


default search action
46th STOC 2014: New York, NY, USA
- David B. Shmoys:

Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014. ACM 2014, ISBN 978-1-4503-2710-7 - Mark Bun

, Jonathan R. Ullman, Salil P. Vadhan:
Fingerprinting codes and the price of approximate differential privacy. 1-10 - Cynthia Dwork, Kunal Talwar, Abhradeep Thakurta, Li Zhang:

Analyze gauss: optimal bounds for privacy-preserving principal component analysis. 11-20 - Justin Hsu

, Zhiyi Huang, Aaron Roth
, Tim Roughgarden, Zhiwei Steven Wu
:
Private matchings and allocations. 21-30 - Boaz Barak, Jonathan A. Kelner, David Steurer

:
Rounding sum-of-squares relaxations. 31-40 - Konstantin Makarychev, Yury Makarychev

, Aravindan Vijayaraghavan:
Constant factor approximation for balanced cut in the PIE model. 41-49 - Mohit Singh, Nisheeth K. Vishnoi:

Entropy, optimization and counting. 50-59 - Chandra Chekuri, Julia Chuzhoy:

Polynomial bounds for the grid-minor theorem. 60-69 - Ken-ichi Kawarabayashi, Yusuke Kobayashi, Stephan Kreutzer:

An excluded half-integral grid theorem for digraphs and the directed disjoint paths problem. 70-78 - Ittai Abraham, Cyril Gavoille, Anupam Gupta, Ofer Neiman, Kunal Talwar:

Cops, robbers, and threatening skeletons: padded decomposition for minor-free graphs. 79-88 - Martin Grohe

, Stephan Kreutzer, Sebastian Siebertz
:
Deciding first-order properties of nowhere dense graphs. 89-98 - Sergei Artemenko, Ronen Shaltiel:

Pseudorandom generators with optimal seed length for non-boolean poly-size circuits. 99-108 - Oded Goldreich

, Avi Wigderson:
On derandomizing algorithms that err extremely rarely. 109-118 - Neeraj Kayal, Nutan Limaye, Chandan Saha, Srikanth Srinivasan

:
Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas. 119-127 - Hervé Fournier, Nutan Limaye, Guillaume Malod

, Srikanth Srinivasan
:
Lower bounds for depth 4 formulas computing iterated matrix multiplication. 128-135 - Mrinal Kumar, Shubhangi Saraf:

The limits of depth reduction for arithmetic formulas: it's all about the top fan-in. 136-145 - Neeraj Kayal, Chandan Saha, Ramprasad Saptharishi

:
A super-polynomial lower bound for regular arithmetic formulas. 146-153 - Yuichi Yoshida:

A characterization of locally testable affine-invariant properties via decomposition theorems. 154-163 - Piotr Berman, Sofya Raskhodnikova, Grigory Yaroslavtsev:

Lp-testing. 164-173 - Yi Li

, Huy L. Nguyen, David P. Woodruff:
Turnstile streaming algorithms might as well be linear sketches. 174-183 - Djamal Belazzougui:

Linear time construction of compressed text indices in compact space. 148-193 - Ryan Williams

:
New algorithms and lower bounds for circuits with linear threshold gates. 194-202 - Benjamin Rossman:

Formulas vs. circuits for small distance connectivity. 203-212 - Dmitry Gavinsky, Or Meir, Omri Weinstein, Avi Wigderson:

Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture. 213-222 - Alexander A. Sherstov:

Breaking the minsky-papert barrier for constant-depth circuits. 223-232 - Shahar Dobzinski, Noam Nisan

, Sigal Oren
:
Economic efficiency requires interaction. 233-242 - Richard Cole, Tim Roughgarden:

The sample complexity of revenue maximization. 243-252 - Ning Chen, Nick Gravin, Pinyan Lu

:
Optimal competitive auctions. 253-262 - Thomas Rothvoß:

The matching polytope has exponential extension complexity. 263-272 - Sergey Bravyi, Matthew B. Hastings:

