No abstract available.
Cited By
- Klinkenberg L, Blumenthal C, Chen M, Haase D and Katoen J (2024). Exact Bayesian Inference for Loopy Probabilistic Programs using Generating Functions, Proceedings of the ACM on Programming Languages, 8:OOPSLA1, (923-953), Online publication date: 29-Apr-2024.
- Huang Q, Ye K and Gao X (2024). Skew-polynomial-sparse matrix multiplication, Journal of Symbolic Computation, 121:C, Online publication date: 1-Mar-2024.
- Preti G, De Francisci Morales G and Riondato M (2024). Alice and the Caterpillar: A more descriptive null model for assessing data mining results, Knowledge and Information Systems, 66:3, (1917-1954), Online publication date: 1-Mar-2024.
- Nie G, Xu D, Wang X and Zhang Z (2024). Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula, Frontiers of Computer Science: Selected Publications from Chinese Universities, 18:1, Online publication date: 1-Feb-2024.
- Lo A, Patel V and Yıldız M (2024). Hamilton cycles in dense regular digraphs and oriented graphs, Journal of Combinatorial Theory Series B, 164:C, (119-160), Online publication date: 1-Jan-2024.
- Bhattacharyya S and Sarkar P Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm Progress in Cryptology – INDOCRYPT 2023, (307-328)
- Auvolat A, Bromberg Y, Frey D, Mvondo D and Taïani F Basalt Proceedings of the 24th International Middleware Conference, (111-123)
- Mandal S, Molla A and Moses W (2023). Efficient live exploration of a dynamic ring with mobile robots, Theoretical Computer Science, 980:C, Online publication date: 20-Nov-2023.
- Gaži P, Kiayias A and Russell A Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (845-858)
- Kearney J, Neumann F and Sutton A Fixed-Parameter Tractability of the (1 + 1) Evolutionary Algorithm on Random Planted Vertex Covers Proceedings of the 17th ACM/SIGEVO Conference on Foundations of Genetic Algorithms, (96-104)
- Fajardo M, Lehre P and Lin S Runtime Analysis of a Co-Evolutionary Algorithm Proceedings of the 17th ACM/SIGEVO Conference on Foundations of Genetic Algorithms, (73-83)
- Liu R, Liu Q and Ge T Fairness-Aware Continuous Predictions of Multiple Analytics Targets in Dynamic Networks Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1512-1523)
- Wang J, Yang J, Zhang C and Lin X (2023). Efficient Maximum Edge-Weighted Biclique Search on Large Bipartite Graphs, IEEE Transactions on Knowledge and Data Engineering, 35:8, (7921-7934), Online publication date: 1-Aug-2023.
- Vatsalan D, Bhaskar R and Kaafar M (2023). Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures, IEEE Transactions on Knowledge and Data Engineering, 35:8, (8185-8198), Online publication date: 1-Aug-2023.
- Ding J and Du H (2023). Detection Threshold for Correlated Erdős-Rényi Graphs via Densest Subgraph, IEEE Transactions on Information Theory, 69:8, (5289-5298), Online publication date: 1-Aug-2023.
- Cormode G Applications of Sketching and Pathways to Impact Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (5-10)
- Wang P, Yang C, Xie D, Zhao J, Li H, Tao J and Guan X (2023). An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation, Proceedings of the ACM on Management of Data, 1:1, (1-24), Online publication date: 26-May-2023.
- Pandey P, Bender M, Conway A, Farach-Colton M, Kuszmaul W, Tagliavini G and Johnson R (2023). IcebergHT: High Performance Hash Tables Through Stability and Low Associativity, Proceedings of the ACM on Management of Data, 1:1, (1-26), Online publication date: 26-May-2023.
- Bera D, Pratap R and Verma B (2023). Dimensionality Reduction for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 35:4, (3658-3671), Online publication date: 1-Apr-2023.
- Allendorf D, Meyer U, Penschuck M and Tran H (2023). Parallel global edge switching for the uniform sampling of simple graphs with prescribed degrees, Journal of Parallel and Distributed Computing, 174:C, (118-129), Online publication date: 1-Apr-2023.
- Gao W, Xu F and Zhou Z (2022). Towards convergence rate analysis of random forests for classification, Artificial Intelligence, 313:C, Online publication date: 1-Dec-2022.
- Liu Q and Ge T RL2: A Call for Simultaneous Representation Learning and Rule Learning for Graph Streams Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1109-1119)
- Gaffney K, Prammer M, Brasfield L, Hipp D, Kennedy D and Patel J (2022). SQLite, Proceedings of the VLDB Endowment, 15:12, (3535-3547), Online publication date: 1-Aug-2022.
- Fei Y and Chen Y (2022). Hidden Integrality and Semirandom Robustness of SDP Relaxation for Sub-Gaussian Mixture Model, Mathematics of Operations Research, 47:3, (2464-2493), Online publication date: 1-Aug-2022.
- Ben Basat R, Einziger G, Keslassy I, Orda A, Vargaftik S and Waisbard E (2022). Memento: Making Sliding Windows Efficient for Heavy Hitters, IEEE/ACM Transactions on Networking, 30:4, (1440-1453), Online publication date: 1-Aug-2022.
- Augustine J, Chatterjee S and Pandurangan G A Fully-Distributed Scalable Peer-to-Peer Protocol for Byzantine-Resilient Distributed Hash Tables Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures, (87-98)
- Fleming N, Pankratov D, Pitassi T and Robere R (2022). Random -CNFs are Hard for Cutting Planes, Journal of the ACM, 69:3, (1-32), Online publication date: 30-Jun-2022.
- Dolev S, Gudes E, Segev E, Ullman J and Weintraub G BFLUT Bloom Filter for Private Look Up Tables Cyber Security, Cryptology, and Machine Learning, (499-505)
- Zeng Y, Tong Y and Chen L Faster and Better Solution to Embed Lp Metrics by Tree Metrics Proceedings of the 2022 International Conference on Management of Data, (2135-2148)
- Giakkoupis G Expanders via local edge flips in quasilinear time Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, (64-76)
- Bouillard A, Nikolaus P and Schmitt J (2022). Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6:2, (1-27), Online publication date: 26-May-2022.
- Haslegrave J, Sauerwald T and Sylvester J (2022). Time Dependent Biased Random Walks, ACM Transactions on Algorithms, 18:2, (1-30), Online publication date: 30-Apr-2022.
- Luo C, Lakshman V, Shrivastava A, Cao T, Nag S, Goutam R, Lu H, Song Y and Yin B ROSE: Robust Caches for Amazon Product Search Companion Proceedings of the Web Conference 2022, (89-93)
- Zhou Q, Calvert A and Young M (2022). Singletons for simpletons revisiting windowed backoff with Chernoff bounds, Theoretical Computer Science, 909:C, (39-53), Online publication date: 28-Mar-2022.
- Fan W, Fu W, Jin R, Lu P and Tian C (2022). Discovering association rules from big graphs, Proceedings of the VLDB Endowment, 15:7, (1479-1492), Online publication date: 1-Mar-2022.
- Zhang G and Chen B (2021). Self-orthogonal quasi-abelian codes are asymptotically good, Finite Fields and Their Applications, 78:C, Online publication date: 1-Feb-2022.
- Das S and Kapelko R (2021). On the Range Assignment in Wireless Sensor Networks for Minimizing the Coverage-Connectivity Cost, ACM Transactions on Sensor Networks, 17:4, (1-48), Online publication date: 30-Nov-2021.
- Li K, Wang Y and Tang Y DETER: Denial of Ethereum Txpool sERvices Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (1645-1667)
- Kolluri A, Baluta T and Saxena P Private Hierarchical Clustering in Federated Networks Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2342-2360)
- Doosti M, Kumar N, Delavar M and Kashefi E (2021). Client-server Identification Protocols with Quantum PUF, ACM Transactions on Quantum Computing, 2:3, (1-40), Online publication date: 30-Sep-2021.
- Garay J and Shen Y On Bitcoin cash's target recalculation functions Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, (192-204)
- Chou L, Liu Z, Wang Z and Shrivastava A Efficient and Less Centralized Federated Learning Machine Learning and Knowledge Discovery in Databases. Research Track, (772-787)
- Ertl O (2021). SetSketch, Proceedings of the VLDB Endowment, 14:11, (2244-2257), Online publication date: 1-Jul-2021.
- Werner M (2021). GloBiMapsAI: An AI-Enhanced Probabilistic Data Structure for Global Raster Datasets, ACM Transactions on Spatial Algorithms and Systems, 7:4, (1-24), Online publication date: 21-Jun-2021.
- Beutner R and Ong L On probabilistic termination of functional programs with continuous distributions Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1312-1326)
- Lemiesz J (2021). On the algebra of data sketches, Proceedings of the VLDB Endowment, 14:9, (1655-1667), Online publication date: 1-May-2021.
- Dumitrescu A (2021). Finding a mediocre player, Discrete Applied Mathematics, 293:C, (15-24), Online publication date: 15-Apr-2021.
- Xu Z, Zhao L, Liang W, Rana O, Zhou P, Xia Q, Xu W and Wu G (2020). Energy-Aware Inference Offloading for DNN-Driven Applications in Mobile Edge Clouds, IEEE Transactions on Parallel and Distributed Systems, 32:4, (799-814), Online publication date: 1-Apr-2021.
- Desmouceaux Y, Enguehard M and Clausen T (2021). Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers, IEEE Transactions on Network and Service Management, 18:1, (672-686), Online publication date: 1-Mar-2021.
- Hu H and Li J (2021). Bit-Oriented Sampling for Aggregation on Big Data, IEEE Transactions on Knowledge and Data Engineering, 33:2, (359-373), Online publication date: 1-Feb-2021.
- Robinson P Being fast means being chatty Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (2105-2120)
- Neumann A, Alexander B and Neumann F (2021). Evolutionary Image Transition and Painting Using Random Walks, Evolutionary Computation, 28:4, (643-675), Online publication date: 1-Dec-2020.
- Beraldi R, Canali C, Lancellotti R and Proietti Mattia G Randomized Load Balancing under Loosely Correlated State Information in Fog Computing Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (123-127)
- Satija S, Mehra A, Singanamalla S, Grover K, Sivathanu M, Chandran N, Gupta D and Lokam S Blockene Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, (567-582)
- Filliâtre J and Paskevich A Abstraction and Genericity in Why3 Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles, (122-142)
- Vidanage A, Christen P, Ranbaduge T and Schnell R A Graph Matching Attack on Privacy-Preserving Record Linkage Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (1485-1494)
- Woo J, Ok J and Yi Y Iterative learning of graph connectivity from partially-observed cascade samples Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, (141-150)
- Riondato M and Vandin F (2020). MiSoSouP, ACM Transactions on Knowledge Discovery from Data, 14:5, (1-31), Online publication date: 21-Aug-2020.
- Hölzl M, Roland M, Mir O and Mayrhofer R (2019). Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation, International Journal of Information Security, 19:4, (401-417), Online publication date: 1-Aug-2020.
- Chatterjee S, Gmyr R and Pandurangan G Sleeping is Efficient: MIS in O(1)-rounds Node-averaged Awake Complexity Proceedings of the 39th Symposium on Principles of Distributed Computing, (99-108)
- Dornhaus A, Lynch N, Mallmann-Trenn F, Pajak D and Radeva T Self-Stabilizing Task Allocation In Spite of Noise Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures, (201-211)
- Xu Z, Zhou L, Chi-Kin Chau S, Liang W, Xia Q and Zhou P Collaborate or Separate? Distributed Service Caching in Mobile Edge Clouds IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (2066-2075)
- Mansour Y, Slivkins A and Syrgkanis V (2020). Bayesian Incentive-Compatible Bandit Exploration, Operations Research, 68:4, (1132-1161), Online publication date: 1-Jul-2020.
- Zhang T (2020). Phase Retrieval by Alternating Minimization With Random Initialization, IEEE Transactions on Information Theory, 66:7, (4563-4573), Online publication date: 1-Jul-2020.
- Alev V and Lau L Improved analysis of higher order random walks and applications Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, (1198-1211)
- Poularakis K, Llorca J, Tulino A, Taylor I and Tassiulas L (2020). Service Placement and Request Routing in MEC Networks With Storage, Computation, and Communication Constraints, IEEE/ACM Transactions on Networking, 28:3, (1047-1060), Online publication date: 1-Jun-2020.
