skip to main content
Skip header Section
Probability and Computing: Randomized Algorithms and Probabilistic AnalysisJanuary 2005
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-83540-4
Published:01 January 2005
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Klinkenberg L, Blumenthal C, Chen M, Haase D and Katoen J (2024). Exact Bayesian Inference for Loopy Probabilistic Programs using Generating Functions, Proceedings of the ACM on Programming Languages, 8:OOPSLA1, (923-953), Online publication date: 29-Apr-2024.
  2. Huang Q, Ye K and Gao X (2024). Skew-polynomial-sparse matrix multiplication, Journal of Symbolic Computation, 121:C, Online publication date: 1-Mar-2024.
  3. Preti G, De Francisci Morales G and Riondato M (2024). Alice  and the Caterpillar: A more descriptive null model for assessing data mining results, Knowledge and Information Systems, 66:3, (1917-1954), Online publication date: 1-Mar-2024.
  4. Nie G, Xu D, Wang X and Zhang Z (2024). Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula, Frontiers of Computer Science: Selected Publications from Chinese Universities, 18:1, Online publication date: 1-Feb-2024.
  5. Lo A, Patel V and Yıldız M (2024). Hamilton cycles in dense regular digraphs and oriented graphs, Journal of Combinatorial Theory Series B, 164:C, (119-160), Online publication date: 1-Jan-2024.
  6. Bhattacharyya S and Sarkar P Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm Progress in Cryptology – INDOCRYPT 2023, (307-328)
  7. ACM
    Auvolat A, Bromberg Y, Frey D, Mvondo D and Taïani F Basalt Proceedings of the 24th International Middleware Conference, (111-123)
  8. Mandal S, Molla A and Moses W (2023). Efficient live exploration of a dynamic ring with mobile robots, Theoretical Computer Science, 980:C, Online publication date: 20-Nov-2023.
  9. ACM
    Gaži P, Kiayias A and Russell A Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (845-858)
  10. ACM
    Kearney J, Neumann F and Sutton A Fixed-Parameter Tractability of the (1 + 1) Evolutionary Algorithm on Random Planted Vertex Covers Proceedings of the 17th ACM/SIGEVO Conference on Foundations of Genetic Algorithms, (96-104)
  11. ACM
    Fajardo M, Lehre P and Lin S Runtime Analysis of a Co-Evolutionary Algorithm Proceedings of the 17th ACM/SIGEVO Conference on Foundations of Genetic Algorithms, (73-83)
  12. ACM
    Liu R, Liu Q and Ge T Fairness-Aware Continuous Predictions of Multiple Analytics Targets in Dynamic Networks Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1512-1523)
  13. Wang J, Yang J, Zhang C and Lin X (2023). Efficient Maximum Edge-Weighted Biclique Search on Large Bipartite Graphs, IEEE Transactions on Knowledge and Data Engineering, 35:8, (7921-7934), Online publication date: 1-Aug-2023.
  14. Vatsalan D, Bhaskar R and Kaafar M (2023). Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures, IEEE Transactions on Knowledge and Data Engineering, 35:8, (8185-8198), Online publication date: 1-Aug-2023.
  15. Ding J and Du H (2023). Detection Threshold for Correlated Erdős-Rényi Graphs via Densest Subgraph, IEEE Transactions on Information Theory, 69:8, (5289-5298), Online publication date: 1-Aug-2023.
  16. ACM
    Cormode G Applications of Sketching and Pathways to Impact Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (5-10)
  17. ACM
    Wang P, Yang C, Xie D, Zhao J, Li H, Tao J and Guan X (2023). An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation, Proceedings of the ACM on Management of Data, 1:1, (1-24), Online publication date: 26-May-2023.
  18. ACM
    Pandey P, Bender M, Conway A, Farach-Colton M, Kuszmaul W, Tagliavini G and Johnson R (2023). IcebergHT: High Performance Hash Tables Through Stability and Low Associativity, Proceedings of the ACM on Management of Data, 1:1, (1-26), Online publication date: 26-May-2023.
  19. Bera D, Pratap R and Verma B (2023). Dimensionality Reduction for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 35:4, (3658-3671), Online publication date: 1-Apr-2023.
  20. Allendorf D, Meyer U, Penschuck M and Tran H (2023). Parallel global edge switching for the uniform sampling of simple graphs with prescribed degrees, Journal of Parallel and Distributed Computing, 174:C, (118-129), Online publication date: 1-Apr-2023.
  21. Gao W, Xu F and Zhou Z (2022). Towards convergence rate analysis of random forests for classification, Artificial Intelligence, 313:C, Online publication date: 1-Dec-2022.
  22. ACM
    Liu Q and Ge T RL2: A Call for Simultaneous Representation Learning and Rule Learning for Graph Streams Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1109-1119)
  23. Gaffney K, Prammer M, Brasfield L, Hipp D, Kennedy D and Patel J (2022). SQLite, Proceedings of the VLDB Endowment, 15:12, (3535-3547), Online publication date: 1-Aug-2022.
  24. Fei Y and Chen Y (2022). Hidden Integrality and Semirandom Robustness of SDP Relaxation for Sub-Gaussian Mixture Model, Mathematics of Operations Research, 47:3, (2464-2493), Online publication date: 1-Aug-2022.
  25. Ben Basat R, Einziger G, Keslassy I, Orda A, Vargaftik S and Waisbard E (2022). Memento: Making Sliding Windows Efficient for Heavy Hitters, IEEE/ACM Transactions on Networking, 30:4, (1440-1453), Online publication date: 1-Aug-2022.
  26. ACM
    Augustine J, Chatterjee S and Pandurangan G A Fully-Distributed Scalable Peer-to-Peer Protocol for Byzantine-Resilient Distributed Hash Tables Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures, (87-98)
  27. ACM
    Fleming N, Pankratov D, Pitassi T and Robere R (2022). Random -CNFs are Hard for Cutting Planes, Journal of the ACM, 69:3, (1-32), Online publication date: 30-Jun-2022.
  28. Dolev S, Gudes E, Segev E, Ullman J and Weintraub G BFLUT Bloom Filter for Private Look Up Tables Cyber Security, Cryptology, and Machine Learning, (499-505)
  29. ACM
    Zeng Y, Tong Y and Chen L Faster and Better Solution to Embed Lp Metrics by Tree Metrics Proceedings of the 2022 International Conference on Management of Data, (2135-2148)
  30. ACM
    Giakkoupis G Expanders via local edge flips in quasilinear time Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, (64-76)
  31. ACM
    Bouillard A, Nikolaus P and Schmitt J (2022). Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6:2, (1-27), Online publication date: 26-May-2022.
  32. ACM
    Haslegrave J, Sauerwald T and Sylvester J (2022). Time Dependent Biased Random Walks, ACM Transactions on Algorithms, 18:2, (1-30), Online publication date: 30-Apr-2022.
  33. ACM
    Luo C, Lakshman V, Shrivastava A, Cao T, Nag S, Goutam R, Lu H, Song Y and Yin B ROSE: Robust Caches for Amazon Product Search Companion Proceedings of the Web Conference 2022, (89-93)
  34. Zhou Q, Calvert A and Young M (2022). Singletons for simpletons revisiting windowed backoff with Chernoff bounds, Theoretical Computer Science, 909:C, (39-53), Online publication date: 28-Mar-2022.
  35. Fan W, Fu W, Jin R, Lu P and Tian C (2022). Discovering association rules from big graphs, Proceedings of the VLDB Endowment, 15:7, (1479-1492), Online publication date: 1-Mar-2022.
  36. Zhang G and Chen B (2021). Self-orthogonal quasi-abelian codes are asymptotically good, Finite Fields and Their Applications, 78:C, Online publication date: 1-Feb-2022.
  37. ACM
    Das S and Kapelko R (2021). On the Range Assignment in Wireless Sensor Networks for Minimizing the Coverage-Connectivity Cost, ACM Transactions on Sensor Networks, 17:4, (1-48), Online publication date: 30-Nov-2021.
  38. ACM
    Li K, Wang Y and Tang Y DETER: Denial of Ethereum Txpool sERvices Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (1645-1667)
  39. ACM
    Kolluri A, Baluta T and Saxena P Private Hierarchical Clustering in Federated Networks Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2342-2360)
  40. ACM
    Doosti M, Kumar N, Delavar M and Kashefi E (2021). Client-server Identification Protocols with Quantum PUF, ACM Transactions on Quantum Computing, 2:3, (1-40), Online publication date: 30-Sep-2021.
  41. ACM
    Garay J and Shen Y On Bitcoin cash's target recalculation functions Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, (192-204)
  42. Chou L, Liu Z, Wang Z and Shrivastava A Efficient and Less Centralized Federated Learning Machine Learning and Knowledge Discovery in Databases. Research Track, (772-787)
  43. Ertl O (2021). SetSketch, Proceedings of the VLDB Endowment, 14:11, (2244-2257), Online publication date: 1-Jul-2021.
  44. ACM
    Werner M (2021). GloBiMapsAI: An AI-Enhanced Probabilistic Data Structure for Global Raster Datasets, ACM Transactions on Spatial Algorithms and Systems, 7:4, (1-24), Online publication date: 21-Jun-2021.
  45. ACM
    Beutner R and Ong L On probabilistic termination of functional programs with continuous distributions Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1312-1326)
  46. Lemiesz J (2021). On the algebra of data sketches, Proceedings of the VLDB Endowment, 14:9, (1655-1667), Online publication date: 1-May-2021.
  47. Dumitrescu A (2021). Finding a mediocre player, Discrete Applied Mathematics, 293:C, (15-24), Online publication date: 15-Apr-2021.
  48. Xu Z, Zhao L, Liang W, Rana O, Zhou P, Xia Q, Xu W and Wu G (2020). Energy-Aware Inference Offloading for DNN-Driven Applications in Mobile Edge Clouds, IEEE Transactions on Parallel and Distributed Systems, 32:4, (799-814), Online publication date: 1-Apr-2021.
  49. Desmouceaux Y, Enguehard M and Clausen T (2021). Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers, IEEE Transactions on Network and Service Management, 18:1, (672-686), Online publication date: 1-Mar-2021.
  50. Hu H and Li J (2021). Bit-Oriented Sampling for Aggregation on Big Data, IEEE Transactions on Knowledge and Data Engineering, 33:2, (359-373), Online publication date: 1-Feb-2021.
  51. Robinson P Being fast means being chatty Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (2105-2120)
  52. Neumann A, Alexander B and Neumann F (2021). Evolutionary Image Transition and Painting Using Random Walks, Evolutionary Computation, 28:4, (643-675), Online publication date: 1-Dec-2020.
  53. ACM
    Beraldi R, Canali C, Lancellotti R and Proietti Mattia G Randomized Load Balancing under Loosely Correlated State Information in Fog Computing Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (123-127)
  54. Satija S, Mehra A, Singanamalla S, Grover K, Sivathanu M, Chandran N, Gupta D and Lokam S Blockene Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, (567-582)
  55. Filliâtre J and Paskevich A Abstraction and Genericity in Why3 Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles, (122-142)
  56. ACM
    Vidanage A, Christen P, Ranbaduge T and Schnell R A Graph Matching Attack on Privacy-Preserving Record Linkage Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (1485-1494)
  57. ACM
    Woo J, Ok J and Yi Y Iterative learning of graph connectivity from partially-observed cascade samples Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, (141-150)
  58. ACM
    Riondato M and Vandin F (2020). MiSoSouP, ACM Transactions on Knowledge Discovery from Data, 14:5, (1-31), Online publication date: 21-Aug-2020.
  59. Hölzl M, Roland M, Mir O and Mayrhofer R (2019). Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation, International Journal of Information Security, 19:4, (401-417), Online publication date: 1-Aug-2020.
  60. ACM
    Chatterjee S, Gmyr R and Pandurangan G Sleeping is Efficient: MIS in O(1)-rounds Node-averaged Awake Complexity Proceedings of the 39th Symposium on Principles of Distributed Computing, (99-108)
  61. ACM
    Dornhaus A, Lynch N, Mallmann-Trenn F, Pajak D and Radeva T Self-Stabilizing Task Allocation In Spite of Noise Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures, (201-211)
  62. Xu Z, Zhou L, Chi-Kin Chau S, Liang W, Xia Q and Zhou P Collaborate or Separate? Distributed Service Caching in Mobile Edge Clouds IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (2066-2075)
  63. Mansour Y, Slivkins A and Syrgkanis V (2020). Bayesian Incentive-Compatible Bandit Exploration, Operations Research, 68:4, (1132-1161), Online publication date: 1-Jul-2020.
  64. Zhang T (2020). Phase Retrieval by Alternating Minimization With Random Initialization, IEEE Transactions on Information Theory, 66:7, (4563-4573), Online publication date: 1-Jul-2020.
  65. ACM
    Alev V and Lau L Improved analysis of higher order random walks and applications Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, (1198-1211)
  66. Poularakis K, Llorca J, Tulino A, Taylor I and Tassiulas L (2020). Service Placement and Request Routing in MEC Networks With Storage, Computation, and Communication Constraints, IEEE/ACM Transactions on Networking, 28:3, (1047-1060), Online publication date: 1-Jun-2020.
  67. Avarikioti Z, Emiris I, Kavouras L and Psarros I (2020). High-Dimensional Approximate r-Nets, Algorithmica, 82:6, (1675-1702), Online publication date: 1-Jun-2020.
