Abstract
No abstract available.
Cited By
- Liu J (2023). A Few Interactions Improve Distributed Nonparametric Estimation, Optimally, IEEE Transactions on Information Theory, 69:12, (7867-7886), Online publication date: 1-Dec-2023.
- Khadiev K, Khadieva A and Knop A (2023). Exponential separation between quantum and classical ordered binary decision diagrams, reordering method and hierarchies, Natural Computing: an international journal, 22:4, (723-736), Online publication date: 1-Dec-2023.
- Bishnu A, Ghosh A, Kolay S, Mishra G and Saurabh S (2023). Small Vertex Cover Helps in Fixed-Parameter Tractability of Graph Deletion Problems over Data Streams, Theory of Computing Systems, 67:6, (1241-1267), Online publication date: 1-Dec-2023.
- Dahiya Y and Mahajan M (2023). On (simple) decision tree rank, Theoretical Computer Science, 978:C, Online publication date: 2-Nov-2023.
- Bishnu A, Ghosh A, Kolay S, Mishra G and Saurabh S (2023). Almost optimal query algorithm for hitting set using a subset query, Journal of Computer and System Sciences, 137:C, (50-65), Online publication date: 1-Nov-2023.
- Hajiaghaei Shanjani S and King V (2023). Communication costs in a geometric communication network, Theoretical Computer Science, 977:C, Online publication date: 25-Oct-2023.
- Assadi S (2023). Recent Advances in Multi-Pass Graph Streaming Lower Bounds, ACM SIGACT News, 54:3, (48-75), Online publication date: 7-Sep-2023.
- Cheung T, Hatami H, Hosseini K and Shirley M Separation of the Factorization Norm and Randomized Communication Complexity Proceedings of the conference on Proceedings of the 38th Computational Complexity Conference, (1-16)
- Chen X, Jiang S and Krauthgamer R Streaming Euclidean Max-Cut: Dimension vs Data Reduction Proceedings of the 55th Annual ACM Symposium on Theory of Computing, (170-182)
- Halldórsson M and Nolin A (2023). Superfast coloring in CONGEST via efficient color sampling, Theoretical Computer Science, 948:C, Online publication date: 28-Feb-2023.
- Davis B, Hatami H, Pires W, Tao R and Usmani H (2022). On public-coin zero-error randomized communication complexity, Information Processing Letters, 178:C, Online publication date: 1-Nov-2022.
- Li Y (2022). Trading information complexity for error II, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
- Haviv I and Parnas M (2022). Upper bounds on the Boolean rank of Kronecker products, Discrete Applied Mathematics, 318:C, (82-96), Online publication date: 15-Sep-2022.
- Weinberg S and Zhou Z Optimal Multi-Dimensional Mechanisms are not Locally-Implementable Proceedings of the 23rd ACM Conference on Economics and Computation, (875-896)
- Fleming N, Pankratov D, Pitassi T and Robere R (2022). Random -CNFs are Hard for Cutting Planes, Journal of the ACM, 69:3, (1-32), Online publication date: 30-Jun-2022.
- Patt-Shamir B and Perry M (2022). Proof-labeling schemes, Theoretical Computer Science, 923:C, (179-195), Online publication date: 26-Jun-2022.
- Kovács R On Minimally Non-firm Binary Matrices Combinatorial Optimization, (76-88)
- Aprile M (2022). Extended formulations for matroid polytopes through randomized protocols, Operations Research Letters, 50:2, (145-149), Online publication date: 1-Mar-2022.
- Lin X, Wei Z and Yao P (2022). Quantum and Classical Hybrid Generations for Classical Correlations, IEEE Transactions on Information Theory, 68:1, (302-310), Online publication date: 1-Jan-2022.
- Watanabe S (2022). Minimax Converse for Identification via Channels, IEEE Transactions on Information Theory, 68:1, (25-34), Online publication date: 1-Jan-2022.
- Kabanets V, Koroth S, Lu Z, Myrisiotis D and Oliveira I (2021). Algorithms and Lower Bounds for De Morgan Formulas of Low-Communication Leaf Gates, ACM Transactions on Computation Theory, 13:4, (1-37), Online publication date: 31-Dec-2022.
- Becker F, Montealegre P, Rapaport I and Todinca I (2022). The role of randomness in the broadcast congested clique model, Information and Computation, 281:C, Online publication date: 1-Dec-2021.
- Abboud A, Censor-Hillel K, Khoury S and Paz A (2021). Smaller Cuts, Higher Lower Bounds, ACM Transactions on Algorithms, 17:4, (1-40), Online publication date: 31-Oct-2021.