Homological product codes. 273-282 - Dominic W. Berry

, Andrew M. Childs
, Richard Cleve, Robin Kothari
, Rolando D. Somma:
Exponential improvement in precision for simulating sparse Hamiltonians. 283-292 - Kirsten Eisenträger, Sean Hallgren, Alexei Y. Kitaev, Fang Song:

A quantum algorithm for computing the unit group of an arbitrary degree number field. 293-302 - Thomas Kesselheim, Klaus Radke, Andreas Tönnis

, Berthold Vöcking:
Primal beats dual on online packing LPs in the random-order model. 303-312 - Sungjin Im, Janardhan Kulkarni, Kamesh Munagala:

Competitive algorithms from competitive equilibria: non-clairvoyant scheduling under polyhedral constraints. 313-322 - Marek Cygan

, Daniel Lokshtanov, Marcin Pilipczuk
, Michal Pilipczuk, Saket Saurabh:
Minimum bisection is fixed parameter tractable. 323-332 - Richard Peng, Daniel A. Spielman

:
An efficient parallel solver for SDD linear systems. 333-342 - Michael B. Cohen

, Rasmus Kyng, Gary L. Miller, Jakub W. Pachocki, Richard Peng, Anup B. Rao, Shen Chen Xu:
Solving SDD linear systems in nearly mlog1/2n time. 343-352 - Christos Boutsidis, David P. Woodruff:

Optimal CUR matrix decompositions. 353-362 - Shay Solomon:

From hierarchical partitions to hierarchical covers: optimal fault-tolerant spanners for doubling metrics. 363-372 - Siu-Wing Cheng

, Jiongxin Jin:
Shortest paths on polyhedral surfaces and terrains. 373-382 - Michael Elberfeld, Ken-ichi Kawarabayashi:

Embedding and canonizing graphs of bounded genus in logspace. 383-392 - Joe Neeman:

Testing surface area with arbitrary accuracy. 393-397 - Itay Berman, Iftach Haitner, Aris Tentes:

Coin flipping of any constant bias implies one-way functions. 398-407 - Iftach Haitner, Eliad Tsfadia:

An almost-optimally fair three-party coin-flipping protocol. 408-416 - Carl A. Miller, Yaoyun Shi:

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. 417-426 - Matthew Coudron, Henry Yuen:

Infinite randomness expansion with a constant number of devices. 427-436 - Daniel M. Kane:

The average sensitivity of an intersection of half spaces. 437-440 - Amit Daniely, Nati Linial, Shai Shalev-Shwartz:

From average case complexity to improper learning complexity. 441-448 - Pranjal Awasthi, Maria-Florina Balcan, Philip M. Long:

The power of localization for efficiently learning linear separators with noise. 449-458 - Ofer Dekel, Jian Ding, Tomer Koren, Yuval Peres:

Bandits with switching costs: T2/3 regret. 459-467 - Paul F. Christiano:

Online local learning via semidefinite programming. 468-474 - Amit Sahai, Brent Waters:

How to use indistinguishability obfuscation: deniable encryption, and more. 475-484 - Yael Tauman Kalai, Ran Raz

, Ron D. Rothblum:
How to delegate computations: the power of no-signaling proofs. 485-494 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:

Circuits resilient to additive attacks with applications to secure computation. 495-504 - Nir Bitansky

, Ran Canetti, Omer Paneth, Alon Rosen:
On the existence of extractable one-way functions. 505-514 - Vipul Goyal, Rafail Ostrovsky

, Alessandra Scafuro, Ivan Visconti
:
Black-box non-black-box zero knowledge. 515-524 - Jugal Garg, Ruta Mehta, Vijay V. Vazirani:

Dichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functions. 525-534 - Yakov Babichenko:

Query complexity of approximate nash equilibria. 535-544 - Ruta Mehta:

Constant rank bimatrix games are PPAD-hard. 545-554 - Pankaj K. Agarwal, R. Sharathkumar:

Approximation algorithms for bipartite matching with metric and geometric costs. 555-564 - Danupon Nanongkai:

Distributed approximation algorithms for weighted shortest paths. 565-573 - Alexandr Andoni, Aleksandar Nikolov