  68. Doerr B, Kötzing T, Lagodzinski J and Lengler J (2020). The impact of lexicographic parsimony pressure for ORDER/MAJORITY on the run time, Theoretical Computer Science, 816:C, (144-168), Online publication date: 6-May-2020.
  69. Kötzing T, Lagodzinski J, Lengler J and Melnichenko A (2020). Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming, Theoretical Computer Science, 816:C, (96-113), Online publication date: 6-May-2020.
  70. ACM
    Green Larsen K, Mitzenmacher M and Tsourakakis C Clustering with a faulty oracle Proceedings of The Web Conference 2020, (2831-2834)
  71. Lin S, Zhang J and Ying L (2020). Crowdsensing for Spectrum Discovery: A Waze-Inspired Design via Smartphone Sensing, IEEE/ACM Transactions on Networking, 28:2, (750-763), Online publication date: 1-Apr-2020.
  72. Servan-Schreiber S, Riondato M and Zgraggen E (2019). ProSecCo: progressive sequence mining with convergence guarantees, Knowledge and Information Systems, 62:4, (1313-1340), Online publication date: 1-Apr-2020.
  73. Strobel M (2020). Non-standard analysis in dynamic geometry, Journal of Symbolic Computation, 97:C, (69-108), Online publication date: 1-Mar-2020.
  74. Sudo Y, Ooshita F, Kakugawa H, Masuzawa T, Datta A and Larmore L (2020). Loosely-stabilizing leader election with polylogarithmic convergence time, Theoretical Computer Science, 806:C, (617-631), Online publication date: 2-Feb-2020.
  75. ACM
    Fomin F, Golovach P, Lokshtanov D, Panolan F and Saurabh S (2019). Approximation Schemes for Low-rank Binary Matrix Approximation Problems, ACM Transactions on Algorithms, 16:1, (1-39), Online publication date: 31-Jan-2020.
  76. ACM
    Cormode G and Jowhari H (2019). L Samplers and Their Applications, ACM Computing Surveys, 52:1, (1-31), Online publication date: 31-Jan-2020.
  77. Goerigk M, Kasperski A and Zieliński P (2020). Two-stage combinatorial optimization problems under risk, Theoretical Computer Science, 804:C, (29-45), Online publication date: 12-Jan-2020.
  78. Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
  79. Liu X and Oh S Minimax optimal estimation of approximate differential privacy on neighboring databases Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2417-2428)
  80. Gabrys R and Milenkovic O (2019). Unique Reconstruction of Coded Strings From Multiset Substring Spectra, IEEE Transactions on Information Theory, 65:12, (7682-7696), Online publication date: 1-Dec-2019.
  81. Xu W, Li T, Liang W, Yu J, Yang N and Gao S (2019). Identifying structural hole spanners to maximally block information propagation, Information Sciences: an International Journal, 505:C, (100-126), Online publication date: 1-Dec-2019.
  82. Paul D and Stevanović D (2019). Eigenvector-based identification of bipartite subgraphs, Discrete Applied Mathematics, 269:C, (146-158), Online publication date: 30-Sep-2019.
  83. Tavory A Determining Principal Component Cardinality Through the Principle of Minimum Description Length Machine Learning, Optimization, and Data Science, (655-666)
  84. Agrawal S, Avadhanula V, Goyal V and Zeevi A (2019). MNL-Bandit, Operations Research, 67:5, (1453-1485), Online publication date: 1-Sep-2019.
  85. Lee K, Chandrasekher K, Pedarsani R and Ramchandran K (2019). SAFFRON: A Fast, Efficient, and Robust Framework for Group Testing Based on Sparse-Graph Codes, IEEE Transactions on Signal Processing, 67:17, (4649-4664), Online publication date: 1-Sep-2019.
  86. Corus D, Oliveto P and Yazdani D (2019). Artificial immune systems can find arbitrarily good approximations for the NP-hard number partitioning problem, Artificial Intelligence, 274:C, (180-196), Online publication date: 1-Sep-2019.
  87. ACM
    Kleinberg R, Slivkins A and Upfal E (2019). Bandits and Experts in Metric Spaces, Journal of the ACM, 66:4, (1-77), Online publication date: 26-Aug-2019.
  88. ACM
    Ozisik A, Andresen G, Levine B, Tapp D, Bissias G and Katkuri S Graphene Proceedings of the ACM Special Interest Group on Data Communication, (303-317)
  89. De Marco G, Jurdziński T and Kowalski D Optimal Channel Utilization with Limited Feedback Fundamentals of Computation Theory, (140-152)
  90. Koslicki D and Zabeti H (2019). Improving MinHash via the containment index with applications to metagenomic analysis, Applied Mathematics and Computation, 354:C, (206-215), Online publication date: 1-Aug-2019.
  91. Fraigniaud P and Natale E (2019). Noisy rumor spreading and plurality consensus, Distributed Computing, 32:4, (257-276), Online publication date: 1-Aug-2019.
  92. Ahn J, Qader M, Kang W, Nguyen H, Zhang G and Ben-Romdhane S Jungle Proceedings of the 11th USENIX Conference on Hot Topics in Storage and File Systems, (9-9)
  93. Jahani-Nezhad T and Maddah-Ali M CodedSketch: Coded Distributed Computation of Approximated Matrix Multiplication 2019 IEEE International Symposium on Information Theory (ISIT), (2489-2493)
  94. Davidson A and Ganesh A The Robot Crawler Model on Complete k-Partite and Erdős-Rényi Random Graphs Algorithms and Models for the Web Graph, (57-70)
  95. ACM
    Fanti G, Jiao J, Makkuva A, Oh S, Rana R and Viswanath P Barracuda Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (351-360)
  96. Jovanovic P, Luykx A, Mennink B, Sasaki Y and Yasuda K (2019). Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes, Journal of Cryptology, 32:3, (895-940), Online publication date: 1-Jul-2019.
  97. ACM
    Dinesh K, Koroth S and Sarma J (2019). Characterization and Lower Bounds for Branching Program Size using Projective Dimension, ACM Transactions on Computation Theory, 11:2, (1-22), Online publication date: 30-Jun-2019.
  98. ACM
    Mitzenmacher M and Morgan T Robust Set Reconciliation via Locality Sensitive Hashing Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (164-181)
  99. Mahmoody A and Upfal E (2019). Optimizing static and adaptive probing schedules for rapid event detection, Theoretical Computer Science, 774:C, (14-30), Online publication date: 25-Jun-2019.
  100. Avanzini M, Lago U and Ghyselen A Type-based complexity analysis of probabilistic functional programs Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  101. ACM
    Shpilka A Sylvester-Gallai type theorems for quadratic polynomials Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (1203-1214)
  102. ACM
    Pelc A and Yadav R Using Time to Break Symmetry The 31st ACM Symposium on Parallelism in Algorithms and Architectures, (85-92)
  103. Liu J, Xiao B, Liu X, Bu K, Chen L and Nie C (2019). Efficient Polling-Based Information Collection in RFID Systems, IEEE/ACM Transactions on Networking, 27:3, (948-961), Online publication date: 1-Jun-2019.
  104. Dumitrescu A Finding a Mediocre Player Algorithms and Complexity, (212-223)
  105. Chekuri C, Quanrud K and Torres M -sparsity Approximation Bounds for Packing Integer Programs Integer Programming and Combinatorial Optimization, (128-140)
  106. Poularakis K, Llorca J, Tulino A, Taylor I and Tassiulas L Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (10-18)
  107. ACM
    Hu X, Yi K and Tao Y (2019). Output-Optimal Massively Parallel Algorithms for Similarity Joins, ACM Transactions on Database Systems, 44:2, (1-36), Online publication date: 8-Apr-2019.
  108. Doerr B, Fischbeck P, Frahnow C, Friedrich T, Kötzing T and Schirneck M (2019). Island Models Meet Rumor Spreading, Algorithmica, 81:2, (886-915), Online publication date: 1-Feb-2019.
  109. Censor-Hillel K, Fischer E, Schwartzman G and Vasudev Y (2019). Fast distributed algorithms for testing graph properties, Distributed Computing, 32:1, (41-57), Online publication date: 1-Feb-2019.
  110. Becchetti L, Clementi A, Natale E, Pasquale F and Posta G (2019). Self-stabilizing repeated balls-into-bins, Distributed Computing, 32:1, (59-68), Online publication date: 1-Feb-2019.
  111. ACM
    Bender M, Fineman J, Gilbert S and Young M (2018). Scaling Exponential Backoff, Journal of the ACM, 66:1, (1-33), Online publication date: 12-Jan-2019.
  112. Aamand A and Thorup M Non-empty bins with simple tabulation hashing Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (2498-2512)
  113. Axiotis K, Backurs A, Jin C, Tzamos C and Wu H Fast modular subset sum using linear sketching Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (58-69)
  114. Maunu T, Zhang T and Lerman G (2021). A well-tempered landscape for non-convex robust subspace recovery, The Journal of Machine Learning Research, 20:1, (1348-1406), Online publication date: 1-Jan-2019.
  115. Lang H, Neumann T, Kemper A and Boncz P (2019). Performance-optimal filtering, Proceedings of the VLDB Endowment, 12:5, (502-515), Online publication date: 1-Jan-2019.
  116. Alshahrani R and Peyravi H Adaptive Probe Size Estimation for Cluster Management in Datacenters 2018 IEEE Global Communications Conference (GLOBECOM), (1-7)
  117. Han Y, Jiao J, Lee C, Weissman T, Wu Y and Yu T Entropy rate estimation for Markov chains with large state space Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9803-9814)
  118. Ebrahimi E and Unruh D (2018). Quantum collision-resistance of non-uniformly distributed functions, Quantum Information & Computation, 18:15-16, (1332-1349), Online publication date: 1-Dec-2018.
  119. Cogliati B and Seurin Y (2018). Analysis of the single-permutation encrypted Davies---Meyer construction, Designs, Codes and Cryptography, 86:12, (2703-2723), Online publication date: 1-Dec-2018.
  120. ACM
    Looz M and Meyerhenke H (2018). Updating Dynamic Random Hyperbolic Graphs in Sublinear Time, ACM Journal of Experimental Algorithmics, 23, (1-30), Online publication date: 15-Nov-2018.
  121. Samajder S and Sarkar P (2018). Multiple (Truncated) Differential Cryptanalysis, Cryptography and Communications, 10:6, (1137-1163), Online publication date: 1-Nov-2018.
  122. Avin C and Elsässer R (2018). Breaking the $$\log n$$logn barrier on rumor spreading, Distributed Computing, 31:6, (503-513), Online publication date: 1-Nov-2018.
  123. ACM
    Kaminski B, Katoen J, Matheja C and Olmedo F (2018). Weakest Precondition Reasoning for Expected Runtimes of Randomized Algorithms, Journal of the ACM, 65:5, (1-68), Online publication date: 31-Oct-2018.
  124. ACM
    Adiga A, Cedeno-Mieles V, Kuhlman C, Marathe M, Ravi S, Rosenkrantz D and Stearns R Inferring Probabilistic Contagion Models Over Networks Using Active Queries Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (377-386)
  125. ACM
    Grubbs P, Lacharite M, Minaud B and Paterson K Pump up the Volume Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (315-331)
  126. ACM
    Kiffer L, Rajaraman R and shelat a A Better Method to Analyze Blockchain Consistency Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (729-744)
  127. Blanchard N (2018). Building Trust for Sample Voting, International Journal of Decision Support System Technology, 10:4, (50-64), Online publication date: 1-Oct-2018.
  128. ACM
    Pandurangan G, Robinson P and Scquizzato M (2018). Fast Distributed Algorithms for Connectivity and MST in Large Graphs, ACM Transactions on Parallel Computing, 5:1, (1-22), Online publication date: 19-Sep-2018.
  129. ACM
    Mitzenmacher M, Rajaraman R and Roche S (2018). Better Bounds for Coalescing-Branching Random Walks, ACM Transactions on Parallel Computing, 5:1, (1-23), Online publication date: 19-Sep-2018.
  130. Yang B, Liu M and Li Z (2018). Rendezvous on the Fly: Efficient Neighbor Discovery for Autonomous UAVs, IEEE Journal on Selected Areas in Communications, 36:9, (2032-2044), Online publication date: 1-Sep-2018.
  131. Ghazi B, Komargodski I, Kothari P and Sudan M (2018). Communication with Contextual Uncertainty, Computational Complexity, 27:3, (463-509), Online publication date: 1-Sep-2018.
  132. ACM
    Chierichetti F, Giakkoupis G, Lattanzi S and Panconesi A (2018). Rumor Spreading and Conductance, Journal of the ACM, 65:4, (1-21), Online publication date: 16-Aug-2018.
  133. Kim S and Han S (2018). Distinguishing social contacts and pass-by contacts in DTN routing, Telecommunications Systems, 68:4, (669-685), Online publication date: 1-Aug-2018.
  134. ACM
    Buchbinder N and Feldman M (2018). Deterministic Algorithms for Submodular Maximization Problems, ACM Transactions on Algorithms, 14:3, (1-20), Online publication date: 31-Jul-2018.