- Mihajlin I and Smal A Toward better depth lower bounds Proceedings of the 36th Computational Complexity Conference
- Hirahara S, Ilango R and Loff B Hardness of constant-round communication complexity Proceedings of the 36th Computational Complexity Conference
- Itsykson D and Riazanov A Proof complexity of natural formulas via communication arguments Proceedings of the 36th Computational Complexity Conference
- Linial N and Shraibman A An improved protocol for the exactly-N problem* Proceedings of the 36th Computational Complexity Conference
- Ball M, Goldreich O and Malkin T Communication complexity with defective randomness Proceedings of the 36th Computational Complexity Conference
- Gál A and Syed R Upper Bounds on Communication in Terms of Approximate Rank Computer Science – Theory and Applications, (116-130)
- Konrad C Frequent Elements with Witnesses in Data Streams Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (83-95)
- Rubinstein A, Saxena R, Thomas C, Weinberg S and Zhao J Exponential communication separations between notions of selfishness Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (947-960)
- Dobzinski S and Ron S The communication complexity of payment computation Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (933-946)
- Briceño R and Rapaport I (2021). Communication complexity meets cellular automata: Necessary conditions for intrinsic universality, Natural Computing: an international journal, 20:2, (307-320), Online publication date: 1-Jun-2021.
- Vyalyi M (2021). Counting the Number of Perfect Matchings, and Generalized Decision Trees, Problems of Information Transmission, 57:2, (143-160), Online publication date: 1-Apr-2021.
- Fiorini S, Macchia M and Pashkovich K (2021). Bounds on the Number of 2-Level Polytopes, Cones, and Configurations, Discrete & Computational Geometry, 65:3, (587-600), Online publication date: 1-Apr-2021.
- Feuilloley L, Fraigniaud P, Hirvonen J, Paz A and Perry M (2021). Redundancy in distributed proofs, Distributed Computing, 34:2, (113-132), Online publication date: 1-Apr-2021.
- Applebaum B and Vasudevan P (2021). Placing Conditional Disclosure of Secrets in the Communication Complexity Universe, Journal of Cryptology, 34:2, Online publication date: 1-Apr-2021.
- Foerster K, Korhonen J, Paz A, Rybicki J and Schmid S (2021). Input-Dynamic Distributed Algorithms for Communication Networks, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5:1, (1-33), Online publication date: 18-Feb-2021.
- Dementiev Y, Ignatiev A, Sidelnik V, Smal A and Ushakov M New Bounds on the Half-Duplex Communication Complexity SOFSEM 2021: Theory and Practice of Computer Science, (233-248)
- Nisan N The demand query model for bipartite matching Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (592-599)
- Hajiaghaei Shanjani S and King V Communication Costs in a Geometric Communication Network Proceedings of the 22nd International Conference on Distributed Computing and Networking, (36-45)
- Haviv I and Parnas M (2021). Upper Bounds on the Boolean Rank of Kronecker Products, Procedia Computer Science, 195:C, (172-180), Online publication date: 1-Jan-2021.
- Watson T (2020). A ZPPNP[1] Lifting Theorem, ACM Transactions on Computation Theory, 12:4, (1-20), Online publication date: 1-Dec-2020.
- Podolskii V and Sherstov A (2020). Inner Product and Set Disjointness, ACM Transactions on Computation Theory, 12:4, (1-28), Online publication date: 1-Dec-2020.
- Acharya J, Canonne C and Tyagi H (2020). Inference Under Information Constraints II: Communication Constraints and Shared Randomness, IEEE Transactions on Information Theory, 66:12, (7856-7877), Online publication date: 1-Dec-2020.
- Abboud A, Censor-Hillel K, Khoury S and Lenzen C (2020). Fooling views: a new lower bound technique for distributed computations under congestion, Distributed Computing, 33:6, (545-559), Online publication date: 1-Dec-2020.
- Huang Z, Radunovic B, Vojnovic M and Zhang Q (2020). Communication complexity of approximate maximum matching in the message-passing model, Distributed Computing, 33:6, (515-531), Online publication date: 1-Dec-2020.
- Czumaj A and Konrad C (2019). Detecting cliques in CONGEST networks, Distributed Computing, 33:6, (533-543), Online publication date: 1-Dec-2020.
- Narayanan V, Prabhakaran M and Prabhakaran V Zero-Communication Reductions Theory of Cryptography, (274-304)
- Mathieu C and de Rougemont M Large Very Dense Subgraphs in a Stream of Edges Proceedings of the 2020 ACM-IMS on Foundations of Data Science Conference, (107-117)
- Chattopadhyay A, Mande N and Sherif S (2020). The Log-Approximate-Rank Conjecture Is False, Journal of the ACM, 67:4, (1-28), Online publication date: 31-Aug-2020.
