constructive proof of the Lovász local lemma. [Citation Graph (, )][DBLP]


  40. Universally utility-maximizing privacy mechanisms. [Citation Graph (, )][DBLP]


  41. Private coresets. [Citation Graph (, )][DBLP]


  42. Differential privacy and robust statistics. [Citation Graph (, )][DBLP]


  43. On the complexity of differentially private data release: efficient algorithms and hardness results. [Citation Graph (, )][DBLP]


  44. Quantum algorithms using the curvelet transform. [Citation Graph (, )][DBLP]


  45. Short seed extractors against quantum storage. [Citation Graph (, )][DBLP]


  46. Efficient discrete-time simulations of continuous-time quantum query algorithms. [Citation Graph (, )][DBLP]


  47. The detectability lemma and quantum gap amplification. [Citation Graph (, )][DBLP]


  48. Affiliation networks. [Citation Graph (, )][DBLP]


  49. Fault-tolerant spanners for general graphs. [Citation Graph (, )][DBLP]


  50. Hadwiger's conjecture is decidable. [Citation Graph (, )][DBLP]


  51. Finding, minimizing, and counting weighted subgraphs. [Citation Graph (, )][DBLP]


  52. On the complexity of communication complexity. [Citation Graph (, )][DBLP]


  53. Bit-probe lower bounds for succinct data structures. [Citation Graph (, )][DBLP]


  54. Randomly supported independence and resistance. [Citation Graph (, )][DBLP]


  55. Conditional hardness for satisfiable 3-CSPs. [Citation Graph (, )][DBLP]


  56. A new approach to auctions and resilient mechanism design. [Citation Graph (, )][DBLP]


  57. Intrinsic robustness of the price of anarchy. [Citation Graph (, )][DBLP]


  58. On the convergence of regret minimization dynamics in concave games. [Citation Graph (, )][DBLP]


  59. Multiplicative updates outperform generic no-regret learning in congestion games: extended abstract. [Citation Graph (, )][DBLP]


  60. MaxMin allocation via degree lower-bounded arborescences. [Citation Graph (, )][DBLP]


  61. How long does it take to catch a wild kangaroo? [Citation Graph (, )][DBLP]


  62. Random walks on polytopes and an affine interior point method for linear programming. [Citation Graph (, )][DBLP]


  63. Mixing time for the solid-on-solid model. [Citation Graph (, )][DBLP]


  64. Reconstruction for the Potts model. [Citation Graph (, )][DBLP]


  65. Tight lower bounds for greedy routing in uniform small world rings. [Citation Graph (, )][DBLP]


  66. Non-malleable extractors and symmetric key cryptography from weak secrets. [Citation Graph (, )][DBLP]


  67. Inaccessible entropy. [Citation Graph (, )][DBLP]


  68. On cryptography with auxiliary input. [Citation Graph (, )][DBLP]


  69. Every planar graph is the intersection graph of segments in the plane: extended abstract. [Citation Graph (, )][DBLP]


  70. Small-size epsilon-nets for axis-parallel rectangles and boxes. [Citation Graph (, )][DBLP]


  71. Explicit construction of a small epsilon-net for linear threshold functions. [Citation Graph (, )][DBLP]


  72. A constant-factor approximation for stochastic Steiner forest. [Citation Graph (, )][DBLP]


  73. Multiple intents re-ranking. [Citation Graph (, )][DBLP]


  74. A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation. [Citation Graph (, )][DBLP]


  75. Online and stochastic survivable network design. [Citation Graph (, )][DBLP]


  76. An axiomatic approach to algebrization. [Citation Graph (, )][DBLP]


  77. Random graphs and the parity quantifier. [Citation Graph (, )][DBLP]


  78. Holant problems and counting CSP. [Citation Graph (, )][DBLP]


  79. A new line of attack on the dichotomy conjecture. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002