  135. ACM
    Basat R, Einziger G, Feibish S, Moraney J and Raz D Network-wide routing-oblivious heavy hitters Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, (66-73)
  136. ACM
    Ertl O BagMinHash - Minwise Hashing Algorithm for Weighted Sets Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1368-1377)
  137. ACM
    Riondato M and Vandin F MiSoSouP Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2130-2139)
  138. ACM
    Robinson P, Scheideler C and Setzer A Breaking the $ilde$Omega($sqrt{n})$ Barrier Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (173-182)
  139. Li H, Liu R, Nitaj A and Pan Y Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC’08 Information Security and Privacy, (455-466)
  140. ACM
    Sudholt D On the robustness of evolutionary algorithms to noise Proceedings of the Genetic and Evolutionary Computation Conference, (1523-1530)
  141. ACM
    Lengler J, Sudholt D and Witt C Medium step sizes are harmful for the compact genetic algorithm Proceedings of the Genetic and Evolutionary Computation Conference, (1499-1506)
  142. ACM
    Grochow J and Wolpert D (2018). Beyond Number of Bit Erasures, ACM SIGACT News, 49:2, (33-56), Online publication date: 13-Jun-2018.
  143. Christen P, Vidanage A, Ranbaduge T and Schnell R Pattern-Mining Based Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage Advances in Knowledge Discovery and Data Mining, (530-542)
  144. Zhang X, Bashizade R, LaBoda C, Dwyer C and Lebeck A Architecting a stochastic computing unit with molecular optical devices Proceedings of the 45th Annual International Symposium on Computer Architecture, (301-314)
  145. Censor-Hillel K, Kavitha T, Paz A and Yehudayoff A (2018). Distributed construction of purely additive spanners, Distributed Computing, 31:3, (223-240), Online publication date: 1-Jun-2018.
  146. ACM
    McCauley S, Mikkelsen J and Pagh R Set Similarity Search for Skewed Data Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (63-74)
  147. ACM
    Bun M, Nelson J and Stemmer U Heavy Hitters and the Structure of Local Privacy Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (435-447)
  148. ACM
    Yang M, Andelfinger P, Cai W and Knoll A Evaluation of Conflict Resolution Methods for Agent-Based Simulations on the GPU Proceedings of the 2018 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (129-132)
  149. Pyoung C and Baek S (2018). Joint load balancing and energy saving algorithm for virtual network embedding in infrastructure providers, Computer Communications, 121:C, (1-18), Online publication date: 1-May-2018.
  150. Assaf E, Basat R, Einziger G and Friedman R Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for Free IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (2204-2212)
  151. Mourad S and Tewfik A Machine Assisted Human Decision Making 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6981-6985)
  152. ACM
    Hölzl M, Roland M, Mir O and Mayrhofer R Bridging the gap in privacy-preserving revocation Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1601-1609)
  153. Cade C, Montanaro A and Belovs A (2018). Time and space efficient quantum algorithms for detecting cycles and testing bipartiteness, Quantum Information & Computation, 18:1-2, (18-50), Online publication date: 1-Feb-2018.
  154. ACM
    Lokshtanov D, Ramanujan M and Saurabh S (2018). Linear Time Parameterized Algorithms for Subset Feedback Vertex Set, ACM Transactions on Algorithms, 14:1, (1-37), Online publication date: 30-Jan-2018.
  155. Berenbrink P, Giakkoupis G and Kling P Tight bounds for coalescing-branching random walks on regular graphs Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1715-1733)
  156. ACM
    Chatterjee S, Pandurangan G and Robinson P The Complexity of Leader Election Proceedings of the 19th International Conference on Distributed Computing and Networking, (1-10)
  157. Bosilca G, Bouteiller A, Guermouche A, Herault T, Robert Y, Sens P and Dongarra J (2018). A failure detector for HPC platforms, International Journal of High Performance Computing Applications, 32:1, (139-158), Online publication date: 1-Jan-2018.
  158. Melo W, Machado R, Carmo L and Ray I (2018). Using Physical Context-Based Authentication against External Attacks, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  159. Liu Y, Wang G and Ye Z (2018). Dynamic mode extrapolation to improve the efficiency of dual time stepping method, Journal of Computational Physics, 352:C, (190-212), Online publication date: 1-Jan-2018.
  160. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases, Information Sciences: an International Journal, 422:C, (497-515), Online publication date: 1-Jan-2018.
  161. Stanley-Marbell P and Rinard M (2017). Error-Efficient Computing Systems, Foundations and Trends in Electronic Design Automation, 11:4, (362-461), Online publication date: 18-Dec-2017.
  162. Al-Awami L and Hassanein H (2017). Robust decentralized data storage and retrieval for wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 128:C, (41-50), Online publication date: 9-Dec-2017.
  163. Wang Q and Chen W Improving regret bounds for combinatorial semi-bandits with probabilistically triggered arms and its applications Proceedings of the 31st International Conference on Neural Information Processing Systems, (1161-1171)
  164. Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2017). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
  165. Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2018). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
  166. ACM
    Stefani L, Epasto A, Riondato M and Upfal E (2017). TRIÈST, ACM Transactions on Knowledge Discovery from Data, 11:4, (1-50), Online publication date: 30-Nov-2017.
  167. Beimel A, Farràs O, Mintz Y and Peter N Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Theory of Cryptography, (394-423)
  168. ACM
    Anderson D, Bevan P, Lang K, Liberty E, Rhodes L and Thaler J A high-performance algorithm for identifying frequent items in data streams Proceedings of the 2017 Internet Measurement Conference, (268-282)
  169. Wang Z, Yang Y, Pei J, Chu L and Chen E (2017). Activity Maximization by Effective Information Diffusion in Social Networks, IEEE Transactions on Knowledge and Data Engineering, 29:11, (2374-2387), Online publication date: 1-Nov-2017.
  170. Choi J (2017). Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming, IEEE Transactions on Information Forensics and Security, 12:11, (2699-2711), Online publication date: 1-Nov-2017.
  171. Boyar J, Favrholdt L, Kudahl C and Mikkelsen J (2017). The Advice Complexity of a Class of Hard Online Problems, Theory of Computing Systems, 61:4, (1128-1177), Online publication date: 1-Nov-2017.
  172. Wang P, Qi Y, Sun Y, Zhang X, Tao J and Guan X (2017). Approximately counting triangles in large graph streams including edge duplicates with a fixed memory usage, Proceedings of the VLDB Endowment, 11:2, (162-175), Online publication date: 1-Oct-2017.
  173. Xu H, Lau W, Yang Z, de Veciana G and Hou H (2017). Mitigating Service Variability in MapReduce Clusters via Task Cloning: A Competitive Analysis, IEEE Transactions on Parallel and Distributed Systems, 28:10, (2866-2880), Online publication date: 1-Oct-2017.
  174. Cohen R, Cassuto Y, Cohen R and Cassuto Y (2017). Coding for Improved Throughput Performance in Network Switches, IEEE/ACM Transactions on Networking, 25:5, (2802-2814), Online publication date: 1-Oct-2017.
  175. Jiao J, Venkat K, Han Y and Weissman T (2017). Maximum Likelihood Estimation of Functionals of Discrete Distributions, IEEE Transactions on Information Theory, 63:10, (6774-6798), Online publication date: 1-Oct-2017.
  176. Sedlacek M and Bestak R (2017). Analysis of Neighbourhood Relations for Femtocell Networks, Wireless Personal Communications: An International Journal, 96:4, (5239-5252), Online publication date: 1-Oct-2017.
  177. Saibaba A, Alexanderian A and Ipsen I (2017). Randomized matrix-free trace and log-determinant estimators, Numerische Mathematik, 137:2, (353-395), Online publication date: 1-Oct-2017.
  178. ACM
    Nguyen H, Ghosh P, Mayo M and Dinh T (2017). Social Influence Spectrum at Scale, ACM Transactions on Information Systems, 36:2, (1-26), Online publication date: 15-Sep-2017.
  179. Yan W, Tehranipoor F and Chandy J (2017). PUF-Based Fuzzy Authentication Without Error Correcting Codes, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:9, (1445-1457), Online publication date: 1-Sep-2017.
  180. Moradi Shahrivar E, Pirani M and Sundaram S (2017). Spectral and structural properties of random interdependent networks, Automatica (Journal of IFAC), 83:C, (234-242), Online publication date: 1-Sep-2017.
  181. ACM
    Serrà J and Karatzoglou A Getting Deep Recommenders Fit Proceedings of the Eleventh ACM Conference on Recommender Systems, (279-287)
  182. Sadeqi M and Hamilton H Lossy compression of pattern databases using acyclic random hypergraphs Proceedings of the 26th International Joint Conference on Artificial Intelligence, (4376-4383)
  183. Talvitie T, Niinimäki T and Koivisto M The mixing of Markov chains on linear extensions in practice Proceedings of the 26th International Joint Conference on Artificial Intelligence, (524-530)
  184. Mamakos M and Chalkiadakis G Probability bounds for overlapping coalition formation Proceedings of the 26th International Joint Conference on Artificial Intelligence, (331-337)
  185. Caragiannis I and Micha E Learning a ground truth ranking using noisy approval votes Proceedings of the 26th International Joint Conference on Artificial Intelligence, (149-155)
  186. Wu Z, Kolonko M and Möhring R (2017). Stochastic Runtime Analysis of the Cross-Entropy Algorithm, IEEE Transactions on Evolutionary Computation, 21:4, (616-628), Online publication date: 1-Aug-2017.
  187. ACM
    Berenbrink P, Clementi A, Elsässer R, Kling P, Mallmann-Trenn F and Natale E Ignore or Comply? Proceedings of the ACM Symposium on Principles of Distributed Computing, (335-344)
  188. ACM
    Illiano V, Steiner R and Lupu E Unity is strength! Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (134-144)
  189. Even G and Medina M (2017). Online Packet-Routing in Grids with Bounded Buffers, Algorithmica, 78:3, (819-868), Online publication date: 1-Jul-2017.
  190. ACM
    Benoit A, Cavelan A, Le Fèvre V and Robert Y Optimal Checkpointing Period with Replicated Execution on Heterogeneous Platforms Proceedings of the 2017 Workshop on Fault-Tolerance for HPC at Extreme Scale, (9-16)
  191. Haase C, Kiefer S and Lohrey M Computing quantiles in Markov chains with multi-dimensional costs Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
  192. ACM
    Nguyen H, Nguyen T, Vu T and Dinh T (2017). Outward Influence and Cascade Size Estimation in Billion-scale Networks, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:1, (1-30), Online publication date: 13-Jun-2017.
  193. Dang D, Jansen T and Lehre P (2017). Populations Can Be Essential in Tracking Dynamic Optima, Algorithmica, 78:2, (660-680), Online publication date: 1-Jun-2017.
  194. Dani V, King V, Movahedi M, Saia J and Zamani M (2017). Secure multi-party computation in large networks, Distributed Computing, 30:3, (193-229), Online publication date: 1-Jun-2017.
  195. ACM
    Li J, Cheng S, Cai Z, Yu J, Wang C and Li Y (2017). Approximate Holistic Aggregation in Wireless Sensor Networks, ACM Transactions on Sensor Networks, 13:2, (1-24), Online publication date: 31-May-2017.
  196. ACM
    Ye J Discovery of Frequent Itemsets through Randomized Sampling with Bernstein's Inequality Proceedings of the 2017 International Conference on Data Mining, Communications and Information Technology, (1-5)
  197. ACM
    Koutris P and Suciu D (2017). A Guide to Formal Analysis of Join Processing in Massively Parallel Systems, ACM SIGMOD Record, 45:4, (18-27), Online publication date: 11-May-2017.
  198. ACM
    Eppstein D, Goodrich M, Mitzenmacher M and Torres M 2-3 Cuckoo Filters for Faster Triangle Listing and Set Intersection Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (247-260)
  199. Yu J and Chen L (2017). Stability Analysis of Frame Slotted Aloha Protocol, IEEE Transactions on Mobile Computing, 16:5, (1462-1474), Online publication date: 1-May-2017.
  200. Klonowski M and Syga P (2017). Enhancing privacy for ad hoc systems with predeployment key distribution, Ad Hoc Networks, 59:C, (35-47), Online publication date: 1-May-2017.
  201. Zhu J, Potti N, Saurabh S and Patel J (2017). Looking ahead makes query plans robust, Proceedings of the VLDB Endowment, 10:8, (889-900), Online publication date: 1-Apr-2017.
  202. Yu L, Li H and Li W (2017). Source-Channel Secrecy for Shannon Cipher System, IEEE Transactions on Information Theory, 63:4, (2596-2622), Online publication date: 1-Apr-2017.
  203. Gilbert S, Newport C and Zheng C (2017). Who are you? Secure identities in single hop ad hoc networks, Distributed Computing, 30:2, (103-125), Online publication date: 1-Apr-2017.
  204. ACM
    Krishnasamy S, Sen R, Shakkottai S and Oh S (2016). Detecting Sponsored Recommendations, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 2:1, (1-29), Online publication date: 31-Mar-2017.
  205. Tal I (2017). On the Construction of Polar Codes for Channels With Moderate Input Alphabet Sizes, IEEE Transactions on Information Theory, 63:3, (1501-1509), Online publication date: 1-Mar-2017.
  206. Jegelka S and Bilmes J (2017). Graph cuts with interacting edge weights, Mathematical Programming: Series A and B, 162:1-2, (241-282), Online publication date: 1-Mar-2017.
  207. ACM
    Galanis A, Göbel A, Goldberg L, Lapinskas J and Richerby D (2017). Amplifiers for the Moran Process, Journal of the ACM, 64:1, (1-90), Online publication date: 28-Feb-2017.
  208. ACM
    Zhang J, Khoram S and Li J Boosting the Performance of FPGA-based Graph Processor using Hybrid Memory Cube Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (207-216)
  209. Naumovitz T, Saks M and Seshadhri C Accurate and nearly optimal sublinear approximations to ulam distance Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (2012-2031)
  210. Goswami M, Pagh R, Silvestri F and Sivertsen J Distance sensitive bloom filters without false negatives Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (257-269)
  211. Bruhn H and Schaudt O (2017). The union-closed sets conjecture almost holds for almost all random bipartite graphs, European Journal of Combinatorics, 59:C, (129-149), Online publication date: 1-Jan-2017.