- Bar-Yehuda R, Censor-Hillel K, Maus Y, Pai S and Pemmaraju S Distributed Approximation on Power Graphs Proceedings of the 39th Symposium on Principles of Distributed Computing, (501-510)
- Efron Y, Grossman O and Khoury S Beyond Alice and Bob: Improved Inapproximability for Maximum Independent Set in CONGEST Proceedings of the 39th Symposium on Principles of Distributed Computing, (511-520)
- Gavinsky D (2020). Entangled Simultaneity Versus Classical Interactivity in Communication Complexity, IEEE Transactions on Information Theory, 66:7, (4641-4651), Online publication date: 1-Jul-2020.
- Applebaum B, Holenstein T, Mishra M and Shayevitz O (2019). The Communication Complexity of Private Simultaneous Messages, Revisited, Journal of Cryptology, 33:3, (917-953), Online publication date: 1-Jul-2020.
- Dinur I On the Streaming Indistinguishability of a Random Permutation and a Random Function Advances in Cryptology – EUROCRYPT 2020, (433-460)
- Censor-Hillel K, Paz A and Perry M (2020). Approximate proof-labeling schemes, Theoretical Computer Science, 811:C, (112-124), Online publication date: 2-Apr-2020.
- Pandurangan G, Peleg D and Scquizzato M (2020). Message lower bounds via efficient network synchronization, Theoretical Computer Science, 810:C, (82-95), Online publication date: 2-Mar-2020.
- Fischer O, Oshman R and Zwick U (2020). Public vs. private randomness in simultaneous multi-party communication complexity, Theoretical Computer Science, 810:C, (72-81), Online publication date: 2-Mar-2020.
- Pandurangan G, Robinson P and Scquizzato M (2019). A Time- and Message-Optimal Distributed Algorithm for Minimum Spanning Trees, ACM Transactions on Algorithms, 16:1, (1-27), Online publication date: 31-Jan-2020.
- Chatterjee S, Pandurangan G and Pham N Distributed MST Proceedings of the 21st International Conference on Distributed Computing and Networking, (1-10)
- Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
- Mandal D, Procaccia A, Shah N and Woodruff D Efficient and thrifty voting by any means necessary Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7180-7191)
- Chattopadhyay A, Koucký M, Loff B and Mukhopadhyay S (2019). Simulation Theorems via Pseudo-random Properties, Computational Complexity, 28:4, (617-659), Online publication date: 1-Dec-2019.
- Corrigan-Gibbs H and Kogan D The Function-Inversion Problem: Barriers and Opportunities Theory of Cryptography, (393-421)
- Terrier V (2019). Communication complexity tools on recognizable picture languages, Theoretical Computer Science, 795:C, (194-203), Online publication date: 26-Nov-2019.
- S. K, Laekhanukit B and Manurangsi P (2019). On the Parameterized Complexity of Approximating Dominating Set, Journal of the ACM, 66:5, (1-38), Online publication date: 28-Sep-2019.
- Viola E (2019). Guest Column, ACM SIGACT News, 50:3, (52-74), Online publication date: 24-Sep-2019.
- Banerjee S and Tyagi H Practical Universal Data Exchange using Polar Codes 2019 IEEE Information Theory Workshop (ITW), (1-5)
- Shraibman A (2019). Nondeterministic communication complexity with help and graph functions, Theoretical Computer Science, 782:C, (1-10), Online publication date: 23-Aug-2019.
- Banerjee S and Bhore S Algorithm and Hardness Results on Liar’s Dominating Set and -tuple Dominating Set Combinatorial Algorithms, (48-60)
- Chattopadhyay A, Lovett S and Vinyals M Equality alone does not simulate randomness Proceedings of the 34th Computational Complexity Conference, (1-11)
- Bacrach N, Censor-Hillel K, Dory M, Efron Y, Leitersdorf D and Paz A Hardness of Distributed Optimization Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (238-247)
- Pai S and Pemmaraju S Connectivity Lower Bounds in Broadcast Congested Clique Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (256-258)
- Barnes L, Han Y and Özgür A Fisher Information for Distributed Estimation under a Blackboard Communication Protocol 2019 IEEE International Symposium on Information Theory (ISIT), (2704-2708)
- Kerenidis I, Rosén A and Urrutia F (2019). Multi-Party Protocols, Information Complexity and Privacy, ACM Transactions on Computation Theory, 11:2, (1-29), Online publication date: 30-Jun-2019.
- Dinesh K, Koroth S and Sarma J (2019). Characterization and Lower Bounds for Branching Program Size using Projective Dimension, ACM Transactions on Computation Theory, 11:2, (1-22), Online publication date: 30-Jun-2019.
- Grandjean É and Grente T Descriptive complexity for minimal time of cellular automata Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
- Guang X, Yeung R, Yang S and Li C (2019). Improved Upper Bound on the Network Function Computing Capacity, IEEE Transactions on Information Theory, 65:6, (3790-3811), Online publication date: 1-Jun-2019.
- Fraigniaud P, Patt-Shamir B and Perry M (2019). Randomized proof-labeling schemes, Distributed Computing, 32:3, (217-234), Online publication date: 1-Jun-2019.
