


default search action
5th ITCS 2014: Princeton, NJ, USA
- Moni Naor:

Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014. ACM 2014, ISBN 978-1-4503-2698-8
Session 1: 08: 30--8: 40
- Zvika Brakerski, Vinod Vaikuntanathan:

Lattice-based FHE as secure as PKE. 1-12 - Joshua Brody, Sune K. Jakobsen, Dominik Scheder

, Peter Winkler
:
Cryptogenography. 13-22 - Mohammad Mahmoody

, Hemanta K. Maji, Manoj Prabhakaran:
Limits of random oracles in secure computation. 23-34 - Umesh V. Vazirani, Thomas Vidick

:
Robust device independent quantum key distribution. 35-36
Session 2: 10: 30--10: 40
- Amir Shpilka

, Avishay Tal, Ben lee Volk:
On the structure of boolean functions with small spectral norm. 37-48 - Pavel Hrubes, Avi Wigderson:

Non-commutative arithmetic circuits with division. 49-66 - Andrew Wan, John Wright, Chenggang Wu:

Decision trees, protocols and the entropy-influence conjecture. 67-80 - Parikshit Gopalan, Salil P. Vadhan, Yuan Zhou:

Locally testable codes and cayley graphs. 81-92
Session 3: 14: 00--14: 10
- Uriel Feige, Moshe Tennenholtz:

Invitation games and the price of stability. 93-102 - Mark Braverman, Kanika Pasricha:

The computational hardness of pricing compound options. 103-104 - Deeparnab Chakrabarty, Chaitanya Swamy:

Welfare maximization and truthfulness in mechanism design with ordinal preferences. 105-120 - Sayan Bhattacharya, Sungjin Im, Janardhan Kulkarni, Kamesh Munagala:

Coordination mechanisms from (almost) all scheduling policies. 121-134
Session 4: 16: 00--16: 10
- Ran Gelles, Amit Sahai, Akshay Wadia:

Private interactive communication across an adversarial channel. 135-144 - Cristopher Moore

, Leonard J. Schulman
:
Tree codes and a conjecture on exponential sums. 145-154 - Mahdi Cheraghchi

, Venkatesan Guruswami:
Capacity of non-malleable codes. 155-168 - Erez Druk, Yuval Ishai:

Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications. 169-182
Session 5: 08: 30--08: 40
- Fernando G. S. L. Brandão, Aram W. Harrow

, James R. Lee, Yuval Peres:
Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements. 183-194 - Yossi Azar, Uriel Feige, Michal Feldman, Moshe Tennenholtz:

Sequential decision making with vector outcomes. 195-206 - Yuval Rabani

, Leonard J. Schulman
, Chaitanya Swamy:
Learning mixtures of arbitrary distributions over large discrete domains. 207-224 - Jonathan W. Berry, Luke K. Fostvedt

, Daniel J. Nordman, Cynthia A. Phillips, C. Seshadhri, Alyson G. Wilson
:
Why do simple algorithms for triangle enumeration work in the real world? 225-234
Session 6: 10: 30--10: 40
- Zvika Brakerski, Guy N. Rothblum:

Black-box obfuscation for d-CNFs. 235-250 - Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen:

Candidate weak pseudorandom functions in AC0 ○ MOD2. 251-260 - Eric Miles:

Iterated group products and leakage resilience against NC1. 261-268 - Yi-Kai Liu:

Building one-time memories from isolated qubits: (extended abstract). 269-286
Session 7: 14: 00--14: 10
- Elaine Angelino, Varun Kanade

:
Attribute-efficient evolvability of linear functions. 287-300 - Zeph Landau, Umesh V. Vazirani, Thomas Vidick:

An efficient algorithm for finding the ground state of 1D gapped local hamiltonians. 301-302 - Antonios Antoniadis, Neal Barcelo, Michael Nugent, Kirk Pruhs, Michele Scquizzato:

Energy-efficient circuit design. 303-312 - Ho-Lin Chen

, David Doty
, David Soloveichik:
Rate-independent computation in continuous chemical reaction networks. 313-326
Session 8: 16: 00--16: 10
- Nader H. Bshouty:

Testers and their applications. 327-352 - Manor Mendel, Assaf Naor:

Expanders with respect to Hadamard spaces and random graphs: extended abstract. 353-358 - László Babai

:
On the automorphism groups of strongly regular graphs I. 359-368 - David Gamarnik, Madhu Sudan:

Limits of local algorithms over sparse random graphs. 369-376
Session 9: 08: 30--08: 40
- Elad Haramaty, Madhu Sudan:

Deterministic compression with uncertain priors. 377-386 - Karthekeyan Chandrasekaran, Justin Thaler, Jonathan R. Ullman, Andrew Wan:

Faster private release of marginals on small databases. 387-402 - Michael J. Kearns, Mallesh M. Pai, Aaron Roth

, Jonathan R. Ullman:
Mechanism design in large games: incentives and privacy. 403-410 - Kobbi Nissim

, Salil P. Vadhan, David Xiao:
Redrawing the boundaries on purchasing data from privacy-sensitive individuals. 411-422
Session 10: 10: 30--10: 40
- Yuichi Yoshida, Yuan Zhou:

Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems. 423-438 - Venkatesan Guruswami, Euiwoong Lee

:
Complexity of approximating CSP with balance / hard constraints. 439-448 - Karthekeyan Chandrasekaran, Santosh S. Vempala:

Integer feasibility of random polytopes: random integer programs. 449-458 - Afonso S. Bandeira, Moses Charikar

, Amit Singer
, Andy Zhu:
Multireference alignment using semidefinite programming. 459-470
Session 11: 14: 00--14: 10
- Rishi Gupta, Tim Roughgarden, C. Seshadhri:

Decompositions of triangle-dense graphs. 471-482 - Eldar Fischer

, Yonatan Goldhirsh, Oded Lachish
:
Partial tests, universal tests and decomposability. 483-500 - Tali Kaufman, Alexander Lubotzky

:
High dimensional expanders and property testing. 501-506 - Kazuo Iwama, Yuichi Yoshida:

Parameterized testability. 507-516
Session 12: 16: 00--16: 10
- Gillat Kol, Shay Moran, Amir Shpilka

, Amir Yehudayoff:
Direct sum fails for zero error average communication. 517-522 - Siyao Guo, Pavel Hubácek

, Alon Rosen, Margarita Vald:
Rational arguments: single round delegation with sublinear verification. 523-540 - Mark Braverman, Jing Chen, Sampath Kannan:

Optimal provision-after-wait in healthcare. 541-542 - Joseph Y. Halpern, Rafael Pass

, Lior Seeman:
The truth behind the myth of the folk theorem. 543-554

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