- Avarikioti Z, Emiris I, Kavouras L and Psarros I (2020). High-Dimensional Approximate r-Nets, Algorithmica, 82:6, (1675-1702), Online publication date: 1-Jun-2020.
- Doerr B, Kötzing T, Lagodzinski J and Lengler J (2020). The impact of lexicographic parsimony pressure for ORDER/MAJORITY on the run time, Theoretical Computer Science, 816:C, (144-168), Online publication date: 6-May-2020.
- Kötzing T, Lagodzinski J, Lengler J and Melnichenko A (2020). Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming, Theoretical Computer Science, 816:C, (96-113), Online publication date: 6-May-2020.
- Green Larsen K, Mitzenmacher M and Tsourakakis C Clustering with a faulty oracle Proceedings of The Web Conference 2020, (2831-2834)
- Lin S, Zhang J and Ying L (2020). Crowdsensing for Spectrum Discovery: A Waze-Inspired Design via Smartphone Sensing, IEEE/ACM Transactions on Networking, 28:2, (750-763), Online publication date: 1-Apr-2020.
- Servan-Schreiber S, Riondato M and Zgraggen E (2019). ProSecCo: progressive sequence mining with convergence guarantees, Knowledge and Information Systems, 62:4, (1313-1340), Online publication date: 1-Apr-2020.
- Strobel M (2020). Non-standard analysis in dynamic geometry, Journal of Symbolic Computation, 97:C, (69-108), Online publication date: 1-Mar-2020.
- Sudo Y, Ooshita F, Kakugawa H, Masuzawa T, Datta A and Larmore L (2020). Loosely-stabilizing leader election with polylogarithmic convergence time, Theoretical Computer Science, 806:C, (617-631), Online publication date: 2-Feb-2020.
- Fomin F, Golovach P, Lokshtanov D, Panolan F and Saurabh S (2019). Approximation Schemes for Low-rank Binary Matrix Approximation Problems, ACM Transactions on Algorithms, 16:1, (1-39), Online publication date: 31-Jan-2020.
- Cormode G and Jowhari H (2019). L Samplers and Their Applications, ACM Computing Surveys, 52:1, (1-31), Online publication date: 31-Jan-2020.
- Goerigk M, Kasperski A and Zieliński P (2020). Two-stage combinatorial optimization problems under risk, Theoretical Computer Science, 804:C, (29-45), Online publication date: 12-Jan-2020.
- Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
- Liu X and Oh S Minimax optimal estimation of approximate differential privacy on neighboring databases Proceedings of the 33rd International Conference on Neural Information Processing Systems, (2417-2428)
- Gabrys R and Milenkovic O (2019). Unique Reconstruction of Coded Strings From Multiset Substring Spectra, IEEE Transactions on Information Theory, 65:12, (7682-7696), Online publication date: 1-Dec-2019.
- Xu W, Li T, Liang W, Yu J, Yang N and Gao S (2019). Identifying structural hole spanners to maximally block information propagation, Information Sciences: an International Journal, 505:C, (100-126), Online publication date: 1-Dec-2019.
- Paul D and Stevanović D (2019). Eigenvector-based identification of bipartite subgraphs, Discrete Applied Mathematics, 269:C, (146-158), Online publication date: 30-Sep-2019.
- Tavory A Determining Principal Component Cardinality Through the Principle of Minimum Description Length Machine Learning, Optimization, and Data Science, (655-666)
- Agrawal S, Avadhanula V, Goyal V and Zeevi A (2019). MNL-Bandit, Operations Research, 67:5, (1453-1485), Online publication date: 1-Sep-2019.
- Lee K, Chandrasekher K, Pedarsani R and Ramchandran K (2019). SAFFRON: A Fast, Efficient, and Robust Framework for Group Testing Based on Sparse-Graph Codes, IEEE Transactions on Signal Processing, 67:17, (4649-4664), Online publication date: 1-Sep-2019.
- Corus D, Oliveto P and Yazdani D (2019). Artificial immune systems can find arbitrarily good approximations for the NP-hard number partitioning problem, Artificial Intelligence, 274:C, (180-196), Online publication date: 1-Sep-2019.
- Kleinberg R, Slivkins A and Upfal E (2019). Bandits and Experts in Metric Spaces, Journal of the ACM, 66:4, (1-77), Online publication date: 26-Aug-2019.
- Ozisik A, Andresen G, Levine B, Tapp D, Bissias G and Katkuri S Graphene Proceedings of the ACM Special Interest Group on Data Communication, (303-317)
- De Marco G, Jurdziński T and Kowalski D Optimal Channel Utilization with Limited Feedback Fundamentals of Computation Theory, (140-152)
- Koslicki D and Zabeti H (2019). Improving MinHash via the containment index with applications to metagenomic analysis, Applied Mathematics and Computation, 354:C, (206-215), Online publication date: 1-Aug-2019.
- Fraigniaud P and Natale E (2019). Noisy rumor spreading and plurality consensus, Distributed Computing, 32:4, (257-276), Online publication date: 1-Aug-2019.
- Ahn J, Qader M, Kang W, Nguyen H, Zhang G and Ben-Romdhane S Jungle Proceedings of the 11th USENIX Conference on Hot Topics in Storage and File Systems, (9-9)
- Jahani-Nezhad T and Maddah-Ali M CodedSketch: Coded Distributed Computation of Approximated Matrix Multiplication 2019 IEEE International Symposium on Information Theory (ISIT), (2489-2493)
- Davidson A and Ganesh A The Robot Crawler Model on Complete k-Partite and Erdős-Rényi Random Graphs Algorithms and Models for the Web Graph, (57-70)
- Fanti G, Jiao J, Makkuva A, Oh S, Rana R and Viswanath P Barracuda Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (351-360)
- Jovanovic P, Luykx A, Mennink B, Sasaki Y and Yasuda K (2019). Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes, Journal of Cryptology, 32:3, (895-940), Online publication date: 1-Jul-2019.
- Dinesh K, Koroth S and Sarma J (2019). Characterization and Lower Bounds for Branching Program Size using Projective Dimension, ACM Transactions on Computation Theory, 11:2, (1-22), Online publication date: 30-Jun-2019.
- Mitzenmacher M and Morgan T Robust Set Reconciliation via Locality Sensitive Hashing Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (164-181)
- Mahmoody A and Upfal E (2019). Optimizing static and adaptive probing schedules for rapid event detection, Theoretical Computer Science, 774:C, (14-30), Online publication date: 25-Jun-2019.
- Avanzini M, Lago U and Ghyselen A Type-based complexity analysis of probabilistic functional programs Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
- Shpilka A Sylvester-Gallai type theorems for quadratic polynomials Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (1203-1214)
- Pelc A and Yadav R Using Time to Break Symmetry The 31st ACM Symposium on Parallelism in Algorithms and Architectures, (85-92)
- Liu J, Xiao B, Liu X, Bu K, Chen L and Nie C (2019). Efficient Polling-Based Information Collection in RFID Systems, IEEE/ACM Transactions on Networking, 27:3, (948-961), Online publication date: 1-Jun-2019.
- Dumitrescu A Finding a Mediocre Player Algorithms and Complexity, (212-223)
- Chekuri C, Quanrud K and Torres M -sparsity Approximation Bounds for Packing Integer Programs Integer Programming and Combinatorial Optimization, (128-140)
- Poularakis K, Llorca J, Tulino A, Taylor I and Tassiulas L Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (10-18)
- Hu X, Yi K and Tao Y (2019). Output-Optimal Massively Parallel Algorithms for Similarity Joins, ACM Transactions on Database Systems, 44:2, (1-36), Online publication date: 8-Apr-2019.
- Doerr B, Fischbeck P, Frahnow C, Friedrich T, Kötzing T and Schirneck M (2019). Island Models Meet Rumor Spreading, Algorithmica, 81:2, (886-915), Online publication date: 1-Feb-2019.
- Censor-Hillel K, Fischer E, Schwartzman G and Vasudev Y (2019). Fast distributed algorithms for testing graph properties, Distributed Computing, 32:1, (41-57), Online publication date: 1-Feb-2019.
- Becchetti L, Clementi A, Natale E, Pasquale F and Posta G (2019). Self-stabilizing repeated balls-into-bins, Distributed Computing, 32:1, (59-68), Online publication date: 1-Feb-2019.
- Bender M, Fineman J, Gilbert S and Young M (2018). Scaling Exponential Backoff, Journal of the ACM, 66:1, (1-33), Online publication date: 12-Jan-2019.
- Aamand A and Thorup M Non-empty bins with simple tabulation hashing Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (2498-2512)
- Axiotis K, Backurs A, Jin C, Tzamos C and Wu H Fast modular subset sum using linear sketching Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (58-69)
- Maunu T, Zhang T and Lerman G (2021). A well-tempered landscape for non-convex robust subspace recovery, The Journal of Machine Learning Research, 20:1, (1348-1406), Online publication date: 1-Jan-2019.
- Lang H, Neumann T, Kemper A and Boncz P (2019). Performance-optimal filtering, Proceedings of the VLDB Endowment, 12:5, (502-515), Online publication date: 1-Jan-2019.
- Alshahrani R and Peyravi H Adaptive Probe Size Estimation for Cluster Management in Datacenters 2018 IEEE Global Communications Conference (GLOBECOM), (1-7)
- Han Y, Jiao J, Lee C, Weissman T, Wu Y and Yu T Entropy rate estimation for Markov chains with large state space Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9803-9814)
- Ebrahimi E and Unruh D (2018). Quantum collision-resistance of non-uniformly distributed functions, Quantum Information & Computation, 18:15-16, (1332-1349), Online publication date: 1-Dec-2018.
- Cogliati B and Seurin Y (2018). Analysis of the single-permutation encrypted Davies---Meyer construction, Designs, Codes and Cryptography, 86:12, (2703-2723), Online publication date: 1-Dec-2018.
- Looz M and Meyerhenke H (2018). Updating Dynamic Random Hyperbolic Graphs in Sublinear Time, ACM Journal of Experimental Algorithmics, 23, (1-30), Online publication date: 15-Nov-2018.
- Samajder S and Sarkar P (2018). Multiple (Truncated) Differential Cryptanalysis, Cryptography and Communications, 10:6, (1137-1163), Online publication date: 1-Nov-2018.
- Avin C and Elsässer R (2018). Breaking the $$\log n$$logn barrier on rumor spreading, Distributed Computing, 31:6, (503-513), Online publication date: 1-Nov-2018.
- Kaminski B, Katoen J, Matheja C and Olmedo F (2018). Weakest Precondition Reasoning for Expected Runtimes of Randomized Algorithms, Journal of the ACM, 65:5, (1-68), Online publication date: 31-Oct-2018.
- Adiga A, Cedeno-Mieles V, Kuhlman C, Marathe M, Ravi S, Rosenkrantz D and Stearns R Inferring Probabilistic Contagion Models Over Networks Using Active Queries Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (377-386)
- Grubbs P, Lacharite M, Minaud B and Paterson K Pump up the Volume Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (315-331)
- Kiffer L, Rajaraman R and shelat a A Better Method to Analyze Blockchain Consistency Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (729-744)
- Blanchard N (2018). Building Trust for Sample Voting, International Journal of Decision Support System Technology, 10:4, (50-64), Online publication date: 1-Oct-2018.
- Pandurangan G, Robinson P and Scquizzato M (2018). Fast Distributed Algorithms for Connectivity and MST in Large Graphs, ACM Transactions on Parallel Computing, 5:1, (1-22), Online publication date: 19-Sep-2018.
- Mitzenmacher M, Rajaraman R and Roche S (2018). Better Bounds for Coalescing-Branching Random Walks, ACM Transactions on Parallel Computing, 5:1, (1-23), Online publication date: 19-Sep-2018.
- Yang B, Liu M and Li Z (2018). Rendezvous on the Fly: Efficient Neighbor Discovery for Autonomous UAVs, IEEE Journal on Selected Areas in Communications, 36:9, (2032-2044), Online publication date: 1-Sep-2018.
- Ghazi B, Komargodski I, Kothari P and Sudan M (2018). Communication with Contextual Uncertainty, Computational Complexity, 27:3, (463-509), Online publication date: 1-Sep-2018.
- Chierichetti F, Giakkoupis G, Lattanzi S and Panconesi A (2018). Rumor Spreading and Conductance, Journal of the ACM, 65:4, (1-21), Online publication date: 16-Aug-2018.