  212. ACM
    Emek Y and Rosén A (2016). Semi-Streaming Set Cover, ACM Transactions on Algorithms, 13:1, (1-22), Online publication date: 21-Dec-2016.
  213. ACM
    Steiner R and Lupu E (2016). Attestation in Wireless Sensor Networks, ACM Computing Surveys, 49:3, (1-31), Online publication date: 13-Dec-2016.
  214. ACM
    Thanh T, The L and Doan C A robus and effective MODE algorithm for workflow scheduling in cloud enveronment Proceedings of the 7th Symposium on Information and Communication Technology, (259-264)
  215. Carlsson J, Behroozi M, Devulapalli R and Meng X (2016). Household-Level Economies of Scale in Transportation, Operations Research, 64:6, (1372-1387), Online publication date: 1-Dec-2016.
  216. Jeź A and Lohrey M (2016). Approximation of smallest linear tree grammar, Information and Computation, 251:C, (215-251), Online publication date: 1-Dec-2016.
  217. Ayav T and Szer H (2016). Identifying critical architectural components with spectral analysis of fault trees, Applied Soft Computing, 49:C, (1270-1282), Online publication date: 1-Dec-2016.
  218. ACM
    Alistarh D, Censor-Hillel K and Shavit N (2016). Are Lock-Free Concurrent Algorithms Practically Wait-Free?, Journal of the ACM, 63:4, (1-20), Online publication date: 8-Nov-2016.
  219. ACM
    Fomin F, Lokshtanov D, Panolan F and Saurabh S (2016). Efficient Computation of Representative Families with Applications in Parameterized and Exact Algorithms, Journal of the ACM, 63:4, (1-60), Online publication date: 8-Nov-2016.
  220. Angel S and Setty S Unobservable communication over fully untrusted infrastructure Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (551-569)
  221. Chen X, Li Y, Wang P and Lui J (2016). A general framework for estimating graphlet statistics via random walk, Proceedings of the VLDB Endowment, 10:3, (253-264), Online publication date: 1-Nov-2016.
  222. Cheng Y, Yuan Y, Chen L, Wang G, Giraud-Carrier C and Sun Y (2016). DistR, IEEE Transactions on Parallel and Distributed Systems, 27:11, (3172-3185), Online publication date: 1-Nov-2016.
  223. ACM
    Kachemir R, Kellett B and Behara K Gloria Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-10)
  224. ACM
    Wang S, Zhang X, Li Y, Bashizade R, Yang S, Dwyer C and Lebeck A (2016). Accelerating markov random field inference using molecular optical gibbs sampling units, ACM SIGARCH Computer Architecture News, 44:3, (558-569), Online publication date: 12-Oct-2016.
  225. ACM
    Jung M, Mathew D, Weis C, Wehn N, Heinrich I, Natale M and Krumke S ConGen Proceedings of the Second International Symposium on Memory Systems, (257-267)
  226. Quezada-Naquid M, Marcelín-Jiménez R and González-Compeán J (2016). Babel, International Journal of Web Services Research, 13:4, (36-53), Online publication date: 1-Oct-2016.
  227. Gong W, Liu H, Chen L, Liu K and Liu Y (2016). Fast Composite Counting in RFID Systems, IEEE/ACM Transactions on Networking, 24:5, (2756-2767), Online publication date: 1-Oct-2016.
  228. Kreimer A and Herman M (2016). A Novel Structure Learning Algorithm for Optimal Bayesian Network, Procedia Computer Science, 96:C, (43-52), Online publication date: 1-Oct-2016.
  229. Munro J and Nicholson P (2016). Succinct Posets, Algorithmica, 76:2, (445-473), Online publication date: 1-Oct-2016.
  230. Shah V and Veciana G (2016). Impact of fairness and heterogeneity on delays in large-scale centralized content delivery systems, Queueing Systems: Theory and Applications, 83:3-4, (361-397), Online publication date: 1-Aug-2016.
  231. ACM
    Fraigniaud P and Natale E Noisy Rumor Spreading and Plurality Consensus Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (127-136)
  232. ACM
    Mitzenmacher M, Rajaraman R and Roche S Better Bounds for Coalescing-Branching Random Walks Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (313-323)
  233. ACM
    Pandurangan G, Robinson P and Scquizzato M Fast Distributed Algorithms for Connectivity and MST in Large Graphs Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (429-438)
  234. ACM
    Devanny W, Goodrich M and Jetviroj K Parallel Equivalence Class Sorting Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (265-274)
  235. Bachrach Y, Filmus Y, Oren J and Zick Y A characterization of voting power for discrete weight distributions Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (74-80)
  236. ACM
    Olmedo F, Kaminski B, Katoen J and Matheja C Reasoning about Recursive Probabilistic Programs Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (672-681)
  237. Dang D and Lehre P (2016). Runtime Analysis of Non-elitist Populations, Algorithmica, 75:3, (428-461), Online publication date: 1-Jul-2016.
  238. Doerr B and Doerr C (2016). The Impact of Random Initialization on the Runtime of Randomized Search Heuristics, Algorithmica, 75:3, (529-553), Online publication date: 1-Jul-2016.
  239. ACM
    Jiang J, Mitzenmacher M and Thaler J (2017). Parallel Peeling Algorithms, ACM Transactions on Parallel Computing, 3:1, (1-27), Online publication date: 28-Jun-2016.
  240. ACM
    Yang Y, Mao X, Pei J and He X Continuous Influence Maximization Proceedings of the 2016 International Conference on Management of Data, (727-741)
  241. ACM
    Brandt S, Fischer O, Hirvonen J, Keller B, Lempiäinen T, Rybicki J, Suomela J and Uitto J A lower bound for the distributed Lovász local lemma Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (479-488)
  242. ACM
    Asharov G, Naor M, Segev G and Shahaf I Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (1101-1114)
  243. Wang S, Zhang X, Li Y, Bashizade R, Yang S, Dwyer C and Lebeck A Accelerating markov random field inference using molecular optical gibbs sampling units Proceedings of the 43rd International Symposium on Computer Architecture, (558-569)
  244. ACM
    Agarwal P, Fox K, Munagala K and Nath A Parallel Algorithms for Constructing Range and Nearest-Neighbor Searching Data Structures Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (429-440)
  245. ACM
    McGregor A, Vorotnikova S and Vu H Better Algorithms for Counting Triangles in Data Streams Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (401-411)
  246. Wu Y and Yang P (2016). Minimax Rates of Entropy Estimation on Large Alphabets via Best Polynomial Approximation, IEEE Transactions on Information Theory, 62:6, (3702-3720), Online publication date: 1-Jun-2016.
  247. Chaudhury K and Dabhade S (2016). Fast and Provably Accurate Bilateral Filtering, IEEE Transactions on Image Processing, 25:6, (2519-2528), Online publication date: 1-Jun-2016.
  248. Safaka I, Czap L, Argyraki K and Fragouli C (2016). Creating Secrets Out of Packet Erasures, IEEE Transactions on Information Forensics and Security, 11:6, (1177-1191), Online publication date: 1-Jun-2016.
  249. Liao X, Liu C, McCoy D, Shi E, Hao S and Beyah R Characterizing Long-tail SEO Spam on Cloud Web Hosting Services Proceedings of the 25th International Conference on World Wide Web, (321-332)
  250. Kaminski B, Katoen J, Matheja C and Olmedo F Weakest Precondition Reasoning for Expected Run---Times of Probabilistic Programs Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (364-389)
  251. Meng T, Wu F and Chen G (2016). Code-based neighbor discovery protocols in mobile wireless networks, IEEE/ACM Transactions on Networking, 24:2, (806-819), Online publication date: 1-Apr-2016.
  252. Beimel A, Farràs O and Mintz Y (2016). Secret-Sharing Schemes for Very Dense Graphs, Journal of Cryptology, 29:2, (336-362), Online publication date: 1-Apr-2016.
  253. Shibata C and Yoshinaka R (2016). Probabilistic learnability of context-free grammars with basic distributional properties from positive examples, Theoretical Computer Science, 620:C, (46-72), Online publication date: 21-Mar-2016.
  254. ACM
    Augustine J, Pandurangan G and Robinson P (2016). Distributed Algorithmic Foundations of Dynamic Networks, ACM SIGACT News, 47:1, (69-98), Online publication date: 10-Mar-2016.
  255. Bishop A and Pastro V Robust Secret Sharing Schemes Against Local Adversaries Proceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9615, (327-356)
  256. ACM
    Mahmoody A, Riondato M and Upfal E Wiggins Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, (677-686)
  257. Zhu K and Ying L (2016). Information source detection in the SIR model, IEEE/ACM Transactions on Networking, 24:1, (408-421), Online publication date: 1-Feb-2016.
  258. Wang J, Li H, Lv T, Wang T, Li X and Kundu S (2016). Abstraction-Guided Simulation Using Markov Analysis for Functional Verification, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35:2, (285-297), Online publication date: 1-Feb-2016.
  259. Vatsalan D and Christen P (2016). Privacy-preserving matching of similar patients, Journal of Biomedical Informatics, 59:C, (285-298), Online publication date: 1-Feb-2016.
  260. Shen J and Ren Y (2016). Bounding the scaling window of random constraint satisfaction problems, Journal of Combinatorial Optimization, 31:2, (786-801), Online publication date: 1-Feb-2016.
  261. Kanade V, Levi R, Lotker Z, Mallmann-Trenn F and Mathieu C Distance in the forest fire model how far are you from eve? Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1602-1620)
  262. Augustine J, Moses W, Redlich A and Upfal E Balanced allocation Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (655-671)
  263. Bender M, Fineman J, Gilbert S and Young M How to scale exponential backoff Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (636-654)
  264. Achlioptas D, Hassani S, Macris N and Urbanke R Bounds for random constraint satisfaction problems via spatial coupling Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (469-479)
  265. Badanidiyuru A, Papadimitriou C, Rubinstein A, Seeman L and Singer Y Locally adaptive optimization Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (414-429)
  266. Buchbinder N and Feldman M Deterministic algorithms for submodular maximization problems Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (392-403)
  267. ACM
    Einziger G and Friedman R Counting with TinyTable Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
  268. ACM
    Decker C, Seidel J and Wattenhofer R Bitcoin meets strong consistency Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
  269. Shuai H, Yang D, Yu P and Chen M (2016). A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee, IEEE Transactions on Knowledge and Data Engineering, 28:1, (2-16), Online publication date: 1-Jan-2016.
  270. Mahmoody A, Kornaropoulos E and Upfal E Optimizing Static and Adaptive Probing Schedules for Rapid Event Detection Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (377-391)
  271. Goel A, Munagala K, Sharma A and Zhang H A Note on Modeling Retweet Cascades on Twitter Proceedings of the 12th International Workshop on Algorithms and Models for the Web Graph - Volume 9479, (119-131)
  272. Hayashi M and Tan V (2015). Asymmetric Evaluations of Erasure and Undetected Error Probabilities, IEEE Transactions on Information Theory, 61:12, (6560-6577), Online publication date: 1-Dec-2015.
  273. Kunihiro N An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure Proceedings of the 9th International Conference on Provable Security - Volume 9451, (61-81)
  274. Yan W, Tehranipoor F and Chandy J A Novel Way to Authenticate Untrusted Integrated Circuits Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (132-138)
  275. ACM
    Tsourakakis C Streaming Graph Partitioning in the Planted Partition Model Proceedings of the 2015 ACM on Conference on Online Social Networks, (27-35)
  276. ACM
    Dutta C, Pandurangan G, Rajaraman R and Roche S (2015). Coalescing-Branching Random Walks on Graphs, ACM Transactions on Parallel Computing, 2:3, (1-29), Online publication date: 2-Nov-2015.
  277. Dhillon H and Caire G (2015). Wireless Backhaul Networks: Capacity Bound, Scalability Analysis and Design Guidelines, IEEE Transactions on Wireless Communications, 14:11, (6043-6056), Online publication date: 1-Nov-2015.
  278. Yanjun Han , Jiantao Jiao and Weissman T (2015). Minimax Estimation of Discrete Distributions Under $\ell _{1}$ Loss, IEEE Transactions on Information Theory, 61:11, (6343-6354), Online publication date: 1-Nov-2015.
  279. ACM
    Berlin K, Slater D and Saxe J Malicious Behavior Detection using Windows Audit Logs Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, (35-44)
  280. ACM
    Ohrimenko O, Costa M, Fournet C, Gkantsidis C, Kohlweiss M and Sharma D Observing and Preventing Leakage in MapReduce Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1570-1581)
  281. Venkataramanan R, Swamy V and Ramchandran K (2015). Low-Complexity Interactive Algorithms for Synchronization From Deletions, Insertions, and Substitutions, IEEE Transactions on Information Theory, 61:10, (5670-5689), Online publication date: 1-Oct-2015.
  282. Shan Zhou and Lei Ying (2015). On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad Hoc Networks, IEEE Transactions on Information Theory, 61:10, (5643-5655), Online publication date: 1-Oct-2015.
  283. ACM
    Riondato M and Upfal E VC-Dimension and Rademacher Averages Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2321-2322)
  284. ACM
    Mitzenmacher M, Pachocki J, Peng R, Tsourakakis C and Xu S Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (815-824)
  285. Jeż A (2015). Approximation of grammar-based compression via recompression, Theoretical Computer Science, 592:C, (115-134), Online publication date: 9-Aug-2015.