- Casteigts A, Métivier Y, Robson J and Zemmari A (2019). Deterministic Leader Election Takes $$\Theta (D + \log n)$$?(D+logn) Bit Rounds, Algorithmica, 81:5, (1901-1920), Online publication date: 1-May-2019.
- Kolay S, Panolan F and Saurabh S (2019). Communication Complexity and Graph Families, ACM Transactions on Computation Theory, 11:2, (1-28), Online publication date: 2-Apr-2019.
- Shitov Y (2019). Euclidean Distance Matrices and Separations in Communication Complexity Theory, Discrete & Computational Geometry, 61:3, (653-660), Online publication date: 1-Apr-2019.
- Tell R (2019). Property Testing Lower Bounds via a Generalization of Randomized Parity Decision Trees, Theory of Computing Systems, 63:3, (418-449), Online publication date: 1-Apr-2019.
- Kol G, Moran S, Shpilka A and Yehudayoff A (2019). Approximate Nonnegative Rank is Equivalent to the Smooth Rectangle Bound, Computational Complexity, 28:1, (1-25), Online publication date: 1-Mar-2019.
- Göös M, Kamath P, Pitassi T and Watson T (2019). Query-to-Communication Lifting for P NP, Computational Complexity, 28:1, (113-144), Online publication date: 1-Mar-2019.
- Bhattacharyya A, Dey P and Woodruff D (2018). An Optimal Algorithm for ℓ1-Heavy Hitters in Insertion Streams and Related Problems, ACM Transactions on Algorithms, 15:1, (1-27), Online publication date: 25-Jan-2019.
- Shraibman A (2018). A note on multiparty communication complexity and the Hales–Jewett theorem, Information Processing Letters, 139:C, (44-48), Online publication date: 1-Nov-2018.
- Boczkowski L, Kerenidis I and Magniez F (2018). Streaming Communication Protocols, ACM Transactions on Computation Theory, 10:4, (1-21), Online publication date: 17-Oct-2018.
- Pandurangan G, Robinson P and Scquizzato M (2018). Fast Distributed Algorithms for Connectivity and MST in Large Graphs, ACM Transactions on Parallel Computing, 5:1, (1-22), Online publication date: 19-Sep-2018.
- Ghazi B, Komargodski I, Kothari P and Sudan M (2018). Communication with Contextual Uncertainty, Computational Complexity, 27:3, (463-509), Online publication date: 1-Sep-2018.
- Dinur I and Meir O (2018). Toward the KRW Composition Conjecture, Computational Complexity, 27:3, (375-462), Online publication date: 1-Sep-2018.
- Behera S, Gayen S, Deogun J and Vinodchandran N KmerEstimate Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics, (438-447)
- Censor-Hillel K and Dory M Distributed Spanner Approximation Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, (139-148)
- Fischer O, Gonen T, Kuhn F and Oshman R Possibilities and Impossibilities for Distributed Subgraph Detection Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (153-162)
- Anastasiadis E and Deligkas A Heterogeneous Facility Location Games Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (623-631)
- Fried D, Legay A, Ouaknine J and Vardi M Sequential Relational Decomposition Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, (432-441)
- Lu H, Zhu W, Phan J, Ghiassi M, Fang Y, Hong Y and He X (2018). Fault-tolerant tile mining, Expert Systems with Applications: An International Journal, 101:C, (25-42), Online publication date: 1-Jul-2018.
- Watson T Communication complexity with small advantage Proceedings of the 33rd Computational Complexity Conference, (1-17)
- Kannan S, Mossel E, Sanyal S and Yaroslavtsev G Linear sketching over F2 Proceedings of the 33rd Computational Complexity Conference, (1-37)
- Braverman M and Kol G Interactive compression to external information Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (964-977)
- S. K, Laekhanukit B and Manurangsi P On the parameterized complexity of approximating dominating set Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (1283-1296)
- Han Y, Mukherjee P, Ozgur A and Weissman T Distributed Statistical Estimation of High-Dimensional and Nonparametric Distributions 2018 IEEE International Symposium on Information Theory (ISIT), (506-510)
- Censor-Hillel K, Kavitha T, Paz A and Yehudayoff A (2018). Distributed construction of purely additive spanners, Distributed Computing, 31:3, (223-240), Online publication date: 1-Jun-2018.
- Chen G, Zhu F and Heng P (2018). Large-Scale Bayesian Probabilistic Matrix Factorization with Memo-Free Distributed Variational Inference, ACM Transactions on Knowledge Discovery from Data, 12:3, (1-24), Online publication date: 27-Apr-2018.
- Gur T and Rothblum R (2018). Non-interactive proofs of proximity, Computational Complexity, 27:1, (99-207), Online publication date: 1-Mar-2018.
- Göös M, Jayram T, Pitassi T and Watson T (2018). Randomized Communication versus Partition Number, ACM Transactions on Computation Theory, 10:1, (1-20), Online publication date: 30-Jan-2018.
