Sciweavers

JCSS
2008
62views more  JCSS 2008»
13 years 11 months ago
Maximal repetitions in strings
The cornerstone of any algorithm computing all repetitions in strings of length n in O(n) time is the fact that the number of maximal repetitions (runs) is linear. Therefore, the ...
Maxime Crochemore, Lucian Ilie
JCSS
2008
73views more  JCSS 2008»
13 years 11 months ago
Structure identification of Boolean relations and plain bases for co-clones
We give a quadratic algorithm for the following structure identification problem: given a Boolean relation R and a finite set S of Boolean relations, can the relation R be express...
Nadia Creignou, Phokion G. Kolaitis, Bruno Zanutti...
JCSS
2008
96views more  JCSS 2008»
13 years 11 months ago
Precedence constrained scheduling in (2 - 7/(3p+1)) optimal
We present a polynomial time approximation algorithm for unit time precedence constrained scheduling. Our algorithm guarantees schedules which are at most 2 - 7 3p+1 factor as lon...
Devdatta Gangal, Abhiram G. Ranade
JCSS
2008
107views more  JCSS 2008»
13 years 11 months ago
A unified theory of structural tractability for constraint satisfaction problems
In this paper we derive a generic form of structural decomposition for the constraint satisfaction problem, which we call a guarded decomposition. We show that many existing decom...
David A. Cohen, Peter Jeavons, Marc Gyssens
JCSS
2008
120views more  JCSS 2008»
13 years 11 months ago
Quantum certificate complexity
Given a Boolean function f, we study two natural generalizations of the certificate complexity C (f): the randomized certificate complexity RC (f) and the quantum certificate comp...
Scott Aaronson
JCSS
2008
70views more  JCSS 2008»
13 years 11 months ago
The complexity of properly learning simple concept classes
Michael Alekhnovich, Mark Braverman, Vitaly Feldma...
JCSS
2008
44views more  JCSS 2008»
13 years 11 months ago
Online linear optimization and adaptive routing
Baruch Awerbuch, Robert Kleinberg
JCSS
2008
96views more  JCSS 2008»
13 years 11 months ago
A combinatorial characterization of resolution width
We provide a characterization of the resolution width introduced in the context of propositional proof complexity in terms of the existential pebble game introduced in the context...
Albert Atserias, Víctor Dalmau
JCSS
2008
96views more  JCSS 2008»
13 years 11 months ago
Stateless data concealment for distributed systems
With the growing number of Web applications and their variety, the need to prevent unauthorised access to data and to ensure data integrity in distributed systems has led to an in...
Rachid Anane, Sukhvir Dhillon, Behzad Bordbar
JCSS
2008
87views more  JCSS 2008»
13 years 11 months ago
Finding large 3-free sets I: The small n case
There has been much work on the following question: given n, how large can a subset of {1, . . . , n} be that has no arithmetic progressions of length 3. We call such sets 3-free....
William I. Gasarch, James Glenn, Clyde P. Kruskal