Sciweavers

SODA
2008
ACM
110views Algorithms» more  SODA 2008»
14 years 1 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
14 years 1 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
SODA
2008
ACM
124views Algorithms» more  SODA 2008»
14 years 1 months ago
Competitive queue management for latency sensitive packets
We consider the online problem of non-preemptive queue management. An online sequence of packets arrive, each of which has an associated intrinsic value. Packets can be accepted t...
Amos Fiat, Yishay Mansour, Uri Nadav
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
14 years 1 months ago
Fast asynchronous byzantine agreement and leader election with full information
We resolve two long-standing open problems in distributed computation by describing polylogarithmic protocols for Byzantine agreement and leader election in the asynchronous full ...
Bruce M. Kapron, David Kempe, Valerie King, Jared ...
SODA
2008
ACM
86views Algorithms» more  SODA 2008»
14 years 1 months ago
Declaring independence via the sketching of sketches
Piotr Indyk, Andrew McGregor
SODA
2008
ACM
131views Algorithms» more  SODA 2008»
14 years 1 months ago
Approximating connected facility location problems via random facility sampling and core detouring
We present a simple randomized algorithmic framework for connected facility location problems. The basic idea is as follows: We run a black-box approximation algorithm for the unc...
Friedrich Eisenbrand, Fabrizio Grandoni, Thomas Ro...
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
14 years 1 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
14 years 1 months ago
Coresets, sparse greedy approximation, and the Frank-Wolfe algorithm
The problem of maximizing a concave function f(x) in a simplex S can be solved approximately by a simple greedy algorithm. For given k, the algorithm can find a point x(k) on a k-...
Kenneth L. Clarkson