- Kim S and Han S (2018). Distinguishing social contacts and pass-by contacts in DTN routing, Telecommunications Systems, 68:4, (669-685), Online publication date: 1-Aug-2018.
- Buchbinder N and Feldman M (2018). Deterministic Algorithms for Submodular Maximization Problems, ACM Transactions on Algorithms, 14:3, (1-20), Online publication date: 31-Jul-2018.
- Basat R, Einziger G, Feibish S, Moraney J and Raz D Network-wide routing-oblivious heavy hitters Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, (66-73)
- Ertl O BagMinHash - Minwise Hashing Algorithm for Weighted Sets Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1368-1377)
- Riondato M and Vandin F MiSoSouP Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2130-2139)
- Robinson P, Scheideler C and Setzer A Breaking the $ilde$Omega($sqrt{n})$ Barrier Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (173-182)
- Li H, Liu R, Nitaj A and Pan Y Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC’08 Information Security and Privacy, (455-466)
- Sudholt D On the robustness of evolutionary algorithms to noise Proceedings of the Genetic and Evolutionary Computation Conference, (1523-1530)
- Lengler J, Sudholt D and Witt C Medium step sizes are harmful for the compact genetic algorithm Proceedings of the Genetic and Evolutionary Computation Conference, (1499-1506)
- Grochow J and Wolpert D (2018). Beyond Number of Bit Erasures, ACM SIGACT News, 49:2, (33-56), Online publication date: 13-Jun-2018.
- Christen P, Vidanage A, Ranbaduge T and Schnell R Pattern-Mining Based Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage Advances in Knowledge Discovery and Data Mining, (530-542)
- Zhang X, Bashizade R, LaBoda C, Dwyer C and Lebeck A Architecting a stochastic computing unit with molecular optical devices Proceedings of the 45th Annual International Symposium on Computer Architecture, (301-314)
- Censor-Hillel K, Kavitha T, Paz A and Yehudayoff A (2018). Distributed construction of purely additive spanners, Distributed Computing, 31:3, (223-240), Online publication date: 1-Jun-2018.
- McCauley S, Mikkelsen J and Pagh R Set Similarity Search for Skewed Data Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (63-74)
- Bun M, Nelson J and Stemmer U Heavy Hitters and the Structure of Local Privacy Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (435-447)
- Yang M, Andelfinger P, Cai W and Knoll A Evaluation of Conflict Resolution Methods for Agent-Based Simulations on the GPU Proceedings of the 2018 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (129-132)
- Pyoung C and Baek S (2018). Joint load balancing and energy saving algorithm for virtual network embedding in infrastructure providers, Computer Communications, 121:C, (1-18), Online publication date: 1-May-2018.
- Assaf E, Basat R, Einziger G and Friedman R Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for Free IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (2204-2212)
- Mourad S and Tewfik A Machine Assisted Human Decision Making 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6981-6985)
- Hölzl M, Roland M, Mir O and Mayrhofer R Bridging the gap in privacy-preserving revocation Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1601-1609)
- Cade C, Montanaro A and Belovs A (2018). Time and space efficient quantum algorithms for detecting cycles and testing bipartiteness, Quantum Information & Computation, 18:1-2, (18-50), Online publication date: 1-Feb-2018.
- Lokshtanov D, Ramanujan M and Saurabh S (2018). Linear Time Parameterized Algorithms for Subset Feedback Vertex Set, ACM Transactions on Algorithms, 14:1, (1-37), Online publication date: 30-Jan-2018.
- Berenbrink P, Giakkoupis G and Kling P Tight bounds for coalescing-branching random walks on regular graphs Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1715-1733)
- Chatterjee S, Pandurangan G and Robinson P The Complexity of Leader Election Proceedings of the 19th International Conference on Distributed Computing and Networking, (1-10)
- Bosilca G, Bouteiller A, Guermouche A, Herault T, Robert Y, Sens P and Dongarra J (2018). A failure detector for HPC platforms, International Journal of High Performance Computing Applications, 32:1, (139-158), Online publication date: 1-Jan-2018.
- Melo W, Machado R, Carmo L and Ray I (2018). Using Physical Context-Based Authentication against External Attacks, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
- Liu Y, Wang G and Ye Z (2018). Dynamic mode extrapolation to improve the efficiency of dual time stepping method, Journal of Computational Physics, 352:C, (190-212), Online publication date: 1-Jan-2018.
- (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases, Information Sciences: an International Journal, 422:C, (497-515), Online publication date: 1-Jan-2018.
- Stanley-Marbell P and Rinard M (2017). Error-Efficient Computing Systems, Foundations and Trends in Electronic Design Automation, 11:4, (362-461), Online publication date: 18-Dec-2017.
- Al-Awami L and Hassanein H (2017). Robust decentralized data storage and retrieval for wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 128:C, (41-50), Online publication date: 9-Dec-2017.
- Wang Q and Chen W Improving regret bounds for combinatorial semi-bandits with probabilistically triggered arms and its applications Proceedings of the 31st International Conference on Neural Information Processing Systems, (1161-1171)
- Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2017). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
- Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2018). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
- Stefani L, Epasto A, Riondato M and Upfal E (2017). TRIÈST, ACM Transactions on Knowledge Discovery from Data, 11:4, (1-50), Online publication date: 30-Nov-2017.
- Beimel A, Farràs O, Mintz Y and Peter N Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Theory of Cryptography, (394-423)
- Anderson D, Bevan P, Lang K, Liberty E, Rhodes L and Thaler J A high-performance algorithm for identifying frequent items in data streams Proceedings of the 2017 Internet Measurement Conference, (268-282)
- Wang Z, Yang Y, Pei J, Chu L and Chen E (2017). Activity Maximization by Effective Information Diffusion in Social Networks, IEEE Transactions on Knowledge and Data Engineering, 29:11, (2374-2387), Online publication date: 1-Nov-2017.
- Choi J (2017). Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming, IEEE Transactions on Information Forensics and Security, 12:11, (2699-2711), Online publication date: 1-Nov-2017.
- Boyar J, Favrholdt L, Kudahl C and Mikkelsen J (2017). The Advice Complexity of a Class of Hard Online Problems, Theory of Computing Systems, 61:4, (1128-1177), Online publication date: 1-Nov-2017.
- Wang P, Qi Y, Sun Y, Zhang X, Tao J and Guan X (2017). Approximately counting triangles in large graph streams including edge duplicates with a fixed memory usage, Proceedings of the VLDB Endowment, 11:2, (162-175), Online publication date: 1-Oct-2017.
- Xu H, Lau W, Yang Z, de Veciana G and Hou H (2017). Mitigating Service Variability in MapReduce Clusters via Task Cloning: A Competitive Analysis, IEEE Transactions on Parallel and Distributed Systems, 28:10, (2866-2880), Online publication date: 1-Oct-2017.
- Cohen R, Cassuto Y, Cohen R and Cassuto Y (2017). Coding for Improved Throughput Performance in Network Switches, IEEE/ACM Transactions on Networking, 25:5, (2802-2814), Online publication date: 1-Oct-2017.
- Jiao J, Venkat K, Han Y and Weissman T (2017). Maximum Likelihood Estimation of Functionals of Discrete Distributions, IEEE Transactions on Information Theory, 63:10, (6774-6798), Online publication date: 1-Oct-2017.
- Sedlacek M and Bestak R (2017). Analysis of Neighbourhood Relations for Femtocell Networks, Wireless Personal Communications: An International Journal, 96:4, (5239-5252), Online publication date: 1-Oct-2017.
- Saibaba A, Alexanderian A and Ipsen I (2017). Randomized matrix-free trace and log-determinant estimators, Numerische Mathematik, 137:2, (353-395), Online publication date: 1-Oct-2017.
- Nguyen H, Ghosh P, Mayo M and Dinh T (2017). Social Influence Spectrum at Scale, ACM Transactions on Information Systems, 36:2, (1-26), Online publication date: 15-Sep-2017.
- Yan W, Tehranipoor F and Chandy J (2017). PUF-Based Fuzzy Authentication Without Error Correcting Codes, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:9, (1445-1457), Online publication date: 1-Sep-2017.
- Moradi Shahrivar E, Pirani M and Sundaram S (2017). Spectral and structural properties of random interdependent networks, Automatica (Journal of IFAC), 83:C, (234-242), Online publication date: 1-Sep-2017.
- Serrà J and Karatzoglou A Getting Deep Recommenders Fit Proceedings of the Eleventh ACM Conference on Recommender Systems, (279-287)
- Sadeqi M and Hamilton H Lossy compression of pattern databases using acyclic random hypergraphs Proceedings of the 26th International Joint Conference on Artificial Intelligence, (4376-4383)
- Talvitie T, Niinimäki T and Koivisto M The mixing of Markov chains on linear extensions in practice Proceedings of the 26th International Joint Conference on Artificial Intelligence, (524-530)
- Mamakos M and Chalkiadakis G Probability bounds for overlapping coalition formation Proceedings of the 26th International Joint Conference on Artificial Intelligence, (331-337)
- Caragiannis I and Micha E Learning a ground truth ranking using noisy approval votes Proceedings of the 26th International Joint Conference on Artificial Intelligence, (149-155)
- Wu Z, Kolonko M and Möhring R (2017). Stochastic Runtime Analysis of the Cross-Entropy Algorithm, IEEE Transactions on Evolutionary Computation, 21:4, (616-628), Online publication date: 1-Aug-2017.
- Berenbrink P, Clementi A, Elsässer R, Kling P, Mallmann-Trenn F and Natale E Ignore or Comply? Proceedings of the ACM Symposium on Principles of Distributed Computing, (335-344)
- Illiano V, Steiner R and Lupu E Unity is strength! Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (134-144)
- Even G and Medina M (2017). Online Packet-Routing in Grids with Bounded Buffers, Algorithmica, 78:3, (819-868), Online publication date: 1-Jul-2017.
- Benoit A, Cavelan A, Le Fèvre V and Robert Y Optimal Checkpointing Period with Replicated Execution on Heterogeneous Platforms Proceedings of the 2017 Workshop on Fault-Tolerance for HPC at Extreme Scale, (9-16)
- Haase C, Kiefer S and Lohrey M Computing quantiles in Markov chains with multi-dimensional costs Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
- Nguyen H, Nguyen T, Vu T and Dinh T (2017). Outward Influence and Cascade Size Estimation in Billion-scale Networks, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:1, (1-30), Online publication date: 13-Jun-2017.
- Dang D, Jansen T and Lehre P (2017). Populations Can Be Essential in Tracking Dynamic Optima, Algorithmica, 78:2, (660-680), Online publication date: 1-Jun-2017.
- Dani V, King V, Movahedi M, Saia J and Zamani M (2017). Secure multi-party computation in large networks, Distributed Computing, 30:3, (193-229), Online publication date: 1-Jun-2017.
- Li J, Cheng S, Cai Z, Yu J, Wang C and Li Y (2017). Approximate Holistic Aggregation in Wireless Sensor Networks, ACM Transactions on Sensor Networks, 13:2, (1-24), Online publication date: 31-May-2017.
- Ye J Discovery of Frequent Itemsets through Randomized Sampling with Bernstein's Inequality Proceedings of the 2017 International Conference on Data Mining, Communications and Information Technology, (1-5)
- Koutris P and Suciu D (2017). A Guide to Formal Analysis of Join Processing in Massively Parallel Systems, ACM SIGMOD Record, 45:4, (18-27), Online publication date: 11-May-2017.
- Eppstein D, Goodrich M, Mitzenmacher M and Torres M 2-3 Cuckoo Filters for Faster Triangle Listing and Set Intersection Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (247-260)
- Yu J and Chen L (2017). Stability Analysis of Frame Slotted Aloha Protocol, IEEE Transactions on Mobile Computing, 16:5, (1462-1474), Online publication date: 1-May-2017.
- Klonowski M and Syga P (2017). Enhancing privacy for ad hoc systems with predeployment key distribution, Ad Hoc Networks, 59:C, (35-47), Online publication date: 1-May-2017.
- Zhu J, Potti N, Saurabh S and Patel J (2017). Looking ahead makes query plans robust, Proceedings of the VLDB Endowment, 10:8, (889-900), Online publication date: 1-Apr-2017.
- Yu L, Li H and Li W (2017). Source-Channel Secrecy for Shannon Cipher System, IEEE Transactions on Information Theory, 63:4, (2596-2622), Online publication date: 1-Apr-2017.