  286. Kaibin Huang , Kountouris M and Li V (2015). Renewable Powered Cellular Networks: Energy Field Modeling and Network Coverage, IEEE Transactions on Wireless Communications, 14:8, (4234-4247), Online publication date: 1-Aug-2015.
  287. Kolomvatsos K, Anagnostopoulos C and Hadjiefthymiades S (2015). A time optimized scheme for top-k list maintenance over incomplete data streams, Information Sciences: an International Journal, 311:C, (59-73), Online publication date: 1-Aug-2015.
  288. ACM
    Alistarh D, Sauerwald T and Vojnović M Lock-Free Algorithms under Stochastic Schedulers Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (251-260)
  289. Censor-Hillel K and Toukan T On Fast and Robust Information Spreading in the Vertex-Congest Model Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (270-284)
  290. Barenboim L, Elkin M and Gavoille C A Fast Network-Decomposition Algorithm and Its Applications to Constant-Time Distributed Computation Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (209-223)
  291. ACM
    Maggs B and Sitaraman R (2015). Algorithmic Nuggets in Content Delivery, ACM SIGCOMM Computer Communication Review, 45:3, (52-66), Online publication date: 13-Jul-2015.
  292. ACM
    Dang D, Jansen T and Lehre P Populations can be Essential in Dynamic Optimisation Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1407-1414)
  293. Tabatabaei S, Ur-Rehman O, Zivic N and Ruland C (2015). Secure and Robust Two-Phase Image Authentication, IEEE Transactions on Multimedia, 17:7, (945-956), Online publication date: 1-Jul-2015.
  294. Georgiou K, Kranakis E and Krizanc D (2015). Excuse me! or the courteous theatregoers' problem, Theoretical Computer Science, 586:C, (95-110), Online publication date: 27-Jun-2015.
  295. ACM
    Shah V and de Veciana G (2015). Impact of Fairness and Heterogeneity on Delays in Large-scale Content Delivery Networks, ACM SIGMETRICS Performance Evaluation Review, 43:1, (375-387), Online publication date: 24-Jun-2015.
  296. Chakrabarti A, Cormode G, McGregor A, Thaler J and Venkatasubramanian S Verifiable stream computation and arthur-merlin communication Proceedings of the 30th Conference on Computational Complexity, (217-243)
  297. ACM
    Shah V and de Veciana G Impact of Fairness and Heterogeneity on Delays in Large-scale Content Delivery Networks Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, (375-387)
  298. ACM
    Becchetti L, Clementi A, Natale E, Pasquale F and Posta G Self-Stabilizing Repeated Balls-into-Bins Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (332-339)
  299. Daltrophe H, Dolev S and Lotker Z (2015). Probabilistic connectivity threshold for directional antenna widths, Theoretical Computer Science, 584:C, (103-114), Online publication date: 13-Jun-2015.
  300. ACM
    Venkataramani S, Chakradhar S, Roy K and Raghunathan A Approximate computing and the quest for computing efficiency Proceedings of the 52nd Annual Design Automation Conference, (1-6)
  301. Caragiannis I, Krimpas G and Voudouris A Aggregating Partial Rankings with Applications to Peer Grading in Massive Online Open Courses Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (675-683)
  302. Jiantao Jiao , Venkat K, Yanjun Han and Weissman T (2015). Minimax Estimation of Functionals of Discrete Distributions, IEEE Transactions on Information Theory, 61:5, (2835-2885), Online publication date: 1-May-2015.
  303. Bar-Noy A and Baumer B (2015). Average Case Network Lifetime on an Interval with Adjustable Sensing Ranges, Algorithmica, 72:1, (148-166), Online publication date: 1-May-2015.
  304. ACM
    Chiluka N, Andrade N, Pouwelse J and Sips H Social Networks Meet Distributed Systems Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (507-518)
  305. ACM
    Yuan X, Wang C and Ren K Enabling IP Protection for Outsourced Integrated Circuit Design Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (237-247)
  306. Vattani A, Chierichetti F and Lowenstein K (2015). Optimal probabilistic cache stampede prevention, Proceedings of the VLDB Endowment, 8:8, (886-897), Online publication date: 1-Apr-2015.
  307. Yuan Y, Wang G, Chen L and Wang H (2015). Graph similarity search on large uncertain graph databases, The VLDB Journal — The International Journal on Very Large Data Bases, 24:2, (271-296), Online publication date: 1-Apr-2015.
  308. ACM
    Babaioff M, Dughmi S, Kleinberg R and Slivkins A (2015). Dynamic Pricing with Limited Supply, ACM Transactions on Economics and Computation, 3:1, (1-26), Online publication date: 27-Mar-2015.
  309. Düben P, Schlachter J, Parishkrati , Yenugula S, Augustine J, Enz C, Palem K and Palmer T Opportunities for energy efficient computing Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (764-769)
  310. Venkataramani S, Chakradhar S, Roy K and Raghunathan A Computing approximately, and efficiently Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (748-751)
  311. ACM
    Kutten S, Pandurangan G, Peleg D, Robinson P and Trehan A (2015). On the Complexity of Universal Leader Election, Journal of the ACM, 62:1, (1-27), Online publication date: 2-Mar-2015.
  312. Das Sarma A, Molla A and Pandurangan G (2015). Efficient random walk sampling in distributed networks, Journal of Parallel and Distributed Computing, 77:C, (84-94), Online publication date: 1-Mar-2015.
  313. ACM
    Jeż A (2015). Faster Fully Compressed Pattern Matching by Recompression, ACM Transactions on Algorithms, 11:3, (1-43), Online publication date: 13-Jan-2015.
  314. ACM
    Avin C, Keller B, Lotker Z, Mathieu C, Peleg D and Pignolet Y Homophily and the Glass Ceiling Effect in Social Networks Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (41-50)
  315. Giannakopoulos Y and Koutsoupias E (2015). Competitive analysis of maintaining frequent items of a stream, Theoretical Computer Science, 562:C, (23-32), Online publication date: 11-Jan-2015.
  316. Acharya J and Daskalakis C Testing Poisson binomial distributions Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1829-1840)
  317. Klauck H, Nanongkai D, Pandurangan G and Robinson P Distributed computation of large-scale graph problems Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (391-410)
  318. (2015). Fast distributed PageRank computation, Theoretical Computer Science, 561:PB, (113-121), Online publication date: 4-Jan-2015.
  319. (2015). Optimizing linear functions with the ( 1 + λ ) evolutionary algorithm-Different asymptotic runtimes for different instances, Theoretical Computer Science, 561:PA, (3-23), Online publication date: 4-Jan-2015.
  320. Dong W, Yang Y and Zhang W (2015). On the selection of information sources for gossip spreading, International Journal of Distributed Sensor Networks, 2015, (38-38), Online publication date: 1-Jan-2015.
  321. Schildbach G, Goulart P and Morari M (2015). Linear controller design for chance constrained systems, Automatica (Journal of IFAC), 51:C, (278-284), Online publication date: 1-Jan-2015.
  322. ACM
    Tang Y, Wang T, Liu L, Hu X and Jang J Lightweight authentication of freshness in outsourced key-value stores Proceedings of the 30th Annual Computer Security Applications Conference, (176-185)
  323. Adiga A, Chandran L and Sivadasan N (2014). Lower bounds for boxicity, Combinatorica, 34:6, (631-655), Online publication date: 1-Dec-2014.
  324. ACM
    Doerr B, Friedrich T and Sauerwald T (2014). Quasirandom Rumor Spreading, ACM Transactions on Algorithms, 11:2, (1-35), Online publication date: 17-Nov-2014.
  325. ACM
    Zhang Y and Prakash B Scalable Vaccine Distribution in Large Graphs given Uncertain Data Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1719-1728)
  326. ACM
    Song C and Ge T Aroma Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1569-1578)
  327. ACM
    Yuan Y, Wang G and Chen L Pattern Match Query in a Large Uncertain Graph Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (519-528)
  328. ACM
    Dieudonné Y, Pelc A and Peleg D (2014). Gathering Despite Mischief, ACM Transactions on Algorithms, 11:1, (1-28), Online publication date: 28-Oct-2014.
  329. ACM
    Riondato M and Upfal E (2014). Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees, ACM Transactions on Knowledge Discovery from Data, 8:4, (1-32), Online publication date: 7-Oct-2014.
  330. Yuen H (2014). A quantum lower bound for distinguishing random functions from random permutations, Quantum Information & Computation, 14:13-14, (1089-1097), Online publication date: 1-Oct-2014.
  331. Begum N and Keogh E (2014). Rare time series motif discovery from unbounded streams, Proceedings of the VLDB Endowment, 8:2, (149-160), Online publication date: 1-Oct-2014.
  332. Borokhovich M, Avin C and Lotker Z (2014). Bounds for algebraic gossip on graphs, Random Structures & Algorithms, 45:2, (185-217), Online publication date: 1-Sep-2014.
  333. ACM
    Zheng X, Li J, Gao H and Cai Z Capacity of wireless networks with multiple types of multicast sessions Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (135-144)
  334. ACM
    Tang B, Ye B, Lu S, Guo S and Stojmenovic I Latency-optimized broadcast in mobile ad hoc networks without node coordination Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (317-326)
  335. ACM
    Dang D and Lehre P Evolution under partial information Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1359-1366)
  336. ACM
    Doerr B and Doerr C The impact of random initialization on the runtime of randomized search heuristics Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1375-1382)
  337. ACM
    Shenoy K B A, Biswas S and Kurur P Performance of metropolis algorithm for the minimum weight code word problem Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (485-492)
  338. ACM
    He X, Gao M, Kan M, Liu Y and Sugiyama K Predicting the popularity of web 2.0 items based on user comments Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, (233-242)
  339. Eppstein D, Goodrich M, Mitzenmacher M and Pszona P Wear Minimization for Cuckoo Hashing Proceedings of the 13th International Symposium on Experimental Algorithms - Volume 8504, (162-173)
  340. ACM
    Mitzenmacher M Balanced allocations and double hashing Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (331-342)
  341. ACM
    Jiang J, Mitzenmacher M and Thaler J Parallel peeling algorithms Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (319-330)
  342. Bi R, Gao H and Li Y Probabilistic Threshold Based Monitoring Using Sensor Networks Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491, (246-255)
  343. ACM
    Alistarh D, Censor-Hillel K and Shavit N Are lock-free concurrent algorithms practically wait-free? Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (714-723)
  344. ACM
    Rothvoss T The matching polytope has exponential extension complexity Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (263-272)
  345. Baldi P and Sadowski P (2014). The dropout learning algorithm, Artificial Intelligence, 210:C, (78-122), Online publication date: 1-May-2014.
  346. Majerski P and Przybyło J (2014). Total Vertex Irregularity Strength of Dense Graphs, Journal of Graph Theory, 76:1, (34-41), Online publication date: 1-May-2014.
  347. ACM
    Mitzenmacher M, Pagh R and Pham N Efficient estimation for high similarities using odd sketches Proceedings of the 23rd international conference on World wide web, (109-118)
  348. Sachdeva S and Vishnoi N (2014). Faster Algorithms via Approximation Theory, Foundations and Trends® in Theoretical Computer Science, 9:2, (125-210), Online publication date: 28-Mar-2014.
  349. Wang J, Li H, Lv T, Wang T and Li X Functional test generation guided by steady-state probabilities of abstract design Proceedings of the conference on Design, Automation & Test in Europe, (1-4)
  350. ACM
    Riondato M and Kornaropoulos E Fast approximation of betweenness centrality through sampling Proceedings of the 7th ACM international conference on Web search and data mining, (413-422)
  351. Aupy G, Robert Y, Vivien F and Zaidouni D (2014). Checkpointing algorithms and fault prediction, Journal of Parallel and Distributed Computing, 74:2, (2048-2064), Online publication date: 1-Feb-2014.
  352. Fomin F, Lokshtanov D and Saurabh S Efficient computation of representative sets with applications in parameterized and exact algorithms Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (142-151)
  353. Adiga A, Chandran L and Mathew R (2014). Cubicity, degeneracy, and crossing number, European Journal of Combinatorics, 35, (2-12), Online publication date: 1-Jan-2014.
  354. Shuai H, Yang D, Yu P and Chen M (2013). Willingness optimization for social group activity, Proceedings of the VLDB Endowment, 7:4, (253-264), Online publication date: 1-Dec-2013.
  355. ACM
    Kouri T and Mehta D (2013). Faster reaction mapping through improved naming techniques, ACM Journal of Experimental Algorithmics, 18, (2.1-2.32), Online publication date: 1-Dec-2013.
  356. Arampatzis A, Efraimidis P and Drosatos G (2013). A query scrambler for search privacy on the internet, Information Retrieval, 16:6, (657-679), Online publication date: 1-Dec-2013.
  357. ACM
    Klonowski M, Koza M and Kutyłowski M Efficient and robust data aggregation using untrusted infrastructure Proceedings of the 6th International Conference on Security of Information and Networks, (123-130)
  358. ACM
    Ravichandran K and Pande S (2013). Multiverse, ACM SIGPLAN Notices, 48:10, (533-552), Online publication date: 12-Nov-2013.
