Sciweavers

524 search results - page 30 / 105
» ets 2010
Sort
View
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 7 months ago
A Separation of NP and coNP in Multiparty Communication Complexity
: We prove that coNP MA in the number-on-forehead model of multiparty communication complexity for up to k = (1 - )logn players, where > 0 is any constant. Specifically, we con...
Dmitry Gavinsky, Alexander A. Sherstov
FOSSACS
2010
Springer
14 years 2 months ago
Toward a Compositional Theory of Leftist Grammars and Transformations
Leftist grammars [Motwani et al., STOC 2000] are special semi-Thue systems where symbols can only insert or erase to their left. We develop a theory of leftist grammars seen as wor...
Pierre Chambart, Ph. Schnoebelen
FSE
2010
Springer
149views Cryptology» more  FSE 2010»
14 years 11 days ago
Domain Extension for Enhanced Target Collision-Resistant Hash Functions
We answer the question of Reyhanitabar et al. from FSE’09 of constructing a domain extension scheme for enhanced target collisionresistant (eTCR) hash functions with sublinear ke...
Ilya Mironov
ICALP
2010
Springer
14 years 11 days ago
On the k-Independence Required by Linear Probing and Minwise Independence
We show that linear probing requires 5-independent hash functions for expected constant-time performance, matching an upper bound of [Pagh et al. STOC’07]. For (1 + ε)-approxima...
Mihai Patrascu, Mikkel Thorup
AAAI
2010
13 years 9 months ago
Filtering Bounded Knapsack Constraints in Expected Sublinear Time
We present a highly efficient incremental algorithm for propagating bounded knapsack constraints. Our algorithm is based on the sublinear filtering algorithm for binary knapsack c...
Yuri Malitsky, Meinolf Sellmann, Radoslaw Szymanek