- Gilbert S, Newport C and Zheng C (2017). Who are you? Secure identities in single hop ad hoc networks, Distributed Computing, 30:2, (103-125), Online publication date: 1-Apr-2017.
- Krishnasamy S, Sen R, Shakkottai S and Oh S (2016). Detecting Sponsored Recommendations, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 2:1, (1-29), Online publication date: 31-Mar-2017.
- Tal I (2017). On the Construction of Polar Codes for Channels With Moderate Input Alphabet Sizes, IEEE Transactions on Information Theory, 63:3, (1501-1509), Online publication date: 1-Mar-2017.
- Jegelka S and Bilmes J (2017). Graph cuts with interacting edge weights, Mathematical Programming: Series A and B, 162:1-2, (241-282), Online publication date: 1-Mar-2017.
- Galanis A, Göbel A, Goldberg L, Lapinskas J and Richerby D (2017). Amplifiers for the Moran Process, Journal of the ACM, 64:1, (1-90), Online publication date: 28-Feb-2017.
- Zhang J, Khoram S and Li J Boosting the Performance of FPGA-based Graph Processor using Hybrid Memory Cube Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (207-216)
- Naumovitz T, Saks M and Seshadhri C Accurate and nearly optimal sublinear approximations to ulam distance Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (2012-2031)
- Goswami M, Pagh R, Silvestri F and Sivertsen J Distance sensitive bloom filters without false negatives Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (257-269)
- Bruhn H and Schaudt O (2017). The union-closed sets conjecture almost holds for almost all random bipartite graphs, European Journal of Combinatorics, 59:C, (129-149), Online publication date: 1-Jan-2017.
- Emek Y and Rosén A (2016). Semi-Streaming Set Cover, ACM Transactions on Algorithms, 13:1, (1-22), Online publication date: 21-Dec-2016.
- Steiner R and Lupu E (2016). Attestation in Wireless Sensor Networks, ACM Computing Surveys, 49:3, (1-31), Online publication date: 13-Dec-2016.
- Thanh T, The L and Doan C A robus and effective MODE algorithm for workflow scheduling in cloud enveronment Proceedings of the 7th Symposium on Information and Communication Technology, (259-264)
- Carlsson J, Behroozi M, Devulapalli R and Meng X (2016). Household-Level Economies of Scale in Transportation, Operations Research, 64:6, (1372-1387), Online publication date: 1-Dec-2016.
- Jeź A and Lohrey M (2016). Approximation of smallest linear tree grammar, Information and Computation, 251:C, (215-251), Online publication date: 1-Dec-2016.
- Ayav T and Szer H (2016). Identifying critical architectural components with spectral analysis of fault trees, Applied Soft Computing, 49:C, (1270-1282), Online publication date: 1-Dec-2016.
- Alistarh D, Censor-Hillel K and Shavit N (2016). Are Lock-Free Concurrent Algorithms Practically Wait-Free?, Journal of the ACM, 63:4, (1-20), Online publication date: 8-Nov-2016.
- Fomin F, Lokshtanov D, Panolan F and Saurabh S (2016). Efficient Computation of Representative Families with Applications in Parameterized and Exact Algorithms, Journal of the ACM, 63:4, (1-60), Online publication date: 8-Nov-2016.
- Angel S and Setty S Unobservable communication over fully untrusted infrastructure Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (551-569)
- Chen X, Li Y, Wang P and Lui J (2016). A general framework for estimating graphlet statistics via random walk, Proceedings of the VLDB Endowment, 10:3, (253-264), Online publication date: 1-Nov-2016.
- Cheng Y, Yuan Y, Chen L, Wang G, Giraud-Carrier C and Sun Y (2016). DistR, IEEE Transactions on Parallel and Distributed Systems, 27:11, (3172-3185), Online publication date: 1-Nov-2016.
- Kachemir R, Kellett B and Behara K Gloria Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-10)
- Wang S, Zhang X, Li Y, Bashizade R, Yang S, Dwyer C and Lebeck A (2016). Accelerating markov random field inference using molecular optical gibbs sampling units, ACM SIGARCH Computer Architecture News, 44:3, (558-569), Online publication date: 12-Oct-2016.
- Jung M, Mathew D, Weis C, Wehn N, Heinrich I, Natale M and Krumke S ConGen Proceedings of the Second International Symposium on Memory Systems, (257-267)
- Quezada-Naquid M, Marcelín-Jiménez R and González-Compeán J (2016). Babel, International Journal of Web Services Research, 13:4, (36-53), Online publication date: 1-Oct-2016.
- Gong W, Liu H, Chen L, Liu K and Liu Y (2016). Fast Composite Counting in RFID Systems, IEEE/ACM Transactions on Networking, 24:5, (2756-2767), Online publication date: 1-Oct-2016.
- Kreimer A and Herman M (2016). A Novel Structure Learning Algorithm for Optimal Bayesian Network, Procedia Computer Science, 96:C, (43-52), Online publication date: 1-Oct-2016.
- Munro J and Nicholson P (2016). Succinct Posets, Algorithmica, 76:2, (445-473), Online publication date: 1-Oct-2016.
- Shah V and Veciana G (2016). Impact of fairness and heterogeneity on delays in large-scale centralized content delivery systems, Queueing Systems: Theory and Applications, 83:3-4, (361-397), Online publication date: 1-Aug-2016.
- Fraigniaud P and Natale E Noisy Rumor Spreading and Plurality Consensus Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (127-136)
- Mitzenmacher M, Rajaraman R and Roche S Better Bounds for Coalescing-Branching Random Walks Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (313-323)
- Pandurangan G, Robinson P and Scquizzato M Fast Distributed Algorithms for Connectivity and MST in Large Graphs Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (429-438)
- Devanny W, Goodrich M and Jetviroj K Parallel Equivalence Class Sorting Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, (265-274)
- Bachrach Y, Filmus Y, Oren J and Zick Y A characterization of voting power for discrete weight distributions Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (74-80)
- Olmedo F, Kaminski B, Katoen J and Matheja C Reasoning about Recursive Probabilistic Programs Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (672-681)
- Dang D and Lehre P (2016). Runtime Analysis of Non-elitist Populations, Algorithmica, 75:3, (428-461), Online publication date: 1-Jul-2016.
- Doerr B and Doerr C (2016). The Impact of Random Initialization on the Runtime of Randomized Search Heuristics, Algorithmica, 75:3, (529-553), Online publication date: 1-Jul-2016.
- Jiang J, Mitzenmacher M and Thaler J (2017). Parallel Peeling Algorithms, ACM Transactions on Parallel Computing, 3:1, (1-27), Online publication date: 28-Jun-2016.
- Yang Y, Mao X, Pei J and He X Continuous Influence Maximization Proceedings of the 2016 International Conference on Management of Data, (727-741)
- Brandt S, Fischer O, Hirvonen J, Keller B, Lempiäinen T, Rybicki J, Suomela J and Uitto J A lower bound for the distributed Lovász local lemma Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (479-488)
- Asharov G, Naor M, Segev G and Shahaf I Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (1101-1114)
- Wang S, Zhang X, Li Y, Bashizade R, Yang S, Dwyer C and Lebeck A Accelerating markov random field inference using molecular optical gibbs sampling units Proceedings of the 43rd International Symposium on Computer Architecture, (558-569)
- Agarwal P, Fox K, Munagala K and Nath A Parallel Algorithms for Constructing Range and Nearest-Neighbor Searching Data Structures Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (429-440)
- McGregor A, Vorotnikova S and Vu H Better Algorithms for Counting Triangles in Data Streams Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (401-411)
- Wu Y and Yang P (2016). Minimax Rates of Entropy Estimation on Large Alphabets via Best Polynomial Approximation, IEEE Transactions on Information Theory, 62:6, (3702-3720), Online publication date: 1-Jun-2016.
- Chaudhury K and Dabhade S (2016). Fast and Provably Accurate Bilateral Filtering, IEEE Transactions on Image Processing, 25:6, (2519-2528), Online publication date: 1-Jun-2016.
- Safaka I, Czap L, Argyraki K and Fragouli C (2016). Creating Secrets Out of Packet Erasures, IEEE Transactions on Information Forensics and Security, 11:6, (1177-1191), Online publication date: 1-Jun-2016.
- Liao X, Liu C, McCoy D, Shi E, Hao S and Beyah R Characterizing Long-tail SEO Spam on Cloud Web Hosting Services Proceedings of the 25th International Conference on World Wide Web, (321-332)
- Kaminski B, Katoen J, Matheja C and Olmedo F Weakest Precondition Reasoning for Expected Run---Times of Probabilistic Programs Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (364-389)
- Meng T, Wu F and Chen G (2016). Code-based neighbor discovery protocols in mobile wireless networks, IEEE/ACM Transactions on Networking, 24:2, (806-819), Online publication date: 1-Apr-2016.
- Beimel A, Farràs O and Mintz Y (2016). Secret-Sharing Schemes for Very Dense Graphs, Journal of Cryptology, 29:2, (336-362), Online publication date: 1-Apr-2016.
- Shibata C and Yoshinaka R (2016). Probabilistic learnability of context-free grammars with basic distributional properties from positive examples, Theoretical Computer Science, 620:C, (46-72), Online publication date: 21-Mar-2016.
- Augustine J, Pandurangan G and Robinson P (2016). Distributed Algorithmic Foundations of Dynamic Networks, ACM SIGACT News, 47:1, (69-98), Online publication date: 10-Mar-2016.
- Bishop A and Pastro V Robust Secret Sharing Schemes Against Local Adversaries Proceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9615, (327-356)
- Mahmoody A, Riondato M and Upfal E Wiggins Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, (677-686)
- Zhu K and Ying L (2016). Information source detection in the SIR model, IEEE/ACM Transactions on Networking, 24:1, (408-421), Online publication date: 1-Feb-2016.
- Wang J, Li H, Lv T, Wang T, Li X and Kundu S (2016). Abstraction-Guided Simulation Using Markov Analysis for Functional Verification, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35:2, (285-297), Online publication date: 1-Feb-2016.
- Vatsalan D and Christen P (2016). Privacy-preserving matching of similar patients, Journal of Biomedical Informatics, 59:C, (285-298), Online publication date: 1-Feb-2016.
- Shen J and Ren Y (2016). Bounding the scaling window of random constraint satisfaction problems, Journal of Combinatorial Optimization, 31:2, (786-801), Online publication date: 1-Feb-2016.
- Kanade V, Levi R, Lotker Z, Mallmann-Trenn F and Mathieu C Distance in the forest fire model how far are you from eve? Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1602-1620)
- Augustine J, Moses W, Redlich A and Upfal E Balanced allocation Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (655-671)
- Bender M, Fineman J, Gilbert S and Young M How to scale exponential backoff Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (636-654)
- Achlioptas D, Hassani S, Macris N and Urbanke R Bounds for random constraint satisfaction problems via spatial coupling Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (469-479)
- Badanidiyuru A, Papadimitriou C, Rubinstein A, Seeman L and Singer Y Locally adaptive optimization Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (414-429)
- Buchbinder N and Feldman M Deterministic algorithms for submodular maximization problems Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (392-403)
- Einziger G and Friedman R Counting with TinyTable Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
- Decker C, Seidel J and Wattenhofer R Bitcoin meets strong consistency Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-10)
- Shuai H, Yang D, Yu P and Chen M (2016). A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee, IEEE Transactions on Knowledge and Data Engineering, 28:1, (2-16), Online publication date: 1-Jan-2016.
- Mahmoody A, Kornaropoulos E and Upfal E Optimizing Static and Adaptive Probing Schedules for Rapid Event Detection Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (377-391)
- Goel A, Munagala K, Sharma A and Zhang H A Note on Modeling Retweet Cascades on Twitter Proceedings of the 12th International Workshop on Algorithms and Models for the Web Graph - Volume 9479, (119-131)
- Hayashi M and Tan V (2015). Asymmetric Evaluations of Erasure and Undetected Error Probabilities, IEEE Transactions on Information Theory, 61:12, (6560-6577), Online publication date: 1-Dec-2015.
- Kunihiro N An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure Proceedings of the 9th International Conference on Provable Security - Volume 9451, (61-81)
- Yan W, Tehranipoor F and Chandy J A Novel Way to Authenticate Untrusted Integrated Circuits Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (132-138)
- Tsourakakis C Streaming Graph Partitioning in the Planted Partition Model Proceedings of the 2015 ACM on Conference on Online Social Networks, (27-35)
- Dutta C, Pandurangan G, Rajaraman R and Roche S (2015). Coalescing-Branching Random Walks on Graphs, ACM Transactions on Parallel Computing, 2:3, (1-29), Online publication date: 2-Nov-2015.