- Watson T (2018). Communication Complexity of Statistical Distance, ACM Transactions on Computation Theory, 10:1, (1-11), Online publication date: 30-Jan-2018.
- Assadi S and Khanna S Tight bounds on the round complexity of the distributed maximum coverage problem Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2412-2431)
- Chatterjee K, Dvořák W, Henzinger M and Loitzenbauer V Lower bounds for symbolic computation on graphs Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2341-2356)
- Braverman M, Mao J and Weinberg S On simultaneous two-player combinatorial auctions Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2256-2273)
- Curticapean R, Lindzey N and Nederlof J A tight lower bound for counting hamiltonian cycles via matrix rank Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1080-1099)
- Lokshtanov D, Mikhailin I, Paturi R and Pudlak P Beating brute force for (quantified) satisfiability of circuits of bounded treewidth Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (247-261)
- Brody J, Dziembowski S, Faust S and Pietrzak K Position-Based Cryptography and Multiparty Communication Complexity Theory of Cryptography, (56-81)
- Kubjas I and Skachek V Two-party function computation on the reconciled data 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (390-396)
- Braverman M, Gelles R, Mao J and Ostrovsky R (2017). Coding for Interactive Communication Correcting Insertions and Deletions, IEEE Transactions on Information Theory, 63:10, (6256-6270), Online publication date: 1-Oct-2017.
- Jakobsen S (2017). Information Theoretical Cryptogenography, Journal of Cryptology, 30:4, (1067-1115), Online publication date: 1-Oct-2017.
- Dagan Y, Filmus Y, Hatami H and Li Y Trading information complexity for error Proceedings of the 32nd Computational Complexity Conference, (1-59)
- Göös M, Kamath P, Pitassi T and Watson T Query-to-communication lifting for PNP Proceedings of the 32nd Computational Complexity Conference, (1-16)
- Tyagi H and Watanabe S (2017). Universal Multiparty Data Exchange and Secret Key Agreement, IEEE Transactions on Information Theory, 63:7, (4057-4074), Online publication date: 1-Jul-2017.
- Anshu A, Touchette D, Yao P and Yu N Exponential separation of quantum communication and classical information Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, (277-288)
- Gasarch W (2017). Open Problems Column, ACM SIGACT News, 48:2, (34-39), Online publication date: 12-Jun-2017.
- Huang Z, Lin X, Zhang W and Zhang Y Efficient Matrix Sketching over Distributed Data Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (347-359)
- Assadi S Tight Space-Approximation Tradeoff for the Multi-Pass Streaming Set Cover Problem Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (321-335)
- Lee T, Wei Z and Wolf R (2017). Some upper and lower bounds on PSD-rank, Mathematical Programming: Series A and B, 162:1-2, (495-521), Online publication date: 1-Mar-2017.
- Goswami M, Pagh R, Silvestri F and Sivertsen J Distance sensitive bloom filters without false negatives Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (257-269)
- Ganor A, Kol G and Raz R (2016). Exponential Separation of Information and Communication for Boolean Functions, Journal of the ACM, 63:5, (1-31), Online publication date: 20-Dec-2016.
- Métivier Y, Robson J and Zemmari A (2016). Randomised distributed MIS and colouring algorithms for rings with oriented edges in O ( log ź n ) bit rounds, Information and Computation, 251:C, (208-214), Online publication date: 1-Dec-2016.
- Babichenko Y (2016). Query Complexity of Approximate Nash Equilibria, Journal of the ACM, 63:4, (1-24), Online publication date: 8-Nov-2016.
- Brody J, Chakrabarti A, Kondapally R, Woodruff D and Yaroslavtsev G (2016). Certifying Equality With Limited Interaction, Algorithmica, 76:3, (796-845), Online publication date: 1-Nov-2016.
- Kol G, Moran S, Shpilka A and Yehudayoff A (2016). Direct Sum Fails for Zero-Error Average Communication, Algorithmica, 76:3, (782-795), Online publication date: 1-Nov-2016.
- Haramaty E and Sudan M (2016). Deterministic Compression with Uncertain Priors, Algorithmica, 76:3, (630-653), Online publication date: 1-Nov-2016.
- Göös M, Pitassi T and Watson T (2016). Zero-Information Protocols and Unambiguity in Arthur---Merlin Communication, Algorithmica, 76:3, (684-719), Online publication date: 1-Nov-2016.
- Jain R, Pereszlényi A and Yao P (2016). A Direct Product Theorem for Two-Party Bounded-Round Public-Coin Communication Complexity, Algorithmica, 76:3, (720-748), Online publication date: 1-Nov-2016.
- Braverman M and Weinstein O (2016). A Discrepancy Lower Bound for Information Complexity, Algorithmica, 76:3, (846-864), Online publication date: 1-Nov-2016.
