Sciweavers

72 search results - page 2 / 15
» Black-box optimization with a politician
Sort
View
DAC
1997
ACM
14 years 3 months ago
Optimizing Designs Containing Black Boxes
Tai-Hung Liu, Khurram Sajid, Adnan Aziz, Vigyan Si...
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 11 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 5 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
CPM
2008
Springer
143views Combinatorics» more  CPM 2008»
14 years 19 days ago
A Black Box for Online Approximate Pattern Matching
Abstract. We present a deterministic black box solution for online approximate matching. Given a pattern of length m and a streaming text of length n that arrives one character at ...
Raphaël Clifford, Klim Efremenko, Benny Porat...
FOCS
2010
IEEE
13 years 8 months ago
Black-Box Randomized Reductions in Algorithmic Mechanism Design
We give the first black-box reduction from arbitrary approximation algorithms to truthful approximation mechanisms for a non-trivial class of multiparameter problems. Specifically,...
Shaddin Dughmi, Tim Roughgarden