  359. ACM
    Tudor V, Almgren M and Papatriantafilou M Analysis of the impact of data granularity on privacy for the smart grid Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, (61-70)
  360. ACM
    Ravichandran K and Pande S Multiverse Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications, (533-552)
  361. Ying S, Feng Y, Yu N and Ying M Reachability probabilities of quantum markov chains Proceedings of the 24th international conference on Concurrency Theory, (334-348)
  362. ACM
    Peres Y, Sotnikov D, Sudakov B and Zwick U (2013). All-pairs shortest paths in O(n2) time with high probability, Journal of the ACM, 60:4, (1-25), Online publication date: 1-Aug-2013.
  363. ACM
    Dutta C, Pandurangan G, Rajaraman R and Roche S Coalescing-branching random walks on graphs Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures, (176-185)
  364. ACM
    Bodlaender M, Halldórsson M and Mitra P Connectivity and aggregation in multihop wireless networks Proceedings of the 2013 ACM symposium on Principles of distributed computing, (355-364)
  365. ACM
    Alistarh D, Aspnes J, Giakkoupis G and Woelfel P Randomized loose renaming in o(log log n) time Proceedings of the 2013 ACM symposium on Principles of distributed computing, (200-209)
  366. ACM
    Azar Y, Cohen I and Gamzu I The loss of serving in the dark Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (951-960)
  367. ACM
    Molavi Kakhki A, Kliman-Silver C and Mislove A Iolaus Proceedings of the 22nd international conference on World Wide Web, (919-930)
  368. Doerr B, Huber A and Levavi A (2013). Strong robustness of randomized rumor spreading protocols, Discrete Applied Mathematics, 161:6, (778-793), Online publication date: 1-Apr-2013.
  369. Avin C, Borokhovich M, Censor-Hillel K and Lotker Z (2013). Order optimal information spreading using algebraic gossip, Distributed Computing, 26:2, (99-117), Online publication date: 1-Apr-2013.
  370. Rothvoß T A simpler proof for O(congestion+dilation) packet routing Proceedings of the 16th international conference on Integer Programming and Combinatorial Optimization, (336-348)
  371. Bacci G, Bacci G, Larsen K and Mardare R On-the-Fly exact computation of bisimilarity distances Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (1-15)
  372. Doerr B, Jansen T, Sudholt D, Winzen C and Zarges C (2013). Mutation rate matters even when optimizing monotonic functions, Evolutionary Computation, 21:1, (1-27), Online publication date: 1-Mar-2013.
  373. Blanchet J and Stauffer A (2013). Characterizing optimal sampling of binary contingency tables via the configuration model, Random Structures & Algorithms, 42:2, (159-184), Online publication date: 1-Mar-2013.
  374. ACM
    Byrka J, Grandoni F, Rothvoss T and Sanità L (2013). Steiner Tree Approximation via Iterative Randomized Rounding, Journal of the ACM, 60:1, (1-33), Online publication date: 1-Feb-2013.
  375. ACM
    Das Sarma A, Nanongkai D, Pandurangan G and Tetali P (2013). Distributed Random Walks, Journal of the ACM, 60:1, (1-31), Online publication date: 1-Feb-2013.
  376. ACM
    Suomela J (2013). Survey of local algorithms, ACM Computing Surveys, 45:2, (1-40), Online publication date: 1-Feb-2013.
  377. ACM
    Doerr B, Sudholt D and Witt C When do evolutionary algorithms optimize separable functions in parallel? Proceedings of the twelfth workshop on Foundations of genetic algorithms XII, (51-64)
  378. Bogdan P, Sauerwald T, Stauffer A and Sun H Balls into bins via local search Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (16-34)
  379. De Marco G and Kowalski D (2013). Searching for a subset of counterfeit coins: Randomization vs determinism and adaptiveness vs non-adaptiveness, Random Structures & Algorithms, 42:1, (97-109), Online publication date: 1-Jan-2013.
  380. Goodrich M, Hirschberg D, Mitzenmacher M and Thaler J Cache-Oblivious dictionaries and multimaps with negligible failure probability Proceedings of the First Mediterranean conference on Design and Analysis of Algorithms, (203-218)
  381. ACM
    Riondato M, DeBrabant J, Fonseca R and Upfal E PARMA Proceedings of the 21st ACM international conference on Information and knowledge management, (85-94)
  382. Yanggratoke R, Kreitz G, Goldmann M and Stadler R Predicting response times for the Spotify backend Proceedings of the 8th International Conference on Network and Service Management, (117-125)
  383. ACM
    Ambainis A, Kempe J and Sattath O (2012). A quantum Lovász local lemma, Journal of the ACM, 59:5, (1-24), Online publication date: 1-Oct-2012.
  384. ACM
    Perry J, Iannucci P, Fleming K, Balakrishnan H and Shah D (2012). Spinal codes, ACM SIGCOMM Computer Communication Review, 42:4, (49-60), Online publication date: 24-Sep-2012.
  385. Dezfuli M and Haghjoo M Xtream Proceedings of the 6th international conference on Scalable Uncertainty Management, (1-15)
  386. ACM
    Perry J, Iannucci P, Fleming K, Balakrishnan H and Shah D Spinal codes Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, (49-60)
  387. ACM
    Halldórsson M and Mitra P Towards tight bounds for local broadcasting Proceedings of the 8th International Workshop on Foundations of Mobile Computing, (1-9)
  388. Ambainis A, Bačkurs A, Balodis K, Kravčenko D, Ozols R, Smotrovs J and Virza M Quantum strategies are better than classical in almost any XOR game Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (25-37)
  389. ACM
    Jansen T and Zarges C Fixed budget computations Proceedings of the 14th annual conference on Genetic and evolutionary computation, (1325-1332)
  390. Tong Y, Chen L, Cheng Y and Yu P (2012). Mining frequent itemsets over uncertain databases, Proceedings of the VLDB Endowment, 5:11, (1650-1661), Online publication date: 1-Jul-2012.
  391. Cao C, She J, Tong Y and Chen L (2012). Whom to ask?, Proceedings of the VLDB Endowment, 5:11, (1495-1506), Online publication date: 1-Jul-2012.
  392. ACM
    Stanton I and Pinar A (2012). Constructing and sampling graphs with a prescribed joint degree distribution, ACM Journal of Experimental Algorithmics, 17, (3.1-3.25), Online publication date: 1-Jul-2012.
  393. Feldmann A, Röglin H and Vöcking B (2012). Computing approximate Nash equilibria in network congestion games, Networks, 59:4, (380-386), Online publication date: 1-Jul-2012.
  394. ACM
    Haeupler B, Pandurangan G, Peleg D, Rajaraman R and Sun Z Discovery through gossip Proceedings of the twenty-fourth annual ACM symposium on Parallelism in algorithms and architectures, (140-149)
  395. ACM
    Pietracaprina A, Pucci G, Riondato M, Silvestri F and Upfal E Space-round tradeoffs for MapReduce computations Proceedings of the 26th ACM international conference on Supercomputing, (235-244)
  396. Avrachenkov K, Litvak N, Sokol M and Towsley D Quick detection of nodes with large degrees Proceedings of the 9th international conference on Algorithms and Models for the Web Graph, (54-65)
  397. Yu D, Hua Q, Dai W, Wang Y and Lau F Dynamic contention resolution in multiple-access channels Proceedings of the 10th international conference on Wired/Wireless Internet Communication, (232-243)
  398. ACM
    Chierichetti F, Kleinberg J and Panconesi A How to schedule a cascade in an arbitrary graph Proceedings of the 13th ACM Conference on Electronic Commerce, (355-368)
  399. ACM
    Kumar J, Butler K, Kim H and Vasudevan S Early prediction of NBTI effects using RTL source code analysis Proceedings of the 49th Annual Design Automation Conference, (808-813)
  400. ACM
    Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F (2012). An Efficient Rigorous Approach for Identifying Statistically Significant Frequent Itemsets, Journal of the ACM, 59:3, (1-22), Online publication date: 1-Jun-2012.
  401. Zhou D, Luo D, Lu R and Han Z (2012). The use of tail inequalities on the probable computational time of randomized search heuristics, Theoretical Computer Science, 436, (106-117), Online publication date: 1-Jun-2012.
  402. Yuan Y, Wang G, Chen L and Wang H (2012). Efficient subgraph similarity search on large probabilistic graph databases, Proceedings of the VLDB Endowment, 5:9, (800-811), Online publication date: 1-May-2012.
  403. Cao Q, Sirivianos M, Yang X and Pregueiro T Aiding the detection of fake accounts in large scale social online services Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (15-15)
  404. ACM
    Chiluka N, Andrade N, Pouwelse J and Sips H Leveraging trust and distrust for sybil-tolerant voting in online social media Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, (1-8)
  405. ACM
    Cutillo L, Molva R and Önen M Privacy preserving picture sharing Proceedings of the Fifth Workshop on Social Network Systems, (1-6)
  406. ACM
    Viswanath B, Mondal M, Gummadi K, Mislove A and Post A Canal Proceedings of the 7th ACM european conference on Computer Systems, (309-322)
  407. Karachi A, Dezfuli M and Haghjoo M PLR Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III, (405-415)
  408. ACM
    Dasgupta A, Gurevich M, Zhang L, Tseng B and Thomas A Overcoming browser cookie churn with clustering Proceedings of the fifth ACM international conference on Web search and data mining, (83-92)
  409. ACM
    Ré C and Suciu D (2012). Understanding cardinality estimation using entropy maximization, ACM Transactions on Database Systems, 37:1, (1-31), Online publication date: 1-Feb-2012.
  410. Robert J, Otrok H, Quttoum A and Boukhris R (2012). A distributed resource management model for Virtual Private Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (927-939), Online publication date: 1-Feb-2012.
  411. Fountoulakis N, Panagiotou K and Sauerwald T Ultra-fast rumor spreading in social networks Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1642-1660)
  412. Porat E and Strauss M Sublinear time, measurement-optimal, sparse recovery for all Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1215-1227)
  413. Dieudonné Y, Pelc A and Peleg D Gathering despite mischief Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (527-540)
  414. Rothvoß T The entropy rounding method in approximation algorithms Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (356-372)
  415. Goodrich M, Mitzenmacher M, Ohrimenko O and Tamassia R Privacy-preserving group data access via stateless oblivious RAM simulation Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (157-167)
  416. ACM
    Goodrich M (2011). Randomized Shellsort, Journal of the ACM, 58:6, (1-26), Online publication date: 1-Dec-2011.
  417. Hao D, Adhikari A and Sakurai K Mixed-Strategy game based trust management for clustered wireless sensor networks Proceedings of the Third international conference on Trusted Systems, (239-257)
  418. Chovanec A and Barták R On generating templates for hypothesis in inductive logic programming Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (162-173)
  419. Wei S, Nahapetian A and Potkonjak M Robust passive hardware metering Proceedings of the International Conference on Computer-Aided Design, (802-809)
  420. Kumar J, Liu L and Vasudevan S Scaling probabilistic timing verification of hardware using abstractions in design source code Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (196-205)
  421. ACM
    Cledat R, Kumar T and Pande S Efficiently speeding up sequential computation through the n-way programming model Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (537-554)
  422. ACM
    Wei S, Koushanfar F and Potkonjak M Integrated circuit digital rights management techniques using physical level characterization Proceedings of the 11th annual ACM workshop on Digital rights management, (3-14)
  423. ACM
    Cledat R, Kumar T and Pande S (2011). Efficiently speeding up sequential computation through the n-way programming model, ACM SIGPLAN Notices, 46:10, (537-554), Online publication date: 18-Oct-2011.
  424. Aspnes J Randomized consensus in expected O(n2) total work using single-writer registers Proceedings of the 25th international conference on Distributed computing, (363-373)
  425. Anta A, Mosteiro M and Muñoz J Unbounded contention resolution in multiple-access channels Proceedings of the 25th international conference on Distributed computing, (225-236)
  426. Alistarh D and Aspnes J Sub-logarithmic test-and-set against aweak adversary Proceedings of the 25th international conference on Distributed computing, (97-109)
  427. Bar-Noy A and Baumer B Maximizing network lifetime on the line with adjustable sensing ranges Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (28-41)
  428. Klein R, Penninger R, Sohler C and Woodruff D Tolerant algorithms Proceedings of the 19th European conference on Algorithms, (736-747)
  429. Hoepman J, Larsson A, Schiller E and Tsigas P (2011). Secure and self-stabilizing clock synchronization in sensor networks, Theoretical Computer Science, 412:40, (5631-5647), Online publication date: 1-Sep-2011.
  430. Radhakrishnan J and Shannigrahi S Streaming algorithms for 2-coloring uniform hypergraphs Proceedings of the 12th international conference on Algorithms and data structures, (667-678)
  431. Yuan Y, Wang G, Wang H and Chen L (2020). Efficient subgraph search over large uncertain graphs, Proceedings of the VLDB Endowment, 4:11, (876-886), Online publication date: 1-Aug-2011.
  432. Kuzu M, Kantarcioglu M, Durham E and Malin B A constraint satisfaction cryptanalysis of bloom filters in private record linkage Proceedings of the 11th international conference on Privacy enhancing technologies, (226-245)
  433. Chang C and Lyuu Y Stable sets of threshold-based cascades on the erdős-rényi random graphs Proceedings of the 22nd international conference on Combinatorial Algorithms, (96-105)
  434. Cichoń J, Lemiesz J and Zawada M On cardinality estimation protocols for wireless sensor networks Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks, (322-331)
  435. ACM
    Kranakis E, Krizanc D and Morin P (2011). Randomized rendezvous with limited memory, ACM Transactions on Algorithms, 7:3, (1-12), Online publication date: 1-Jul-2011.