- Antunes L, Buhrman H, Matos A, Souto A and Teixeira A (2016). Distinguishing Two Probability Ensembles with One Sample from each Ensemble, Theory of Computing Systems, 59:3, (517-531), Online publication date: 1-Oct-2016.
- Meunier P (2016). Unraveling simplicity in elementary cellular automata, Theoretical Computer Science, 641:C, (2-10), Online publication date: 16-Aug-2016.
- Braverman M, Garg A, Pankratov D and Weinstein O (2016). Information Lower Bounds via Self-Reducibility, Theory of Computing Systems, 59:2, (377-396), Online publication date: 1-Aug-2016.
- Montealegre P and Todinca I Brief Announcement Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (245-247)
- Bova S, Capelli F, Mengel S and Slivovsky F Knowledge compilation meets communication complexity Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1008-1014)
- Chakraborty D, Goldenberg E and Koucký M Streaming algorithms for embedding and computing edit distance in the low distance regime Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (712-725)
- Assadi S, Khanna S and Li Y Tight bounds for single-pass streaming complexity of the set cover problem Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (698-711)
- Yu H Cell-probe lower bounds for dynamic problems via a new communication model Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (362-374)
- Gavinsky D Entangled simultaneity versus classical interactivity in communication complexity Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (877-884)
- Ganor A, Kol G and Raz R Exponential separation of communication and external information Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (977-986)
- Bhattacharyya A, Dey P and Woodruff D An Optimal Algorithm for l1-Heavy Hitters in Insertion Streams and Related Problems Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (385-400)
- Felber D and Ostrovsky R Variability in Data Streams Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (251-260)
- Tsang H, Xie N and Zhang S Fourier Sparsity of GF2 Polynomials Proceedings of the 11th International Computer Science Symposium on Computer Science --- Theory and Applications - Volume 9691, (409-424)
- Chattopadhyay E and Zuckerman D New extractors for interleaved sources Proceedings of the 31st Conference on Computational Complexity, (1-28)
- Dinur I and Meir O Toward the KRW composition conjecture Proceedings of the 31st Conference on Computational Complexity, (1-51)
- Roughgarden T (2016). Communication Complexity for Algorithm Designers, Foundations and Trends® in Theoretical Computer Science, 11:3–4, (217-404), Online publication date: 1-May-2016.
- Lovett S (2016). Communication is Bounded by Root of Rank, Journal of the ACM, 63:1, (1-9), Online publication date: 30-Mar-2016.
- Barhum K and Hromkoviăź J On the Power of Laconic Advice in Communication Complexity Proceedings of the 42nd International Conference on SOFSEM 2016: Theory and Practice of Computer Science - Volume 9587, (161-170)
- Cummings R, Ligett K, Radhakrishnan J, Roth A and Wu Z Coordination Complexity Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (281-290)
- Ghazi B, Komargodski I, Kothari P and Sudan M Communication with contextual uncertainty Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (2072-2085)
- Ghazi B, Kamath P and Sudan M Communication complexity of permutation-invariant functions Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1902-1921)
- Chakrabarti A and Wirth A Incidence geometries and the pass complexity of semi-streaming set cover Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1365-1373)
- Chitnis R, Cormode G, Esfandiari H, Hajiaghayi M, McGregor A, Monemizadeh M and Vorotnikova S Kernelization via sampling with applications to finding matchings and related problems in dynamic graph streams Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1326-1344)
- Ambainis A, Belovs A, Regev O and de Wolf R Efficient quantum algorithms for (gapped) group testing and junta testing Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (903-922)
- Miles E and Viola E (2015). Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs, Journal of the ACM, 62:6, (1-29), Online publication date: 10-Dec-2015.
- Viola E (2015). The communication complexity of addition, Combinatorica, 35:6, (703-747), Online publication date: 1-Dec-2015.
- Ergun F and Jowhari H (2015). On the monotonicity of a data stream, Combinatorica, 35:6, (641-653), Online publication date: 1-Dec-2015.
- Kalai Y and Komargodski I Compressing Communication in Distributed Protocols Proceedings of the 29th International Symposium on Distributed Computing - Volume 9363, (467-479)
- Faenza Y, Fiorini S, Grappe R and Tiwary H (2015). Extended formulations, nonnegative factorizations, and randomized communication protocols, Mathematical Programming: Series A and B, 153:1, (75-94), Online publication date: 1-Oct-2015.
- Boyar J and Find M (2015). Cancellation-free circuits in unbounded and bounded depth, Theoretical Computer Science, 590:C, (17-26), Online publication date: 26-Jul-2015.