, Krzysztof Onak
, Grigory Yaroslavtsev:
Parallel algorithms for geometric graph problems. 574-583 - Navin Goyal, Santosh S. Vempala, Ying Xiao:

Fourier PCA and robust tensor decomposition. 584-593 - Aditya Bhaskara, Moses Charikar

, Ankur Moitra, Aravindan Vijayaraghavan:
Smoothed analysis of tensor decompositions. 594-603 - Siu On Chan, Ilias Diakonikolas, Rocco A. Servedio

, Xiaorui Sun:
Efficient density estimation via piecewise polynomial approximation. 604-613 - Venkatesan Guruswami, Prahladh Harsha

, Johan Håstad
, Srikanth Srinivasan
, Girish Varma:
Super-polylogarithmic hypergraph coloring hardness via low-degree long codes. 614-623 - Irit Dinur

, David Steurer
:
Analytical approach to parallel repetition. 624-633 - Subhash Khot, Madhur Tulsiani, Pratik Worah

:
A characterization of strong approximation resistance. 634-643 - László A. Végh

:
A strongly polynomial algorithm for generalized flow maximization. 644-653 - Shiri Chechik:

Approximate distance oracles with constant query time. 654-663 - Ryan Williams

:
Faster all-pairs shortest paths via circuit complexity. 664-673 - Monika Henzinger

, Sebastian Krinninger
, Danupon Nanongkai:
Sublinear-time decremental algorithms for single-source reachability and shortest paths on directed graphs. 674-683 - Michael T. Goodrich

:
Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time. 684-693 - Laurent Massoulié:

Community detection thresholds and the weak Ramanujan property. 694-703 - Hammurabi Mendes, Christine Tasson

, Maurice Herlihy:
Distributed computability in Byzantine asynchronous systems. 704-713 - Dan Alistarh, Keren Censor-Hillel, Nir Shavit:

Are lock-free concurrent algorithms practically wait-free? 714-723 - Ankit Sharma, Jan Vondrák:

Multiway cut, pairwise realizable distributions, and descending thresholds. 724-733 - Ravishankar Krishnaswamy, Viswanath Nagarajan, Kirk Pruhs, Cliff Stein:

Cluster before you hallucinate: approximating node-capacitated network design and energy efficient routing. 734-743 - Zachary Friggstad, Chaitanya Swamy:

Approximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routing. 744-753 - Alina Ene, Ali Vakilian

:
Improved approximation algorithms for degree-bounded network design problems with node connectivity requirements. 754-763 - Atri Rudra, Mary Wootters:

Every list-decodable code for high noise has abundant near-optimal rate puncturings. 764-773 - Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett

:
Non-malleable codes from additive combinatorics. 774-783 - Zeev Dvir, Shubhangi Saraf, Avi Wigderson:

Breaking the quadratic barrier for 3-LCC's over the reals. 784-793 - Mohsen Ghaffari, Bernhard Haeupler

, Madhu Sudan:
Optimal error rates for interactive coding I: adaptivity and other settings. 794-803 - Amin Coja-Oghlan:

The asymptotic k-SAT threshold. 804-813 - Jian Ding, Allan Sly, Nike Sun:

Satisfiability threshold for random regular NAE-SAT. 814-822 - Andreas Galanis, Daniel Stefankovic

, Eric Vigoda:
Inapproximability for antiferromagnetic spin systems in the tree non-uniqueness region. 823-831 - Anindya De, Rocco A. Servedio

:
Efficient deterministic approximate counting for low-degree polynomial threshold functions. 832-841 - Shachar Lovett

:
Communication is bounded by root of rank. 842-846 - Mika Göös, Toniann Pitassi:

Communication lower bounds via critical block sensitivity. 847-856 - Harry Buhrman, Richard Cleve, Michal Koucký

, Bruno Loff
, Florian Speelman
:
Computing with a full memory: catalytic space. 857-866 - Michael A. Forbes, Ramprasad Saptharishi

, Amir Shpilka
:
Hitting sets for multilinear read-once algebraic branching programs, in any order. 867-875

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