- Dhillon H and Caire G (2015). Wireless Backhaul Networks: Capacity Bound, Scalability Analysis and Design Guidelines, IEEE Transactions on Wireless Communications, 14:11, (6043-6056), Online publication date: 1-Nov-2015.
- Yanjun Han , Jiantao Jiao and Weissman T (2015). Minimax Estimation of Discrete Distributions Under
$\ell _{1}$ - Berlin K, Slater D and Saxe J Malicious Behavior Detection using Windows Audit Logs Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, (35-44)
- Ohrimenko O, Costa M, Fournet C, Gkantsidis C, Kohlweiss M and Sharma D Observing and Preventing Leakage in MapReduce Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1570-1581)
- Venkataramanan R, Swamy V and Ramchandran K (2015). Low-Complexity Interactive Algorithms for Synchronization From Deletions, Insertions, and Substitutions, IEEE Transactions on Information Theory, 61:10, (5670-5689), Online publication date: 1-Oct-2015.
- Shan Zhou and Lei Ying (2015). On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad Hoc Networks, IEEE Transactions on Information Theory, 61:10, (5643-5655), Online publication date: 1-Oct-2015.
- Riondato M and Upfal E VC-Dimension and Rademacher Averages Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2321-2322)
- Mitzenmacher M, Pachocki J, Peng R, Tsourakakis C and Xu S Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (815-824)
- Jeż A (2015). Approximation of grammar-based compression via recompression, Theoretical Computer Science, 592:C, (115-134), Online publication date: 9-Aug-2015.
- Kaibin Huang , Kountouris M and Li V (2015). Renewable Powered Cellular Networks: Energy Field Modeling and Network Coverage, IEEE Transactions on Wireless Communications, 14:8, (4234-4247), Online publication date: 1-Aug-2015.
- Kolomvatsos K, Anagnostopoulos C and Hadjiefthymiades S (2015). A time optimized scheme for top-k list maintenance over incomplete data streams, Information Sciences: an International Journal, 311:C, (59-73), Online publication date: 1-Aug-2015.
- Alistarh D, Sauerwald T and Vojnović M Lock-Free Algorithms under Stochastic Schedulers Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (251-260)
- Censor-Hillel K and Toukan T On Fast and Robust Information Spreading in the Vertex-Congest Model Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (270-284)
- Barenboim L, Elkin M and Gavoille C A Fast Network-Decomposition Algorithm and Its Applications to Constant-Time Distributed Computation Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (209-223)
- Maggs B and Sitaraman R (2015). Algorithmic Nuggets in Content Delivery, ACM SIGCOMM Computer Communication Review, 45:3, (52-66), Online publication date: 13-Jul-2015.
- Dang D, Jansen T and Lehre P Populations can be Essential in Dynamic Optimisation Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1407-1414)
- Tabatabaei S, Ur-Rehman O, Zivic N and Ruland C (2015). Secure and Robust Two-Phase Image Authentication, IEEE Transactions on Multimedia, 17:7, (945-956), Online publication date: 1-Jul-2015.
- Georgiou K, Kranakis E and Krizanc D (2015). Excuse me! or the courteous theatregoers' problem, Theoretical Computer Science, 586:C, (95-110), Online publication date: 27-Jun-2015.
- Shah V and de Veciana G (2015). Impact of Fairness and Heterogeneity on Delays in Large-scale Content Delivery Networks, ACM SIGMETRICS Performance Evaluation Review, 43:1, (375-387), Online publication date: 24-Jun-2015.
- Chakrabarti A, Cormode G, McGregor A, Thaler J and Venkatasubramanian S Verifiable stream computation and arthur-merlin communication Proceedings of the 30th Conference on Computational Complexity, (217-243)
- Shah V and de Veciana G Impact of Fairness and Heterogeneity on Delays in Large-scale Content Delivery Networks Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, (375-387)
- Becchetti L, Clementi A, Natale E, Pasquale F and Posta G Self-Stabilizing Repeated Balls-into-Bins Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (332-339)
- Daltrophe H, Dolev S and Lotker Z (2015). Probabilistic connectivity threshold for directional antenna widths, Theoretical Computer Science, 584:C, (103-114), Online publication date: 13-Jun-2015.
- Venkataramani S, Chakradhar S, Roy K and Raghunathan A Approximate computing and the quest for computing efficiency Proceedings of the 52nd Annual Design Automation Conference, (1-6)
- Caragiannis I, Krimpas G and Voudouris A Aggregating Partial Rankings with Applications to Peer Grading in Massive Online Open Courses Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (675-683)
- Jiantao Jiao , Venkat K, Yanjun Han and Weissman T (2015). Minimax Estimation of Functionals of Discrete Distributions, IEEE Transactions on Information Theory, 61:5, (2835-2885), Online publication date: 1-May-2015.
- Bar-Noy A and Baumer B (2015). Average Case Network Lifetime on an Interval with Adjustable Sensing Ranges, Algorithmica, 72:1, (148-166), Online publication date: 1-May-2015.
- Chiluka N, Andrade N, Pouwelse J and Sips H Social Networks Meet Distributed Systems Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (507-518)
- Yuan X, Wang C and Ren K Enabling IP Protection for Outsourced Integrated Circuit Design Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (237-247)
- Vattani A, Chierichetti F and Lowenstein K (2015). Optimal probabilistic cache stampede prevention, Proceedings of the VLDB Endowment, 8:8, (886-897), Online publication date: 1-Apr-2015.
- Yuan Y, Wang G, Chen L and Wang H (2015). Graph similarity search on large uncertain graph databases, The VLDB Journal — The International Journal on Very Large Data Bases, 24:2, (271-296), Online publication date: 1-Apr-2015.
- Babaioff M, Dughmi S, Kleinberg R and Slivkins A (2015). Dynamic Pricing with Limited Supply, ACM Transactions on Economics and Computation, 3:1, (1-26), Online publication date: 27-Mar-2015.
- Düben P, Schlachter J, Parishkrati , Yenugula S, Augustine J, Enz C, Palem K and Palmer T Opportunities for energy efficient computing Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (764-769)
- Venkataramani S, Chakradhar S, Roy K and Raghunathan A Computing approximately, and efficiently Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (748-751)
- Kutten S, Pandurangan G, Peleg D, Robinson P and Trehan A (2015). On the Complexity of Universal Leader Election, Journal of the ACM, 62:1, (1-27), Online publication date: 2-Mar-2015.
- Das Sarma A, Molla A and Pandurangan G (2015). Efficient random walk sampling in distributed networks, Journal of Parallel and Distributed Computing, 77:C, (84-94), Online publication date: 1-Mar-2015.
- Jeż A (2015). Faster Fully Compressed Pattern Matching by Recompression, ACM Transactions on Algorithms, 11:3, (1-43), Online publication date: 13-Jan-2015.
- Avin C, Keller B, Lotker Z, Mathieu C, Peleg D and Pignolet Y Homophily and the Glass Ceiling Effect in Social Networks Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (41-50)
- Giannakopoulos Y and Koutsoupias E (2015). Competitive analysis of maintaining frequent items of a stream, Theoretical Computer Science, 562:C, (23-32), Online publication date: 11-Jan-2015.
- Acharya J and Daskalakis C Testing Poisson binomial distributions Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1829-1840)
- Klauck H, Nanongkai D, Pandurangan G and Robinson P Distributed computation of large-scale graph problems Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (391-410)
- (2015). Fast distributed PageRank computation, Theoretical Computer Science, 561:PB, (113-121), Online publication date: 4-Jan-2015.
- (2015). Optimizing linear functions with the ( 1 + λ ) evolutionary algorithm-Different asymptotic runtimes for different instances, Theoretical Computer Science, 561:PA, (3-23), Online publication date: 4-Jan-2015.
- Dong W, Yang Y and Zhang W (2015). On the selection of information sources for gossip spreading, International Journal of Distributed Sensor Networks, 2015, (38-38), Online publication date: 1-Jan-2015.
- Schildbach G, Goulart P and Morari M (2015). Linear controller design for chance constrained systems, Automatica (Journal of IFAC), 51:C, (278-284), Online publication date: 1-Jan-2015.
- Tang Y, Wang T, Liu L, Hu X and Jang J Lightweight authentication of freshness in outsourced key-value stores Proceedings of the 30th Annual Computer Security Applications Conference, (176-185)
- Adiga A, Chandran L and Sivadasan N (2014). Lower bounds for boxicity, Combinatorica, 34:6, (631-655), Online publication date: 1-Dec-2014.
- Doerr B, Friedrich T and Sauerwald T (2014). Quasirandom Rumor Spreading, ACM Transactions on Algorithms, 11:2, (1-35), Online publication date: 17-Nov-2014.
- Zhang Y and Prakash B Scalable Vaccine Distribution in Large Graphs given Uncertain Data Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1719-1728)
- Song C and Ge T Aroma Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1569-1578)
- Yuan Y, Wang G and Chen L Pattern Match Query in a Large Uncertain Graph Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (519-528)
- Dieudonné Y, Pelc A and Peleg D (2014). Gathering Despite Mischief, ACM Transactions on Algorithms, 11:1, (1-28), Online publication date: 28-Oct-2014.
- Riondato M and Upfal E (2014). Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees, ACM Transactions on Knowledge Discovery from Data, 8:4, (1-32), Online publication date: 7-Oct-2014.
- Yuen H (2014). A quantum lower bound for distinguishing random functions from random permutations, Quantum Information & Computation, 14:13-14, (1089-1097), Online publication date: 1-Oct-2014.
- Begum N and Keogh E (2014). Rare time series motif discovery from unbounded streams, Proceedings of the VLDB Endowment, 8:2, (149-160), Online publication date: 1-Oct-2014.
- Borokhovich M, Avin C and Lotker Z (2014). Bounds for algebraic gossip on graphs, Random Structures & Algorithms, 45:2, (185-217), Online publication date: 1-Sep-2014.
- Zheng X, Li J, Gao H and Cai Z Capacity of wireless networks with multiple types of multicast sessions Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (135-144)
- Tang B, Ye B, Lu S, Guo S and Stojmenovic I Latency-optimized broadcast in mobile ad hoc networks without node coordination Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (317-326)
- Dang D and Lehre P Evolution under partial information Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1359-1366)
- Doerr B and Doerr C The impact of random initialization on the runtime of randomized search heuristics Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1375-1382)
- Shenoy K B A, Biswas S and Kurur P Performance of metropolis algorithm for the minimum weight code word problem Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (485-492)
- He X, Gao M, Kan M, Liu Y and Sugiyama K Predicting the popularity of web 2.0 items based on user comments Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, (233-242)
- Eppstein D, Goodrich M, Mitzenmacher M and Pszona P Wear Minimization for Cuckoo Hashing Proceedings of the 13th International Symposium on Experimental Algorithms - Volume 8504, (162-173)
- Mitzenmacher M Balanced allocations and double hashing Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (331-342)
- Jiang J, Mitzenmacher M and Thaler J Parallel peeling algorithms Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures, (319-330)
- Bi R, Gao H and Li Y Probabilistic Threshold Based Monitoring Using Sensor Networks Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491, (246-255)
- Alistarh D, Censor-Hillel K and Shavit N Are lock-free concurrent algorithms practically wait-free? Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (714-723)
- Rothvoss T The matching polytope has exponential extension complexity Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (263-272)
- Baldi P and Sadowski P (2014). The dropout learning algorithm, Artificial Intelligence, 210:C, (78-122), Online publication date: 1-May-2014.
- Majerski P and Przybyło J (2014). Total Vertex Irregularity Strength of Dense Graphs, Journal of Graph Theory, 76:1, (34-41), Online publication date: 1-May-2014.
- Mitzenmacher M, Pagh R and Pham N Efficient estimation for high similarities using odd sketches Proceedings of the 23rd international conference on World wide web, (109-118)
- Sachdeva S and Vishnoi N (2014). Faster Algorithms via Approximation Theory, Foundations and Trends® in Theoretical Computer Science, 9:2, (125-210), Online publication date: 28-Mar-2014.