- Dunin-Keplicz B and Strachocka A Tractable inquiry in information-rich environments Proceedings of the 24th International Conference on Artificial Intelligence, (53-60)
- Braverman M and Oshman R On Information Complexity in the Broadcast Model Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (355-364)
- Baruch M, Fraigniaud P and Patt-Shamir B Randomized Proof-Labeling Schemes Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (315-324)
- Beame P and Liew V New limits for knowledge compilation and applications to exact model counting Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, (131-140)
- Ambainis A, Gasarch W, Srinivasan A and Utis A (2015). Lower Bounds on the Deterministic and Quantum Communication Complexity of Hamming-Distance Problems, ACM Transactions on Computation Theory, 7:3, (1-10), Online publication date: 9-Jul-2015.
- Jain R (2015). New Strong Direct Product Results in Communication Complexity, Journal of the ACM, 62:3, (1-27), Online publication date: 30-Jun-2015.
- Oliveira I and Santhanam R Majority is incompressible by AC0[p] circuits Proceedings of the 30th Conference on Computational Complexity, (124-157)
- Ramamoorthy S and Rao A How to compress asymmetric communication Proceedings of the 30th Conference on Computational Complexity, (102-123)
- Rao A and Yehudayoff A Simplified lower bounds on the multiparty communication complexity of disjointness Proceedings of the 30th Conference on Computational Complexity, (88-101)
- Göös M, Lovett S, Meka R, Watson T and Zuckerman D Rectangles Are Nonnegative Juntas Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (257-266)
- Ganor A, Kol G and Raz R Exponential Separation of Information and Communication for Boolean Functions Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (557-566)
- Gowers T and Viola E The communication complexity of interleaved group products Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (351-360)
- Yan Y, Zhang J, Huang B, Sun X, Mu J, Zhang Z and Moscibroda T Distributed Outlier Detection using Compressive Sensing Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (3-16)
- Van Gucht D, Williams R, Woodruff D and Zhang Q The Communication Complexity of Distributed Set-Joins with Applications to Matrix Multiplication Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (199-212)
- Martens W, Neven F and Vansummeren S SCULPT Proceedings of the 24th International Conference on World Wide Web, (702-720)
- Fiorini S, Massar S, Pokutta S, Tiwary H and de Wolf R (2015). Exponential Lower Bounds for Polytopes in Combinatorial Optimization, Journal of the ACM, 62:2, (1-23), Online publication date: 6-May-2015.
- Agarwal P and Sharathkumar R (2015). Streaming Algorithms for Extent Problems in High Dimensions, Algorithmica, 72:1, (83-98), Online publication date: 1-May-2015.
- Shigeta M and Amano K (2015). Ordered biclique partitions and communication complexity problems, Discrete Applied Mathematics, 184:C, (248-252), Online publication date: 31-Mar-2015.
- Braverman M and Mao J Simulating Noisy Channel Interaction Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (21-30)
- Göös M, Pitassi T and Watson T Zero-Information Protocols and Unambiguity in Arthur-Merlin Communication Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (113-122)
- Chitnis R, Cormode G, Hajiaghayi M and Monemizadeh M Parameterized streaming Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1234-1251)
- Gonczarowski Y, Nisan N, Ostrovsky R and Rosenbaum W A stable marriage requires communication Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1003-1017)
- Klauck H, Nanongkai D, Pandurangan G and Robinson P Distributed computation of large-scale graph problems Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (391-410)
- Dobzinski S, Fu H and Kleinberg R On the complexity of computing an equilibrium in combinatorial auctions Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (110-122)
- Sherstov A (2014). Communication Lower Bounds Using Directional Derivatives, Journal of the ACM, 61:6, (1-71), Online publication date: 17-Dec-2014.
- Woodruff D (2014). Sketching as a Tool for Numerical Linear Algebra, Foundations and Trends® in Theoretical Computer Science, 10:1–2, (1-157), Online publication date: 29-Oct-2014.
- Chakrabarti A, Cormode G, Mcgregor A and Thaler J (2014). Annotations in Data Streams, ACM Transactions on Algorithms, 11:1, (1-30), Online publication date: 28-Oct-2014.
- Brody J, Chakrabarti A, Kondapally R, Woodruff D and Yaroslavtsev G Beyond set disjointness Proceedings of the 2014 ACM symposium on Principles of distributed computing, (106-113)
- Drucker A, Kuhn F and Oshman R On the power of the congested clique model Proceedings of the 2014 ACM symposium on Principles of distributed computing, (367-376)
- Elkin M, Klauck H, Nanongkai D and Pandurangan G Can quantum communication speed up distributed computation? Proceedings of the 2014 ACM symposium on Principles of distributed computing, (166-175)
- Zhao Y, Yu H and Chen B Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions Proceedings of the 2014 ACM symposium on Principles of distributed computing, (416-426)
- Lenzen C and Patt-Shamir B Improved distributed steiner forest construction Proceedings of the 2014 ACM symposium on Principles of distributed computing, (262-271)
- Ben-Sasson E, Lovett S and Ron-Zewi N (2014). An Additive Combinatorics Approach Relating Rank to Communication Complexity, Journal of the ACM, 61:4, (1-18), Online publication date: 1-Jul-2014.
