Sciweavers

STOC
2007
ACM
146views Algorithms» more  STOC 2007»
16 years 29 days ago
Playing games with approximation algorithms
In an online linear optimization problem, on each period t, an online algorithm chooses st S from a fixed (possibly infinite) set S of feasible decisions. Nature (who may be adve...
Sham M. Kakade, Adam Tauman Kalai, Katrina Ligett
123
Voted
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
16 years 29 days ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek
102
Voted
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 29 days ago
Toward a general theory of quantum games
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum in...
Gus Gutoski, John Watrous
74
Voted
STOC
2007
ACM
120views Algorithms» more  STOC 2007»
16 years 29 days ago
Approximation algorithms for budgeted learning problems
Sudipto Guha, Kamesh Munagala
79
Voted
STOC
2007
ACM
83views Algorithms» more  STOC 2007»
16 years 29 days ago
Verifying and decoding in constant depth
Shafi Goldwasser, Dan Gutfreund, Alexander Healy, ...
103
Voted
STOC
2007
ACM
85views Algorithms» more  STOC 2007»
16 years 29 days ago
Faster integer multiplication
For more than 35 years, the fastest known method for integer multiplication has been the Sch?onhage-Strassen algorithm running in time O(n log n log log n). Under certain restricti...
Martin Fürer
66
Voted
STOC
2007
ACM
104views Algorithms» more  STOC 2007»
16 years 29 days ago
Optimal suffix selection
Gianni Franceschini, S. Muthukrishnan
103
Voted
STOC
2007
ACM
100views Algorithms» more  STOC 2007»
16 years 29 days ago
Reordering buffers for general metric spaces
In the reordering buffer problem, we are given an input sequence of requests for service each of which corresponds to a point in a metric space. The cost of serving the requests h...
Matthias Englert, Harald Räcke, Matthias West...
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 29 days ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
100
Voted
STOC
2007
ACM
128views Algorithms» more  STOC 2007»
16 years 29 days ago
Iteratively constructing preconditioners via the conjugate gradient method
We consider the problem of solving a symmetric, positive definite system of linear equations. The most well-known and widely-used method for solving such systems is the preconditi...
John Dunagan, Nicholas J. A. Harvey