Sciweavers

49 search results - page 4 / 10
» Cryptography with Constant Input Locality
Sort
View
JCP
2006
74views more  JCP 2006»
13 years 9 months ago
Local Boosting of Decision Stumps for Regression and Classification Problems
Numerous data mining problems involve an investigation of associations between features in heterogeneous datasets, where different prediction models can be more suitable for differ...
Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Pan...
CPM
2009
Springer
121views Combinatorics» more  CPM 2009»
14 years 4 months ago
LCS Approximation via Embedding into Local Non-repetitive Strings
A classical measure of similarity between strings is the length of the longest common subsequence(LCS) between the two given strings. The search for efficient algorithms for findi...
Gad M. Landau, Avivit Levy, Ilan Newman
LICS
2009
IEEE
14 years 4 months ago
Pointer Programs and Undirected Reachability
Pointer programs are a model of structured computation within logspace. They capture the common description of logspace algorithms as programs that take as input some structured d...
Martin Hofmann, Ulrich Schöpp
STOC
2002
ACM
117views Algorithms» more  STOC 2002»
14 years 10 months ago
Hardness amplification within NP
We study the average-case hardness of the class NP against deterministic polynomial time algorithms. We prove that there exists some constant ? > 0 such that if there is some l...
Ryan O'Donnell
SIAMCOMP
2010
94views more  SIAMCOMP 2010»
13 years 8 months ago
Local Monotonicity Reconstruction
We propose a general model of local property reconstruction. Suppose we have a function f on domain Γ, which is supposed to have a particular property P, but may not have the pro...
Michael E. Saks, C. Seshadhri