Sciweavers

STOC
2002
ACM
97views Algorithms» more  STOC 2002»
14 years 11 months ago
Tight security proofs for the bounded-storage model
Stefan Dziembowski, Ueli M. Maurer
STOC
2002
ACM
93views Algorithms» more  STOC 2002»
14 years 11 months ago
Competitive recommendation systems
Petros Drineas, Iordanis Kerenidis, Prabhakar Ragh...
STOC
2002
ACM
91views Algorithms» more  STOC 2002»
14 years 11 months ago
The importance of being biased
The Minimum Vertex Cover problem is the problem of, given a graph, finding a smallest set of vertices that touches all edges. We show that it is NP-hard to approximate this proble...
Irit Dinur, Shmuel Safra
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
14 years 11 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 11 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
STOC
2002
ACM
95views Algorithms» more  STOC 2002»
14 years 11 months ago
Crawling on web graphs
Colin Cooper, Alan M. Frieze
STOC
2002
ACM
90views Algorithms» more  STOC 2002»
14 years 11 months ago
Clifford algebras and approximating the permanent
Steve Chien, Lars Eilstrup Rasmussen, Alistair Sin...
STOC
2002
ACM
105views Algorithms» more  STOC 2002»
14 years 11 months ago
Approximating the smallest grammar: Kolmogorov complexity in natural models
Moses Charikar, Eric Lehman, Ding Liu, Rina Panigr...
STOC
2002
ACM
177views Algorithms» more  STOC 2002»
14 years 11 months ago
Similarity estimation techniques from rounding algorithms
A locality sensitive hashing scheme is a distribution on a family F of hash functions operating on a collection of objects, such that for two objects x, y, PrhF [h(x) = h(y)] = si...
Moses Charikar
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
14 years 11 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...