  436. Eisenbrand F, Kakimura N, Rothvoß T and Sanità L Set covering with ordered replacement Proceedings of the 15th international conference on Integer programming and combinatoral optimization, (170-182)
  437. ACM
    Jin W and Patel J Efficient and generic evaluation of ranked queries Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (601-612)
  438. ACM
    Pettarin A, Pietracaprina A, Pucci G and Upfal E Tight bounds on information dissemination in sparse mobile networks Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (355-362)
  439. ACM
    Alistarh D, Aspnes J, Censor-Hillel K, Gilbert S and Zadimoghaddam M Optimal-time adaptive strong renaming, with applications to counting Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (239-248)
  440. ACM
    Goodrich M Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (379-388)
  441. Hua N, Xu J, Lin B and Zhao H (2011). BRICK, IEEE/ACM Transactions on Networking, 19:3, (670-682), Online publication date: 1-Jun-2011.
  442. Jiang W, Liu T, Ren T and Xu K Two hardness results on feedback vertex sets Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management, (233-243)
  443. Aupy G and Bournez O (2011). On the number of binary-minded individuals required to compute 12, Theoretical Computer Science, 412:22, (2262-2267), Online publication date: 1-May-2011.
  444. Ni J, Srikant R and Wu X (2011). Coloring spatial point processes with applications to peer discovery in large wireless networks, IEEE/ACM Transactions on Networking, 19:2, (575-588), Online publication date: 1-Apr-2011.
  445. Yu H (2011). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling, Distributed Computing, 23:5-6, (373-394), Online publication date: 1-Apr-2011.
  446. ACM
    Sahami M A course on probability theory for computer scientists Proceedings of the 42nd ACM technical symposium on Computer science education, (263-268)
  447. Schulz A and Uhan N (2011). Near-Optimal Solutions and Large Integrality Gaps for Almost All Instances of Single-Machine Precedence-Constrained Scheduling, Mathematics of Operations Research, 36:1, (14-23), Online publication date: 1-Feb-2011.
  448. Giakkoupis G and Woelfel P On the randomness requirements of rumor spreading Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (449-461)
  449. Goodrich M Spin-the-bottle sort and annealing sort Proceedings of the Meeting on Analytic Algorithmics and Combinatorics, (93-106)
  450. ACM
    Cathabard S, Lehre P and Yao X Non-uniform mutation rates for problems with unknown solution lengths Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (173-180)
  451. ACM
    Sudholt D Using markov-chain mixing time estimates for the analysis of ant colony optimization Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (139-150)
  452. Chakaravarthy V, Choudhury A, Garg V and Sabharwal Y An efficient decentralized algorithm for the distributed trigger counting problem Proceedings of the 12th international conference on Distributed computing and networking, (53-64)
  453. Girju R and Paul M (2011). Modeling reciprocity in social interactions with probabilistic latent space models, Natural Language Engineering, 17:1, (1-36), Online publication date: 1-Jan-2011.
  454. Kirsch A and Mitzenmacher M (2010). The power of one move, IEEE/ACM Transactions on Networking, 18:6, (1752-1765), Online publication date: 1-Dec-2010.
  455. Weber S, Andrews J and Jindal N (2010). An overview of the transmission capacity of wireless networks, IEEE Transactions on Communications, 58:12, (3593-3604), Online publication date: 1-Dec-2010.
  456. Klonowski M, Przykucki M, Strumiński T and Sulkowska M Practical universal random sampling Proceedings of the 5th international conference on Advances in information and computer security, (84-100)
  457. ACM
    Hoefer M and Souza A (2010). Tradeoffs and Average-Case Equilibria in Selfish Routing, ACM Transactions on Computation Theory, 2:1, (1-25), Online publication date: 1-Nov-2010.
  458. ACM
    Becchetti L, Boldi P, Castillo C and Gionis A (2010). Efficient algorithms for large-scale local triangle counting, ACM Transactions on Knowledge Discovery from Data, 4:3, (1-28), Online publication date: 1-Oct-2010.
  459. ACM
    Ouyang M and Ying L On optimal feedback allocation in multichannel wireless downlinks Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (241-250)
  460. ACM
    Vasudevan S, Goeckel D and Towsley D Security-capacity trade-off in large wireless networks using keyless secrecy Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (21-30)
  461. Kutten S and Zinenko D Low communication self-stabilization through randomization Proceedings of the 24th international conference on Distributed computing, (465-479)
  462. Alistarh D, Attiya H, Gilbert S, Giurgiu A and Guerraoui R Fast randomized test-and-set and renaming Proceedings of the 24th international conference on Distributed computing, (94-108)
  463. Doerr B, Jansen T, Sudholt D, Winzen C and Zarges C Optimizing monotone functions can be difficult Proceedings of the 11th international conference on Parallel problem solving from nature: Part I, (42-51)
  464. Cicalese F and Vaccaro U Superselectors Proceedings of the 18th annual European conference on Algorithms: Part I, (207-218)
  465. Coja-Oghlan A, Onsjö M and Watanabe O Propagation connectivity of random hypergraphs Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (490-503)
  466. Ge T and Zdonik S (2010). A*-tree, Proceedings of the VLDB Endowment, 3:1-2, (964-974), Online publication date: 1-Sep-2010.
  467. ACM
    Viswanath B, Post A, Gummadi K and Mislove A An analysis of social network-based Sybil defenses Proceedings of the ACM SIGCOMM 2010 conference, (363-374)
  468. ACM
    Viswanath B, Post A, Gummadi K and Mislove A (2010). An analysis of social network-based Sybil defenses, ACM SIGCOMM Computer Communication Review, 40:4, (363-374), Online publication date: 16-Aug-2010.
  469. Yin C, Gao L and Cui S (2010). Scaling laws for overlaid wireless networks, IEEE/ACM Transactions on Networking, 18:4, (1317-1329), Online publication date: 1-Aug-2010.
  470. Anta A and Mosteiro M Contention resolution in multiple-access channels Proceedings of the 16th annual international conference on Computing and combinatorics, (378-388)
  471. ACM
    Johannsen D, Kurur P and Lengler J Can quantum search accelerate evolutionary algorithms? Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1433-1440)
  472. ACM
    Lässig J and Sudholt D The benefit of migration in parallel evolutionary algorithms Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1105-1112)
  473. ACM
    Dong J, Ackermann K, Bavar B and Nita-Rotaru C (2010). Secure and robust virtual coordinate system in wireless sensor networks, ACM Transactions on Sensor Networks, 6:4, (1-34), Online publication date: 1-Jul-2010.
  474. Rachlin E and Savage J Stochastic nanoscale addressing for logic Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures, (59-64)
  475. ACM
    Ni J, Srikant R and Wu X Coloring spatial point processes with applications to peer discovery in large wireless networks Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (167-178)
  476. ACM
    Chen J and Pandurangan G Optimal gossip-based aggregate computation Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures, (124-133)
  477. ACM
    Ni J, Srikant R and Wu X (2010). Coloring spatial point processes with applications to peer discovery in large wireless networks, ACM SIGMETRICS Performance Evaluation Review, 38:1, (167-178), Online publication date: 12-Jun-2010.
  478. ACM
    Ré C and Suciu D Understanding cardinality estimation using entropy maximization Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (53-64)
  479. ACM
    Varadarajan K Weighted geometric set cover via quasi-uniform sampling Proceedings of the forty-second ACM symposium on Theory of computing, (641-648)
  480. Chatterjee S, Connor M and Kumar P Geometric minimum spanning trees with GEOFILTERKRUSKAL* Proceedings of the 9th international conference on Experimental Algorithms, (486-500)
  481. Lam V, Mitzenmacher M and Varghese G Carousel Proceedings of the 7th USENIX conference on Networked systems design and implementation, (24-24)
  482. ACM
    Finucane H and Mitzenmacher M (2010). An improved analysis of the lossy difference aggregator, ACM SIGCOMM Computer Communication Review, 40:2, (4-11), Online publication date: 9-Apr-2010.
  483. Andrews M, Anta A, Zhang L and Zhao W Routing for energy minimization in the speed scaling model Proceedings of the 29th conference on Information communications, (2435-2443)
  484. Cheng S, Li J, Ren Q and Yu L Bernoulli sampling based (ε, δ)-approximate aggregation in large-scale sensor networks Proceedings of the 29th conference on Information communications, (1181-1189)
  485. ACM
    Aspnes J and Censor K (2010). Approximate shared-memory counting despite a strong adversary, ACM Transactions on Algorithms, 6:2, (1-23), Online publication date: 1-Mar-2010.
  486. Chierichetti F, Finucane H, Liu Z and Mitzenmacher M (2010). Designing floating codes for expected performance, IEEE Transactions on Information Theory, 56:3, (968-978), Online publication date: 1-Mar-2010.
  487. Dobzinski S, Nisan N and Schapira M (2010). Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders, Mathematics of Operations Research, 35:1, (1-13), Online publication date: 1-Feb-2010.
  488. Tetali P, Vera J, Vigoda E and Yang L Phase transition for the mixing time of the Glauber dynamics for coloring regular trees Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1646-1656)
  489. Goodrich M Randomized Shellsort Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1262-1277)
  490. Briest P, Chawla S, Kleinberg R and Weinberg S Pricing randomized allocations Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (585-597)
  491. Derbel B and Talbi E Radio network distributed algorithms in the unknown neighborhood model Proceedings of the 11th international conference on Distributed computing and networking, (155-166)
  492. Bistarelli S and Gosti G (2010). Solving Distributed CSPs Probabilistically, Fundamenta Informaticae, 105:1-2, (57-78), Online publication date: 1-Jan-2010.
  493. Busch H, Katzenbeisser S and Baecher P PUF-Based Authentication Protocols --- Revisited Information Security Applications, (296-308)
  494. AbuHmed T, Nyamaa N and Nyang D Software-based remote code attestation in wireless sensor network Proceedings of the 28th IEEE conference on Global telecommunications, (4680-4687)
  495. Dasgupta A, Ghosh S and Xiao X Fault-Containment in Weakly-Stabilizing Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (209-223)
  496. ACM
    Zou Z, Li J, Gao H and Zhang S Frequent subgraph pattern mining on uncertain graph data Proceedings of the 18th ACM conference on Information and knowledge management, (583-592)
  497. Steiner M, En-Najjary T and Biersack E (2009). Long term study of peer behavior in the KAD DHT, IEEE/ACM Transactions on Networking, 17:5, (1371-1384), Online publication date: 1-Oct-2009.
  498. Miyoshi N, Shigezumi T, Uehara R and Watanabe O (2009). Scale free interval graphs, Theoretical Computer Science, 410:45, (4588-4600), Online publication date: 1-Oct-2009.
  499. ACM
    Das Sarma A, Nanongkai D and Pandurangan G Fast distributed random walks Proceedings of the 28th ACM symposium on Principles of distributed computing, (161-170)
  500. ACM
    Chlebus B, Kowalski D and Strojnowski M Fast scalable deterministic consensus for crash failures Proceedings of the 28th ACM symposium on Principles of distributed computing, (111-120)
  501. Zhang M, Chen S, Jensen C, Ooi B and Zhang Z (2009). Effectively indexing uncertain moving objects for predictive queries, Proceedings of the VLDB Endowment, 2:1, (1198-1209), Online publication date: 1-Aug-2009.
  502. ACM
    Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F An efficient rigorous approach for identifying statistically significant frequent itemsets Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (117-126)
  503. Chang C and Lyuu Y (2009). Spreading messages, Theoretical Computer Science, 410:27-29, (2714-2724), Online publication date: 1-Jun-2009.
  504. Sudo Y, Nakamura J, Yamauchi Y, Ooshita F, Kakugawa H and Masuzawa T Loosely-Stabilizing leader election in population protocol model Proceedings of the 16th international conference on Structural Information and Communication Complexity, (295-308)
  505. Even G and Medina M Revisiting randomized parallel load balancing algorithms Proceedings of the 16th international conference on Structural Information and Communication Complexity, (209-221)
  506. Baumert S, Ghate A, Kiatsupaibul S, Shen Y, Smith R and Zabinsky Z (2009). Discrete Hit-and-Run for Sampling Points from Arbitrary Distributions Over Subsets of Integer Hyperrectangles, Operations Research, 57:3, (727-739), Online publication date: 1-May-2009.
  507. Haifeng Yu Secure and highly-available aggregation queries in large-scale sensor networks via set sampling Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, (1-12)
  508. Davidson I and Ravi S (2009). Using instance-level constraints in agglomerative hierarchical clustering, Data Mining and Knowledge Discovery, 18:2, (257-282), Online publication date: 1-Apr-2009.
  509. ACM
    Woodruff D The average-case complexity of counting distinct elements Proceedings of the 12th International Conference on Database Theory, (284-295)
  510. Tsai S, Tzeng W and Zhou K (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks, IEEE Transactions on Wireless Communications, 8:3, (1218-1222), Online publication date: 1-Mar-2009.
  511. Wang Y and Ishwar P (2009). Distributed field estimation with randomly deployed, noisy, binary sensors, IEEE Transactions on Signal Processing, 57:3, (1177-1189), Online publication date: 1-Mar-2009.
  512. Arantes G, França F and Martinhon C (2009). Randomized generation of acyclic orientations upon anonymous distributed systems, Journal of Parallel and Distributed Computing, 69:3, (239-246), Online publication date: 1-Mar-2009.