- Wang J, Li H, Lv T, Wang T and Li X Functional test generation guided by steady-state probabilities of abstract design Proceedings of the conference on Design, Automation & Test in Europe, (1-4)
- Riondato M and Kornaropoulos E Fast approximation of betweenness centrality through sampling Proceedings of the 7th ACM international conference on Web search and data mining, (413-422)
- Aupy G, Robert Y, Vivien F and Zaidouni D (2014). Checkpointing algorithms and fault prediction, Journal of Parallel and Distributed Computing, 74:2, (2048-2064), Online publication date: 1-Feb-2014.
- Fomin F, Lokshtanov D and Saurabh S Efficient computation of representative sets with applications in parameterized and exact algorithms Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (142-151)
- Adiga A, Chandran L and Mathew R (2014). Cubicity, degeneracy, and crossing number, European Journal of Combinatorics, 35, (2-12), Online publication date: 1-Jan-2014.
- Shuai H, Yang D, Yu P and Chen M (2013). Willingness optimization for social group activity, Proceedings of the VLDB Endowment, 7:4, (253-264), Online publication date: 1-Dec-2013.
- Kouri T and Mehta D (2013). Faster reaction mapping through improved naming techniques, ACM Journal of Experimental Algorithmics, 18, (2.1-2.32), Online publication date: 1-Dec-2013.
- Arampatzis A, Efraimidis P and Drosatos G (2013). A query scrambler for search privacy on the internet, Information Retrieval, 16:6, (657-679), Online publication date: 1-Dec-2013.
- Klonowski M, Koza M and Kutyłowski M Efficient and robust data aggregation using untrusted infrastructure Proceedings of the 6th International Conference on Security of Information and Networks, (123-130)
- Ravichandran K and Pande S (2013). Multiverse, ACM SIGPLAN Notices, 48:10, (533-552), Online publication date: 12-Nov-2013.
- Tudor V, Almgren M and Papatriantafilou M Analysis of the impact of data granularity on privacy for the smart grid Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, (61-70)
- Ravichandran K and Pande S Multiverse Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications, (533-552)
- Ying S, Feng Y, Yu N and Ying M Reachability probabilities of quantum markov chains Proceedings of the 24th international conference on Concurrency Theory, (334-348)
- Peres Y, Sotnikov D, Sudakov B and Zwick U (2013). All-pairs shortest paths in O(n2) time with high probability, Journal of the ACM, 60:4, (1-25), Online publication date: 1-Aug-2013.
- Dutta C, Pandurangan G, Rajaraman R and Roche S Coalescing-branching random walks on graphs Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures, (176-185)
- Bodlaender M, Halldórsson M and Mitra P Connectivity and aggregation in multihop wireless networks Proceedings of the 2013 ACM symposium on Principles of distributed computing, (355-364)
- Alistarh D, Aspnes J, Giakkoupis G and Woelfel P Randomized loose renaming in o(log log n) time Proceedings of the 2013 ACM symposium on Principles of distributed computing, (200-209)
- Azar Y, Cohen I and Gamzu I The loss of serving in the dark Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (951-960)
- Molavi Kakhki A, Kliman-Silver C and Mislove A Iolaus Proceedings of the 22nd international conference on World Wide Web, (919-930)
- Doerr B, Huber A and Levavi A (2013). Strong robustness of randomized rumor spreading protocols, Discrete Applied Mathematics, 161:6, (778-793), Online publication date: 1-Apr-2013.
- Avin C, Borokhovich M, Censor-Hillel K and Lotker Z (2013). Order optimal information spreading using algebraic gossip, Distributed Computing, 26:2, (99-117), Online publication date: 1-Apr-2013.
- Rothvoß T A simpler proof for O(congestion+dilation) packet routing Proceedings of the 16th international conference on Integer Programming and Combinatorial Optimization, (336-348)
- Bacci G, Bacci G, Larsen K and Mardare R On-the-Fly exact computation of bisimilarity distances Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (1-15)
- Doerr B, Jansen T, Sudholt D, Winzen C and Zarges C (2013). Mutation rate matters even when optimizing monotonic functions, Evolutionary Computation, 21:1, (1-27), Online publication date: 1-Mar-2013.
- Blanchet J and Stauffer A (2013). Characterizing optimal sampling of binary contingency tables via the configuration model, Random Structures & Algorithms, 42:2, (159-184), Online publication date: 1-Mar-2013.
- Byrka J, Grandoni F, Rothvoss T and Sanità L (2013). Steiner Tree Approximation via Iterative Randomized Rounding, Journal of the ACM, 60:1, (1-33), Online publication date: 1-Feb-2013.
- Das Sarma A, Nanongkai D, Pandurangan G and Tetali P (2013). Distributed Random Walks, Journal of the ACM, 60:1, (1-31), Online publication date: 1-Feb-2013.
- Suomela J (2013). Survey of local algorithms, ACM Computing Surveys, 45:2, (1-40), Online publication date: 1-Feb-2013.
- Doerr B, Sudholt D and Witt C When do evolutionary algorithms optimize separable functions in parallel? Proceedings of the twelfth workshop on Foundations of genetic algorithms XII, (51-64)
- Bogdan P, Sauerwald T, Stauffer A and Sun H Balls into bins via local search Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (16-34)
- De Marco G and Kowalski D (2013). Searching for a subset of counterfeit coins: Randomization vs determinism and adaptiveness vs non-adaptiveness, Random Structures & Algorithms, 42:1, (97-109), Online publication date: 1-Jan-2013.
- Goodrich M, Hirschberg D, Mitzenmacher M and Thaler J Cache-Oblivious dictionaries and multimaps with negligible failure probability Proceedings of the First Mediterranean conference on Design and Analysis of Algorithms, (203-218)
- Riondato M, DeBrabant J, Fonseca R and Upfal E PARMA Proceedings of the 21st ACM international conference on Information and knowledge management, (85-94)
- Yanggratoke R, Kreitz G, Goldmann M and Stadler R Predicting response times for the Spotify backend Proceedings of the 8th International Conference on Network and Service Management, (117-125)
- Ambainis A, Kempe J and Sattath O (2012). A quantum Lovász local lemma, Journal of the ACM, 59:5, (1-24), Online publication date: 1-Oct-2012.
- Perry J, Iannucci P, Fleming K, Balakrishnan H and Shah D (2012). Spinal codes, ACM SIGCOMM Computer Communication Review, 42:4, (49-60), Online publication date: 24-Sep-2012.
- Dezfuli M and Haghjoo M Xtream Proceedings of the 6th international conference on Scalable Uncertainty Management, (1-15)
- Perry J, Iannucci P, Fleming K, Balakrishnan H and Shah D Spinal codes Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, (49-60)
- Halldórsson M and Mitra P Towards tight bounds for local broadcasting Proceedings of the 8th International Workshop on Foundations of Mobile Computing, (1-9)
- Ambainis A, Bačkurs A, Balodis K, Kravčenko D, Ozols R, Smotrovs J and Virza M Quantum strategies are better than classical in almost any XOR game Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (25-37)
- Jansen T and Zarges C Fixed budget computations Proceedings of the 14th annual conference on Genetic and evolutionary computation, (1325-1332)
- Tong Y, Chen L, Cheng Y and Yu P (2012). Mining frequent itemsets over uncertain databases, Proceedings of the VLDB Endowment, 5:11, (1650-1661), Online publication date: 1-Jul-2012.
- Cao C, She J, Tong Y and Chen L (2012). Whom to ask?, Proceedings of the VLDB Endowment, 5:11, (1495-1506), Online publication date: 1-Jul-2012.
- Stanton I and Pinar A (2012). Constructing and sampling graphs with a prescribed joint degree distribution, ACM Journal of Experimental Algorithmics, 17, (3.1-3.25), Online publication date: 1-Jul-2012.
- Feldmann A, Röglin H and Vöcking B (2012). Computing approximate Nash equilibria in network congestion games, Networks, 59:4, (380-386), Online publication date: 1-Jul-2012.
- Haeupler B, Pandurangan G, Peleg D, Rajaraman R and Sun Z Discovery through gossip Proceedings of the twenty-fourth annual ACM symposium on Parallelism in algorithms and architectures, (140-149)
- Pietracaprina A, Pucci G, Riondato M, Silvestri F and Upfal E Space-round tradeoffs for MapReduce computations Proceedings of the 26th ACM international conference on Supercomputing, (235-244)
- Avrachenkov K, Litvak N, Sokol M and Towsley D Quick detection of nodes with large degrees Proceedings of the 9th international conference on Algorithms and Models for the Web Graph, (54-65)
- Yu D, Hua Q, Dai W, Wang Y and Lau F Dynamic contention resolution in multiple-access channels Proceedings of the 10th international conference on Wired/Wireless Internet Communication, (232-243)
- Chierichetti F, Kleinberg J and Panconesi A How to schedule a cascade in an arbitrary graph Proceedings of the 13th ACM Conference on Electronic Commerce, (355-368)
- Kumar J, Butler K, Kim H and Vasudevan S Early prediction of NBTI effects using RTL source code analysis Proceedings of the 49th Annual Design Automation Conference, (808-813)
- Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F (2012). An Efficient Rigorous Approach for Identifying Statistically Significant Frequent Itemsets, Journal of the ACM, 59:3, (1-22), Online publication date: 1-Jun-2012.
- Zhou D, Luo D, Lu R and Han Z (2012). The use of tail inequalities on the probable computational time of randomized search heuristics, Theoretical Computer Science, 436, (106-117), Online publication date: 1-Jun-2012.
- Yuan Y, Wang G, Chen L and Wang H (2012). Efficient subgraph similarity search on large probabilistic graph databases, Proceedings of the VLDB Endowment, 5:9, (800-811), Online publication date: 1-May-2012.
- Cao Q, Sirivianos M, Yang X and Pregueiro T Aiding the detection of fake accounts in large scale social online services Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (15-15)
- Chiluka N, Andrade N, Pouwelse J and Sips H Leveraging trust and distrust for sybil-tolerant voting in online social media Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, (1-8)
- Cutillo L, Molva R and Önen M Privacy preserving picture sharing Proceedings of the Fifth Workshop on Social Network Systems, (1-6)
- Viswanath B, Mondal M, Gummadi K, Mislove A and Post A Canal Proceedings of the 7th ACM european conference on Computer Systems, (309-322)
- Karachi A, Dezfuli M and Haghjoo M PLR Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III, (405-415)
- Dasgupta A, Gurevich M, Zhang L, Tseng B and Thomas A Overcoming browser cookie churn with clustering Proceedings of the fifth ACM international conference on Web search and data mining, (83-92)
- Ré C and Suciu D (2012). Understanding cardinality estimation using entropy maximization, ACM Transactions on Database Systems, 37:1, (1-31), Online publication date: 1-Feb-2012.
- Robert J, Otrok H, Quttoum A and Boukhris R (2012). A distributed resource management model for Virtual Private Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (927-939), Online publication date: 1-Feb-2012.
- Fountoulakis N, Panagiotou K and Sauerwald T Ultra-fast rumor spreading in social networks Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1642-1660)
- Porat E and Strauss M Sublinear time, measurement-optimal, sparse recovery for all Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1215-1227)
- Dieudonné Y, Pelc A and Peleg D Gathering despite mischief Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (527-540)
- Rothvoß T The entropy rounding method in approximation algorithms Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (356-372)
- Goodrich M, Mitzenmacher M, Ohrimenko O and Tamassia R Privacy-preserving group data access via stateless oblivious RAM simulation Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (157-167)
- Goodrich M (2011). Randomized Shellsort, Journal of the ACM, 58:6, (1-26), Online publication date: 1-Dec-2011.
- Hao D, Adhikari A and Sakurai K Mixed-Strategy game based trust management for clustered wireless sensor networks Proceedings of the Third international conference on Trusted Systems, (239-257)
- Chovanec A and Barták R On generating templates for hypothesis in inductive logic programming Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (162-173)
- Wei S, Nahapetian A and Potkonjak M Robust passive hardware metering Proceedings of the International Conference on Computer-Aided Design, (802-809)
- Kumar J, Liu L and Vasudevan S Scaling probabilistic timing verification of hardware using abstractions in design source code Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (196-205)
- Cledat R, Kumar T and Pande S Efficiently speeding up sequential computation through the n-way programming model Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (537-554)
- Wei S, Koushanfar F and Potkonjak M Integrated circuit digital rights management techniques using physical level characterization Proceedings of the 11th annual ACM workshop on Digital rights management, (3-14)
- Cledat R, Kumar T and Pande S (2011). Efficiently speeding up sequential computation through the n-way programming model, ACM SIGPLAN Notices, 46:10, (537-554), Online publication date: 18-Oct-2011.
