Sciweavers

612 search results - page 84 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
SOFSEM
2007
Springer
14 years 1 months ago
Deterministic Simulation of a NFA with k -Symbol Lookahead
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and ...
Bala Ravikumar, Nicolae Santean
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
14 years 4 months ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
ICALP
2009
Springer
14 years 8 months ago
Rumor Spreading in Social Networks
Social networks are an interesting class of graphs likely to become of increasing importance in the future, not only theoretically, but also for its probable applications to ad hoc...
Flavio Chierichetti, Silvio Lattanzi, Alessandro P...
CSCL
2007
114views more  CSCL 2007»
13 years 7 months ago
Community-based learning: The core competency of residential, research-based universities
Traditionally, universities focus primarily on instructionist teaching. Such an understanding has been criticized from theoretical and practical points of view. We believe that so...
Gerhard Fischer, Markus Rohde, Volker Wulf
ICALP
2003
Springer
14 years 29 days ago
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces
Although evolutionary algorithms (EAs) are widely used in practical optimization, their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime ar...
Jens Jägersküpper