  513. Alt H and Scharf L Shape Matching by Random Sampling Proceedings of the 3rd International Workshop on Algorithms and Computation, (381-393)
  514. Aspnes J and Censor K Approximate shared-memory counting despite a strong adversary Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (441-450)
  515. Rachlin E and Savage J (2008). Nanowire addressing with randomized-contact decoders, Theoretical Computer Science, 408:2-3, (241-261), Online publication date: 20-Nov-2008.
  516. ACM
    Hua N, Lin B, Xu J and Zhao H BRICK Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (89-98)
  517. Singh V, Mukherjee L, Dinu P, Xu J and Hoffmann K (2008). Limited view CT reconstruction and segmentation via constrained metric labeling, Computer Vision and Image Understanding, 112:1, (67-80), Online publication date: 1-Oct-2008.
  518. ACM
    Quercia D, Hailes S and Capra L MobiRate Proceedings of the 10th international conference on Ubiquitous computing, (212-221)
  519. ACM
    Anagnostopoulos A, Kumar R and Mahdian M Influence and correlation in social networks Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (7-15)
  520. ACM
    Clementi A, Macci C, Monti A, Pasquale F and Silvestri R Flooding time in edge-Markovian dynamic graphs Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (213-222)
  521. ACM
    Georgiou C, Gilbert S, Guerraoui R and Kowalski D On the complexity of asynchronous gossip Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (135-144)
  522. Ge T and Zdonik S (2008). A skip-list approach for efficiently processing forecasting queries, Proceedings of the VLDB Endowment, 1:1, (984-995), Online publication date: 1-Aug-2008.
  523. Gąsieniec L, Kantor E, Kowalski D, Peleg D and Su C (2008). Time efficient k-shot broadcasting in known topology radio networks, Distributed Computing, 21:2, (117-127), Online publication date: 1-Jul-2008.
  524. Feldmann A, Röglin H and Vöcking B Computing Approximate Nash Equilibria in Network Congestion Games Proceedings of the 15th international colloquium on Structural Information and Communication Complexity, (209-220)
  525. ACM
    Ré C, Letchner J, Balazinksa M and Suciu D Event queries on correlated probabilistic streams Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (715-728)
  526. Collins M, Globerson A, Koo T, Carreras X and Bartlett P (2008). Exponentiated Gradient Algorithms for Conditional Random Fields and Max-Margin Markov Networks, The Journal of Machine Learning Research, 9, (1775-1822), Online publication date: 1-Jun-2008.
  527. ACM
    Schudy W Finding strongly connected components in parallel using O(log2n) reachability queries Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (146-151)
  528. Li A and Tang L Derandomizing graph tests for homomorphism Proceedings of the 5th international conference on Theory and applications of models of computation, (105-115)
  529. Kranakis E, Krizanc D and Morin P Randomized rendez-vous with limited memory Proceedings of the 8th Latin American conference on Theoretical informatics, (605-616)
  530. Gertsbakh I and Shpungin Y (2008). Network reliability importance measures, WSEAS Transactions on Computers, 7:4, (216-227), Online publication date: 1-Apr-2008.
  531. Czajka T and Pandurangan G (2008). Improved random graph isomorphism, Journal of Discrete Algorithms, 6:1, (85-92), Online publication date: 1-Mar-2008.
  532. ACM
    Becchetti L, Castillo C, Donato D, Baeza-YATES R and Leonardi S (2008). Link analysis for Web spam detection, ACM Transactions on the Web, 2:1, (1-42), Online publication date: 1-Feb-2008.
  533. Doerr B, Friedrich T and Sauerwald T Quasirandom rumor spreading Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (773-781)
  534. Huang K, Heath R and Andrews J (2008). Uplink SDMA with limited feedback, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
  535. Farach-Colton M and Mosteiro M Sensor network gossiping or how to break the broadcast lower bound Proceedings of the 18th international conference on Algorithms and computation, (232-243)
  536. Farach-Colton M and Mosteiro M Sensor Network Gossiping or How to Break the Broadcast Lower Bound Algorithms and Computation, (232-243)
  537. Hopcroft J and Sheldon D Manipulation-resistant reputations using hitting time Proceedings of the 5th international conference on Algorithms and models for the web-graph, (68-81)
  538. Gertsbakh I and Shpungin Y Network reliability importance measures Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (88-94)
  539. ACM
    Steiner M, En-Najjary T and Biersack E A global view of kad Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (117-122)
  540. ACM
    Bond M and McKinley K (2007). Probabilistic calling context, ACM SIGPLAN Notices, 42:10, (97-112), Online publication date: 21-Oct-2007.
  541. ACM
    Bond M and McKinley K Probabilistic calling context Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (97-112)
  542. Hoefer M and Souza A Tradeoffs and average-case equilibria in selfish routing Proceedings of the 15th annual European conference on Algorithms, (63-74)
  543. Khan M, Pandurangan G and Anil Kumar V (2007). A simple randomized scheme for constructing low-weight k-connected spanning subgraphs with applications to distributed algorithms, Theoretical Computer Science, 385:1-3, (101-114), Online publication date: 1-Oct-2007.
  544. Ge T and Zdonik S Answering aggregation queries in a secure system model Proceedings of the 33rd international conference on Very large data bases, (519-530)
  545. ACM
    Bhandari V and Vaidya N Capacity of multi-channel wireless networks with random (c, f) assignment Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (229-238)
  546. Neumann F, Sudholt D and Witt C Comparing variants of MMAS ACO algorithms on pseudo-boolean functions Proceedings of the 2007 international conference on Engineering stochastic local search algorithms: designing, implementing and analyzing effective heuristics, (61-75)
  547. Brevier G, Rizzi R and Vialette S Pattern matching in protein-protein interaction graphs Proceedings of the 16th international conference on Fundamentals of Computation Theory, (137-148)
  548. ACM
    Clementi A, Pasquale F, Monti A and Silvestri R Communication in dynamic radio networks Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (205-214)
  549. ACM
    Gfeller B and Vicari E A randomized distributed algorithm for the maximal independent set problem in growth-bounded graphs Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (53-60)
  550. Cysouw M On the probability distribution of typological frequencies Proceedings of the 10th and 11th Biennial conference on The mathematics of language, (29-35)
  551. ACM
    Jansen T and Theile M Stability in the self-organized evolution of networks Proceedings of the 9th annual conference on Genetic and evolutionary computation, (931-938)
  552. Peters J Toward Approximate Adaptive Learning Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms, (57-68)
  553. ACM
    Lin Y, Liang B and Li B Performance modeling of network coding in epidemic routing Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, (67-74)
  554. ACM
    Dumitrescu A, Suzuki I and Zylinski P Offline variants of the "lion and man" problem Proceedings of the twenty-third annual symposium on Computational geometry, (102-111)
  555. Lin T and Lee D (2007). Randomized algorithm for the sum selection problem, Theoretical Computer Science, 377:1-3, (151-156), Online publication date: 25-May-2007.
  556. Guang Tan and Jarvis S Stochastic Analysis and Improvement of the Reliability of DHT-Based Multicast Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2198-2206)
  557. Yunfeng Lin , Ben Liang and Baochun Li Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1658-1666)
  558. ACM
    Nath S and Gibbons P Communicating via fireflies Proceedings of the 6th international conference on Information processing in sensor networks, (440-449)
  559. Beimel A, Hallak R and Nissim K Private approximation of clustering and vertex cover Proceedings of the 4th conference on Theory of cryptography, (383-403)
  560. ACM
    Bonomi F, Mitzenmacher M, Panigrah R, Singh S and Varghese G Beyond bloom filters Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (315-326)
  561. Levieil É and Fouque P An improved LPN algorithm Proceedings of the 5th international conference on Security and Cryptography for Networks, (348-359)
  562. ACM
    Bonomi F, Mitzenmacher M, Panigrah R, Singh S and Varghese G (2006). Beyond bloom filters, ACM SIGCOMM Computer Communication Review, 36:4, (315-326), Online publication date: 11-Aug-2006.
  563. ACM
    Chockler H, Farchi E, Glazberg Z, Godlin B, Nir-Buchbinder Y and Rabinovitz I Formal verification of concurrent software Proceedings of the 2006 workshop on Parallel and distributed systems: testing and debugging, (11-22)
  564. Gudmundsson J and Smid M On spanners of geometric graphs Proceedings of the 10th Scandinavian conference on Algorithm Theory, (388-399)
  565. ACM
    Rusmevichientong P and Williamson D An adaptive algorithm for selecting profitable keywords for search-based advertising services Proceedings of the 7th ACM conference on Electronic commerce, (260-269)
  566. Zhao Y, Zhang C and Zhang S Efficient Frequent Itemsets Mining by Sampling Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006, (112-117)
  567. Kirsch A and Mitzenmacher M Distance-sensitive bloom filters Proceedings of the Meeting on Algorithm Engineering & Expermiments, (41-50)
  568. ACM
    Anwar A, Halabi T and Zulkernine M A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment, ACM Journal on Autonomous Transportation Systems, 0:0
  569. Cohen R and Cassuto Y Placement and read algorithms for high throughput in coded network switches 2016 IEEE International Symposium on Information Theory (ISIT), (250-254)
  570. Yan W, Tehranipoor F and Chandy J A novel way to authenticate untrusted Integrated Circuits 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (132-138)
  571. Mourad S and Tewfik A Real-time data selection and ordering for cognitive bias mitigation 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4393-4397)
  572. Zinkus M, Khosmood F and DeBruhl B PIDIoT: Probabilistic Intrusion Detection for the Internet-of-Things 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Contributors
  • Harvard University
  • Brown University

Recommendations

S. V. Nagaraj

Randomization and probabilistic techniques are important in many disciplines, especially computer science. Often, randomized algorithms are the simplest, the fastest, or both. They are applied in a number of domains, such as combinatorial optimization, machine learning, and communication networks. This textbook is intended for courses on probability and computing, and is targeted to advanced undergraduate or beginning graduate students in applied mathematics and computer science. The book is based on courses taught by the authors at their universities. It provides first-class introductory material for understanding probabilistic techniques and paradigms in the design and analysis of probabilistic algorithms. The authors place emphasis on techniques and paradigms, and not on any particular application. A rudimentary background in discrete mathematics is a prerequisite for utilizing this book. The book includes numerous examples, applications, and exercises. The exercises are very stimulating; however, they have not been rated in terms of their difficulty. Some of the exercises involve programming. Very few exercises come with hints, and the authors have not provided a solutions manual for instructors. The authors have included some exercises from the book by Motwani and Raghavan [1], the first definitive book on the subject of randomized algorithms. This book could be used as supplement to that book, or vice versa. The book is made up of 14 chapters. The authors believe that the first seven chapters constitute the essence of the subject. Chapter 1 introduces the basics of probability. Three applications-verifying polynomial identities, verifying matrix multiplication, and a randomized min-cut algorithm-are highlighted. Chapter 2 describes discrete random variables and expectation. The linearity of expectation, conditional expectation, Jensen's inequality, and Bernoulli and binomial random variables are discussed. Geometric distribution is illustrated by means of the coupon collector's problem. The expected runtime of Quicksort is shown as an application. Chapter 3 focuses on moments and deviations, Markov's and Chebyshev's inequalities, and a randomized algorithm for computing the median as an illustrative example. Chapter 4 discusses Chernoff bounds. The application to set balancing and packet routing in sparse networks is mentioned. Chapter 5 is on balls, bins, and random graphs. The birthday paradox, Bucketsort, Poisson distribution, and hashing are discussed. Random graphs and their use in Hamiltonian cycles is exemplified. Chapter 6 introduces the probabilistic method. Derandomization using conditional expectations, the second moment method, the conditional expectation inequality, and the Lovasz local lemma is outlined. Applications to satisfiability and edge-disjoint paths are given. Chapter 7 is on Markov chains and random walks. Randomized algorithms for satisfiability are presented. Random walks on undirected graphs and their application to s-t connectivity are mentioned. Chapter 8 is about continuous distributions and the Poisson process. Uniform distributions, exponential distributions, and Markovian queues are discussed. Chapter 9 studies entropy as a measure of randomness. Compression, Shannon's theorem, and coding theory are introduced. Chapter 10 is about the Monte Carlo method (a collection of tools for estimating values through sampling and simulation). An application to count the number of satisfying assignments of a Boolean formula in disjunctive normal form is demonstrated. Chapter 11 is on the coupling of Markov chains. Approximately sampling proper vertex colorings of a graph is instanced as an application. Chapter 12 is on martingales (sequences of random variables satisfying certain conditions that arise in numerous applications such as random walks and gambling problems). Chapter 13 is on pairwise independence and universal hash functions. Computing pairwise independent values modulo a prime and perfect hashing are typical applications. Chapter 14, the final chapter, discusses the authors' favorite topic: balanced allocations. This is a variant of the balls-and-bins paradigm. Applications to hashing and dynamic resource allocation are highlighted. The authors avoid references to original papers; instead, they refer the reader to some standard books on subjects relevant to their book. This is disadvantageous for those who wish to get information quickly. Here, the authors could have adopted the style of Motwani and Raghavan, wherein notes are given at the end of chapters supplementing an extensive bibliography. The authors could have better explained paradigms for randomized algorithms, such as foiling an adversary, random sampling, abundance of witnesses, fingerprinting, hashing, random reordering, load balancing, rapidly mixing Markov chains, isolation and symmetry breaking, probabilistic methods, and existence proofs. They also should have included numerous applications to data structures; graph algorithms; geometric algorithms; linear programming; algebra and number theory; and parallel, distributed, and online algorithms. The book does not provide the basics of complexity theory to the extent required. Nevertheless, this book will be treasured by those interested in understanding randomization and probabilistic techniques. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.