- Aspnes J Randomized consensus in expected O(n2) total work using single-writer registers Proceedings of the 25th international conference on Distributed computing, (363-373)
- Anta A, Mosteiro M and Muñoz J Unbounded contention resolution in multiple-access channels Proceedings of the 25th international conference on Distributed computing, (225-236)
- Alistarh D and Aspnes J Sub-logarithmic test-and-set against aweak adversary Proceedings of the 25th international conference on Distributed computing, (97-109)
- Bar-Noy A and Baumer B Maximizing network lifetime on the line with adjustable sensing ranges Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (28-41)
- Klein R, Penninger R, Sohler C and Woodruff D Tolerant algorithms Proceedings of the 19th European conference on Algorithms, (736-747)
- Hoepman J, Larsson A, Schiller E and Tsigas P (2011). Secure and self-stabilizing clock synchronization in sensor networks, Theoretical Computer Science, 412:40, (5631-5647), Online publication date: 1-Sep-2011.
- Radhakrishnan J and Shannigrahi S Streaming algorithms for 2-coloring uniform hypergraphs Proceedings of the 12th international conference on Algorithms and data structures, (667-678)
- Yuan Y, Wang G, Wang H and Chen L (2020). Efficient subgraph search over large uncertain graphs, Proceedings of the VLDB Endowment, 4:11, (876-886), Online publication date: 1-Aug-2011.
- Kuzu M, Kantarcioglu M, Durham E and Malin B A constraint satisfaction cryptanalysis of bloom filters in private record linkage Proceedings of the 11th international conference on Privacy enhancing technologies, (226-245)
- Chang C and Lyuu Y Stable sets of threshold-based cascades on the erdős-rényi random graphs Proceedings of the 22nd international conference on Combinatorial Algorithms, (96-105)
- Cichoń J, Lemiesz J and Zawada M On cardinality estimation protocols for wireless sensor networks Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks, (322-331)
- Kranakis E, Krizanc D and Morin P (2011). Randomized rendezvous with limited memory, ACM Transactions on Algorithms, 7:3, (1-12), Online publication date: 1-Jul-2011.
- Eisenbrand F, Kakimura N, Rothvoß T and Sanità L Set covering with ordered replacement Proceedings of the 15th international conference on Integer programming and combinatoral optimization, (170-182)
- Jin W and Patel J Efficient and generic evaluation of ranked queries Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (601-612)
- Pettarin A, Pietracaprina A, Pucci G and Upfal E Tight bounds on information dissemination in sparse mobile networks Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (355-362)
- Alistarh D, Aspnes J, Censor-Hillel K, Gilbert S and Zadimoghaddam M Optimal-time adaptive strong renaming, with applications to counting Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (239-248)
- Goodrich M Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (379-388)
- Hua N, Xu J, Lin B and Zhao H (2011). BRICK, IEEE/ACM Transactions on Networking, 19:3, (670-682), Online publication date: 1-Jun-2011.
- Jiang W, Liu T, Ren T and Xu K Two hardness results on feedback vertex sets Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management, (233-243)
- Aupy G and Bournez O (2011). On the number of binary-minded individuals required to compute 12, Theoretical Computer Science, 412:22, (2262-2267), Online publication date: 1-May-2011.
- Ni J, Srikant R and Wu X (2011). Coloring spatial point processes with applications to peer discovery in large wireless networks, IEEE/ACM Transactions on Networking, 19:2, (575-588), Online publication date: 1-Apr-2011.
- Yu H (2011). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling, Distributed Computing, 23:5-6, (373-394), Online publication date: 1-Apr-2011.
- Sahami M A course on probability theory for computer scientists Proceedings of the 42nd ACM technical symposium on Computer science education, (263-268)
- Schulz A and Uhan N (2011). Near-Optimal Solutions and Large Integrality Gaps for Almost All Instances of Single-Machine Precedence-Constrained Scheduling, Mathematics of Operations Research, 36:1, (14-23), Online publication date: 1-Feb-2011.
- Giakkoupis G and Woelfel P On the randomness requirements of rumor spreading Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (449-461)
- Goodrich M Spin-the-bottle sort and annealing sort Proceedings of the Meeting on Analytic Algorithmics and Combinatorics, (93-106)
- Cathabard S, Lehre P and Yao X Non-uniform mutation rates for problems with unknown solution lengths Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (173-180)
- Sudholt D Using markov-chain mixing time estimates for the analysis of ant colony optimization Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (139-150)
- Chakaravarthy V, Choudhury A, Garg V and Sabharwal Y An efficient decentralized algorithm for the distributed trigger counting problem Proceedings of the 12th international conference on Distributed computing and networking, (53-64)
- Girju R and Paul M (2011). Modeling reciprocity in social interactions with probabilistic latent space models, Natural Language Engineering, 17:1, (1-36), Online publication date: 1-Jan-2011.
- Kirsch A and Mitzenmacher M (2010). The power of one move, IEEE/ACM Transactions on Networking, 18:6, (1752-1765), Online publication date: 1-Dec-2010.
- Weber S, Andrews J and Jindal N (2010). An overview of the transmission capacity of wireless networks, IEEE Transactions on Communications, 58:12, (3593-3604), Online publication date: 1-Dec-2010.
- Klonowski M, Przykucki M, Strumiński T and Sulkowska M Practical universal random sampling Proceedings of the 5th international conference on Advances in information and computer security, (84-100)
- Hoefer M and Souza A (2010). Tradeoffs and Average-Case Equilibria in Selfish Routing, ACM Transactions on Computation Theory, 2:1, (1-25), Online publication date: 1-Nov-2010.
- Becchetti L, Boldi P, Castillo C and Gionis A (2010). Efficient algorithms for large-scale local triangle counting, ACM Transactions on Knowledge Discovery from Data, 4:3, (1-28), Online publication date: 1-Oct-2010.
- Ouyang M and Ying L On optimal feedback allocation in multichannel wireless downlinks Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (241-250)
- Vasudevan S, Goeckel D and Towsley D Security-capacity trade-off in large wireless networks using keyless secrecy Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (21-30)
- Kutten S and Zinenko D Low communication self-stabilization through randomization Proceedings of the 24th international conference on Distributed computing, (465-479)
- Alistarh D, Attiya H, Gilbert S, Giurgiu A and Guerraoui R Fast randomized test-and-set and renaming Proceedings of the 24th international conference on Distributed computing, (94-108)
- Doerr B, Jansen T, Sudholt D, Winzen C and Zarges C Optimizing monotone functions can be difficult Proceedings of the 11th international conference on Parallel problem solving from nature: Part I, (42-51)
- Cicalese F and Vaccaro U Superselectors Proceedings of the 18th annual European conference on Algorithms: Part I, (207-218)
- Coja-Oghlan A, Onsjö M and Watanabe O Propagation connectivity of random hypergraphs Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (490-503)
- Ge T and Zdonik S (2010). A*-tree, Proceedings of the VLDB Endowment, 3:1-2, (964-974), Online publication date: 1-Sep-2010.
- Viswanath B, Post A, Gummadi K and Mislove A An analysis of social network-based Sybil defenses Proceedings of the ACM SIGCOMM 2010 conference, (363-374)
- Viswanath B, Post A, Gummadi K and Mislove A (2010). An analysis of social network-based Sybil defenses, ACM SIGCOMM Computer Communication Review, 40:4, (363-374), Online publication date: 16-Aug-2010.
- Yin C, Gao L and Cui S (2010). Scaling laws for overlaid wireless networks, IEEE/ACM Transactions on Networking, 18:4, (1317-1329), Online publication date: 1-Aug-2010.
- Anta A and Mosteiro M Contention resolution in multiple-access channels Proceedings of the 16th annual international conference on Computing and combinatorics, (378-388)
- Johannsen D, Kurur P and Lengler J Can quantum search accelerate evolutionary algorithms? Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1433-1440)
- Lässig J and Sudholt D The benefit of migration in parallel evolutionary algorithms Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1105-1112)
- Dong J, Ackermann K, Bavar B and Nita-Rotaru C (2010). Secure and robust virtual coordinate system in wireless sensor networks, ACM Transactions on Sensor Networks, 6:4, (1-34), Online publication date: 1-Jul-2010.
- Rachlin E and Savage J Stochastic nanoscale addressing for logic Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures, (59-64)
- Ni J, Srikant R and Wu X Coloring spatial point processes with applications to peer discovery in large wireless networks Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (167-178)
- Chen J and Pandurangan G Optimal gossip-based aggregate computation Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures, (124-133)
- Ni J, Srikant R and Wu X (2010). Coloring spatial point processes with applications to peer discovery in large wireless networks, ACM SIGMETRICS Performance Evaluation Review, 38:1, (167-178), Online publication date: 12-Jun-2010.
- Ré C and Suciu D Understanding cardinality estimation using entropy maximization Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (53-64)
- Varadarajan K Weighted geometric set cover via quasi-uniform sampling Proceedings of the forty-second ACM symposium on Theory of computing, (641-648)
- Chatterjee S, Connor M and Kumar P Geometric minimum spanning trees with GEOFILTERKRUSKAL* Proceedings of the 9th international conference on Experimental Algorithms, (486-500)
- Lam V, Mitzenmacher M and Varghese G Carousel Proceedings of the 7th USENIX conference on Networked systems design and implementation, (24-24)
- Finucane H and Mitzenmacher M (2010). An improved analysis of the lossy difference aggregator, ACM SIGCOMM Computer Communication Review, 40:2, (4-11), Online publication date: 9-Apr-2010.
- Andrews M, Anta A, Zhang L and Zhao W Routing for energy minimization in the speed scaling model Proceedings of the 29th conference on Information communications, (2435-2443)
- Cheng S, Li J, Ren Q and Yu L Bernoulli sampling based (ε, δ)-approximate aggregation in large-scale sensor networks Proceedings of the 29th conference on Information communications, (1181-1189)
- Aspnes J and Censor K (2010). Approximate shared-memory counting despite a strong adversary, ACM Transactions on Algorithms, 6:2, (1-23), Online publication date: 1-Mar-2010.
- Chierichetti F, Finucane H, Liu Z and Mitzenmacher M (2010). Designing floating codes for expected performance, IEEE Transactions on Information Theory, 56:3, (968-978), Online publication date: 1-Mar-2010.
- Dobzinski S, Nisan N and Schapira M (2010). Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders, Mathematics of Operations Research, 35:1, (1-13), Online publication date: 1-Feb-2010.
- Tetali P, Vera J, Vigoda E and Yang L Phase transition for the mixing time of the Glauber dynamics for coloring regular trees Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1646-1656)
- Goodrich M Randomized Shellsort Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1262-1277)
- Briest P, Chawla S, Kleinberg R and Weinberg S Pricing randomized allocations Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (585-597)
- Derbel B and Talbi E Radio network distributed algorithms in the unknown neighborhood model Proceedings of the 11th international conference on Distributed computing and networking, (155-166)
- Bistarelli S and Gosti G (2010). Solving Distributed CSPs Probabilistically, Fundamenta Informaticae, 105:1-2, (57-78), Online publication date: 1-Jan-2010.
- Busch H, Katzenbeisser S and Baecher P PUF-Based Authentication Protocols --- Revisited Information Security Applications, (296-308)
- AbuHmed T, Nyamaa N and Nyang D Software-based remote code attestation in wireless sensor network Proceedings of the 28th IEEE conference on Global telecommunications, (4680-4687)
- Dasgupta A, Ghosh S and Xiao X Fault-Containment in Weakly-Stabilizing Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (209-223)
- Zou Z, Li J, Gao H and Zhang S Frequent subgraph pattern mining on uncertain graph data Proceedings of the 18th ACM conference on Information and knowledge management, (583-592)
- Steiner M, En-Najjary T and Biersack E (2009). Long term study of peer behavior in the KAD DHT, IEEE/ACM Transactions on Networking, 17:5, (1371-1384), Online publication date: 1-Oct-2009.
- Miyoshi N, Shigezumi T, Uehara R and Watanabe O (2009). Scale free interval graphs, Theoretical Computer Science, 410:45, (4588-4600), Online publication date: 1-Oct-2009.
- Das Sarma A, Nanongkai D and Pandurangan G Fast distributed random walks Proceedings of the 28th ACM symposium on Principles of distributed computing, (161-170)
- Chlebus B, Kowalski D and Strojnowski M Fast scalable deterministic consensus for crash failures Proceedings of the 28th ACM symposium on Principles of distributed computing, (111-120)
- Zhang M, Chen S, Jensen C, Ooi B and Zhang Z (2009). Effectively indexing uncertain moving objects for predictive queries, Proceedings of the VLDB Endowment, 2:1, (1198-1209), Online publication date: 1-Aug-2009.
- Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F An efficient rigorous approach for identifying statistically significant frequent itemsets Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (117-126)
- Chang C and Lyuu Y (2009). Spreading messages, Theoretical Computer Science, 410:27-29, (2714-2724), Online publication date: 1-Jun-2009.
- Sudo Y, Nakamura J, Yamauchi Y, Ooshita F, Kakugawa H and Masuzawa T Loosely-Stabilizing leader election in population protocol model Proceedings of the 16th international conference on Structural Information and Communication Complexity, (295-308)
- Even G and Medina M Revisiting randomized parallel load balancing algorithms Proceedings of the 16th international conference on Structural Information and Communication Complexity, (209-221)
- Baumert S, Ghate A, Kiatsupaibul S, Shen Y, Smith R and Zabinsky Z (2009). Discrete Hit-and-Run for Sampling Points from Arbitrary Distributions Over Subsets of Integer Hyperrectangles, Operations Research, 57:3, (727-739), Online publication date: 1-May-2009.
- Haifeng Yu Secure and highly-available aggregation queries in large-scale sensor networks via set sampling Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, (1-12)
- Davidson I and Ravi S (2009). Using instance-level constraints in agglomerative hierarchical clustering, Data Mining and Knowledge Discovery, 18:2, (257-282), Online publication date: 1-Apr-2009.
- Woodruff D The average-case complexity of counting distinct elements Proceedings of the 12th International Conference on Database Theory, (284-295)
- Tsai S, Tzeng W and Zhou K (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks, IEEE Transactions on Wireless Communications, 8:3, (1218-1222), Online publication date: 1-Mar-2009.
- Wang Y and Ishwar P (2009). Distributed field estimation with randomly deployed, noisy, binary sensors, IEEE Transactions on Signal Processing, 57:3, (1177-1189), Online publication date: 1-Mar-2009.
- Arantes G, França F and Martinhon C (2009). Randomized generation of acyclic orientations upon anonymous distributed systems, Journal of Parallel and Distributed Computing, 69:3, (239-246), Online publication date: 1-Mar-2009.
- Alt H and Scharf L Shape Matching by Random Sampling Proceedings of the 3rd International Workshop on Algorithms and Computation, (381-393)
- Aspnes J and Censor K Approximate shared-memory counting despite a strong adversary Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (441-450)
- Rachlin E and Savage J (2008). Nanowire addressing with randomized-contact decoders, Theoretical Computer Science, 408:2-3, (241-261), Online publication date: 20-Nov-2008.
- Hua N, Lin B, Xu J and Zhao H BRICK Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (89-98)
- Singh V, Mukherjee L, Dinu P, Xu J and Hoffmann K (2008). Limited view CT reconstruction and segmentation via constrained metric labeling, Computer Vision and Image Understanding, 112:1, (67-80), Online publication date: 1-Oct-2008.
- Quercia D, Hailes S and Capra L MobiRate Proceedings of the 10th international conference on Ubiquitous computing, (212-221)
- Anagnostopoulos A, Kumar R and Mahdian M Influence and correlation in social networks Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (7-15)
- Clementi A, Macci C, Monti A, Pasquale F and Silvestri R Flooding time in edge-Markovian dynamic graphs Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (213-222)
- Georgiou C, Gilbert S, Guerraoui R and Kowalski D On the complexity of asynchronous gossip Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (135-144)
- Ge T and Zdonik S (2008). A skip-list approach for efficiently processing forecasting queries, Proceedings of the VLDB Endowment, 1:1, (984-995), Online publication date: 1-Aug-2008.
- Gąsieniec L, Kantor E, Kowalski D, Peleg D and Su C (2008). Time efficient k-shot broadcasting in known topology radio networks, Distributed Computing, 21:2, (117-127), Online publication date: 1-Jul-2008.
- Feldmann A, Röglin H and Vöcking B Computing Approximate Nash Equilibria in Network Congestion Games Proceedings of the 15th international colloquium on Structural Information and Communication Complexity, (209-220)
- Ré C, Letchner J, Balazinksa M and Suciu D Event queries on correlated probabilistic streams Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (715-728)
- Collins M, Globerson A, Koo T, Carreras X and Bartlett P (2008). Exponentiated Gradient Algorithms for Conditional Random Fields and Max-Margin Markov Networks, The Journal of Machine Learning Research, 9, (1775-1822), Online publication date: 1-Jun-2008.
- Schudy W Finding strongly connected components in parallel using O(log2n) reachability queries Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (146-151)
- Li A and Tang L Derandomizing graph tests for homomorphism Proceedings of the 5th international conference on Theory and applications of models of computation, (105-115)
- Kranakis E, Krizanc D and Morin P Randomized rendez-vous with limited memory Proceedings of the 8th Latin American conference on Theoretical informatics, (605-616)
- Gertsbakh I and Shpungin Y (2008). Network reliability importance measures, WSEAS Transactions on Computers, 7:4, (216-227), Online publication date: 1-Apr-2008.
- Czajka T and Pandurangan G (2008). Improved random graph isomorphism, Journal of Discrete Algorithms, 6:1, (85-92), Online publication date: 1-Mar-2008.
- Becchetti L, Castillo C, Donato D, Baeza-YATES R and Leonardi S (2008). Link analysis for Web spam detection, ACM Transactions on the Web, 2:1, (1-42), Online publication date: 1-Feb-2008.
- Doerr B, Friedrich T and Sauerwald T Quasirandom rumor spreading Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (773-781)
- Huang K, Heath R and Andrews J (2008). Uplink SDMA with limited feedback, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
- Farach-Colton M and Mosteiro M Sensor network gossiping or how to break the broadcast lower bound Proceedings of the 18th international conference on Algorithms and computation, (232-243)
- Farach-Colton M and Mosteiro M Sensor Network Gossiping or How to Break the Broadcast Lower Bound Algorithms and Computation, (232-243)
- Hopcroft J and Sheldon D Manipulation-resistant reputations using hitting time Proceedings of the 5th international conference on Algorithms and models for the web-graph, (68-81)
- Gertsbakh I and Shpungin Y Network reliability importance measures Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (88-94)
- Steiner M, En-Najjary T and Biersack E A global view of kad Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (117-122)
- Bond M and McKinley K (2007). Probabilistic calling context, ACM SIGPLAN Notices, 42:10, (97-112), Online publication date: 21-Oct-2007.
- Bond M and McKinley K Probabilistic calling context Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications, (97-112)
- Hoefer M and Souza A Tradeoffs and average-case equilibria in selfish routing Proceedings of the 15th annual European conference on Algorithms, (63-74)
- Khan M, Pandurangan G and Anil Kumar V (2007). A simple randomized scheme for constructing low-weight k-connected spanning subgraphs with applications to distributed algorithms, Theoretical Computer Science, 385:1-3, (101-114), Online publication date: 1-Oct-2007.
- Ge T and Zdonik S Answering aggregation queries in a secure system model Proceedings of the 33rd international conference on Very large data bases, (519-530)
- Bhandari V and Vaidya N Capacity of multi-channel wireless networks with random (c, f) assignment Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (229-238)
- Neumann F, Sudholt D and Witt C Comparing variants of MMAS ACO algorithms on pseudo-boolean functions Proceedings of the 2007 international conference on Engineering stochastic local search algorithms: designing, implementing and analyzing effective heuristics, (61-75)
- Brevier G, Rizzi R and Vialette S Pattern matching in protein-protein interaction graphs Proceedings of the 16th international conference on Fundamentals of Computation Theory, (137-148)
- Clementi A, Pasquale F, Monti A and Silvestri R Communication in dynamic radio networks Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (205-214)
- Gfeller B and Vicari E A randomized distributed algorithm for the maximal independent set problem in growth-bounded graphs Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (53-60)
- Cysouw M On the probability distribution of typological frequencies Proceedings of the 10th and 11th Biennial conference on The mathematics of language, (29-35)
- Jansen T and Theile M Stability in the self-organized evolution of networks Proceedings of the 9th annual conference on Genetic and evolutionary computation, (931-938)
- Peters J Toward Approximate Adaptive Learning Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms, (57-68)
- Lin Y, Liang B and Li B Performance modeling of network coding in epidemic routing Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, (67-74)
- Dumitrescu A, Suzuki I and Zylinski P Offline variants of the "lion and man" problem Proceedings of the twenty-third annual symposium on Computational geometry, (102-111)
- Lin T and Lee D (2007). Randomized algorithm for the sum selection problem, Theoretical Computer Science, 377:1-3, (151-156), Online publication date: 25-May-2007.
- Guang Tan and Jarvis S Stochastic Analysis and Improvement of the Reliability of DHT-Based Multicast Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2198-2206)
- Yunfeng Lin , Ben Liang and Baochun Li Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1658-1666)
- Nath S and Gibbons P Communicating via fireflies Proceedings of the 6th international conference on Information processing in sensor networks, (440-449)
- Beimel A, Hallak R and Nissim K Private approximation of clustering and vertex cover Proceedings of the 4th conference on Theory of cryptography, (383-403)
- Bonomi F, Mitzenmacher M, Panigrah R, Singh S and Varghese G Beyond bloom filters Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (315-326)
- Levieil É and Fouque P An improved LPN algorithm Proceedings of the 5th international conference on Security and Cryptography for Networks, (348-359)
- Bonomi F, Mitzenmacher M, Panigrah R, Singh S and Varghese G (2006). Beyond bloom filters, ACM SIGCOMM Computer Communication Review, 36:4, (315-326), Online publication date: 11-Aug-2006.
- Chockler H, Farchi E, Glazberg Z, Godlin B, Nir-Buchbinder Y and Rabinovitz I Formal verification of concurrent software Proceedings of the 2006 workshop on Parallel and distributed systems: testing and debugging, (11-22)
- Gudmundsson J and Smid M On spanners of geometric graphs Proceedings of the 10th Scandinavian conference on Algorithm Theory, (388-399)
- Rusmevichientong P and Williamson D An adaptive algorithm for selecting profitable keywords for search-based advertising services Proceedings of the 7th ACM conference on Electronic commerce, (260-269)
- Zhao Y, Zhang C and Zhang S Efficient Frequent Itemsets Mining by Sampling Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006, (112-117)
- Kirsch A and Mitzenmacher M Distance-sensitive bloom filters Proceedings of the Meeting on Algorithm Engineering & Expermiments, (41-50)
- Anwar A, Halabi T and Zulkernine M A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment, ACM Journal on Autonomous Transportation Systems, 0:0
- Cohen R and Cassuto Y Placement and read algorithms for high throughput in coded network switches 2016 IEEE International Symposium on Information Theory (ISIT), (250-254)
- Yan W, Tehranipoor F and Chandy J A novel way to authenticate untrusted Integrated Circuits 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (132-138)
- Mourad S and Tewfik A Real-time data selection and ordering for cognitive bias mitigation 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4393-4397)
- Zinkus M, Khosmood F and DeBruhl B PIDIoT: Probabilistic Intrusion Detection for the Internet-of-Things 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Index Terms
- Probability and Computing: Randomized Algorithms and Probabilistic Analysis
Recommendations
Computing Expected Runtimes for Constant Probability Programs
Automated Deduction – CADE 27AbstractWe introduce the class of constant probability (CP) programs and show that classical results from probability theory directly yield a simple decision procedure for (positive) almost sure termination of programs in this class. Moreover, ...
A Summary on Fuzzy Probability Theory
GRC '10: Proceedings of the 2010 IEEE International Conference on Granular ComputingFuzzy probability theory is an extension of probability theory to dealing with mixed probabilistic/non-probabilistic uncertainty. It provides a theoretical basis to model uncertainty which is only partly characterized by randomness and defies a pure ...
Uncertainty about probability: a reconciliation with the subjectivist viewpoint
The use of probability distributions to represent uncertainty about probabilities (rather than events) has long been a subject of controversy among theorists. Many have concluded that it is inherently meaningless to be uncertain about a probability, ...