- Xu B Boosting the basic counting on distributed streams Proceedings of the 26th International Conference on Scientific and Statistical Database Management, (1-12)
- Feigenbaum J, Jaggard A and Schapira M (2014). Approximate Privacy, ACM Transactions on Algorithms, 10:3, (1-38), Online publication date: 1-Jun-2014.
- Göös M and Pitassi T Communication lower bounds via critical block sensitivity Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (847-856)
- Babichenko Y Query complexity of approximate nash equilibria Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (535-544)
- Lovett S Communication is bounded by root of rank Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (842-846)
- Chen B, Yu H, Zhao Y and Gibbons P (2014). The Cost of Fault Tolerance in Multi-Party Communication Complexity, Journal of the ACM, 61:3, (1-64), Online publication date: 1-May-2014.
- Amano K (2014). Some improved bounds on communication complexity via new decomposition of cliques, Discrete Applied Mathematics, 166:C, (249-254), Online publication date: 31-Mar-2014.
- Zheng S, Gruska J and Qiu D On the State Complexity of Semi-quantum Finite Automata Proceedings of the 8th International Conference on Language and Automata Theory and Applications - Volume 8370, (601-612)
- Ada A, Chattopadhyay A, Cook S, Fontes L, Koucký M and Pitassi T (2014). The Hardness of Being Private, ACM Transactions on Computation Theory, 6:1, (1-24), Online publication date: 1-Mar-2014.
- Babichenko Y (2014). How long to Pareto efficiency?, International Journal of Game Theory, 43:1, (13-24), Online publication date: 1-Feb-2014.
- Kini D and Viswanathan M Probabilistic Automata for Safety LTL Specifications Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8318, (118-136)
- Kol G, Moran S, Shpilka A and Yehudayoff A Direct sum fails for zero error average communication Proceedings of the 5th conference on Innovations in theoretical computer science, (517-522)
- Haramaty E and Sudan M Deterministic compression with uncertain priors Proceedings of the 5th conference on Innovations in theoretical computer science, (377-386)
- Woodruff D and Zhang Q An optimal lower bound for distinct elements in the message passing model Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (718-733)
- Fawzi O, Hayden P and Sen P (2013). From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking, Journal of the ACM, 60:6, (1-61), Online publication date: 1-Nov-2013.
- Konrad C and Magniez F (2013). Validating XML documents in the streaming model with external memory, ACM Transactions on Database Systems, 38:4, (1-36), Online publication date: 1-Nov-2013.
- Woodruff D and Zhang Q When Distributed Computation Is Communication Expensive Proceedings of the 27th International Symposium on Distributed Computing - Volume 8205, (16-30)
- Métivier Y, Robson J, Saheb-Djahromi N and Zemmari A (2013). On the time and the bit complexity of distributed randomised anonymous ring colouring, Theoretical Computer Science, 502, (64-75), Online publication date: 1-Sep-2013.
- Boyar J and Find M Cancellation-Free circuits in unbounded and bounded depth Proceedings of the 19th international conference on Fundamentals of Computation Theory, (159-170)
- Peretz R (2013). Learning Cycle Length Through Finite Automata, Mathematics of Operations Research, 38:3, (526-534), Online publication date: 1-Aug-2013.
- Beame P, Koutris P and Suciu D Communication steps for parallel query processing Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGAI symposium on Principles of database systems, (273-284)
- Braverman M and Moitra A An information complexity approach to extended formulations Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (161-170)
- Braverman M, Garg A, Pankratov D and Weinstein O From information to exact communication Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (151-160)
- Jayram T and Woodruff D (2013). Optimal Bounds for Johnson-Lindenstrauss Transforms and Streaming Problems with Subconstant Error, ACM Transactions on Algorithms, 9:3, (1-17), Online publication date: 1-Jun-2013.
- Cormode G (2013). The continuous distributed monitoring model, ACM SIGMOD Record, 42:1, (5-14), Online publication date: 1-May-2013.
- Briët J, Buhrman H, Lee T and Vidick T (2013). Multipartite entanglement in XOR games, Quantum Information & Computation, 13:3-4, (334-360), Online publication date: 1-Mar-2013.
- Molinaro M, Woodruff D and Yaroslavtsev G Beating the direct sum theorem in communication complexity with implications for sketching Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (1738-1756)
- Tamm U Multiparty communication complexity of vector---valued and sum---type functions Information Theory, Combinatorics, and Search Theory, (451-462)
- De Rougemont M and Cao P Approximate answers to OLAP queries on streaming data warehouses Proceedings of the fifteenth international workshop on Data warehousing and OLAP, (121-128)
- Goldberg P and Pastink A On the Communication Complexity of Approximate Nash Equilibria Proceedings of the 5th International Symposium on Algorithmic Game Theory - Volume 7615, (192-203)
- Jowhari H Efficient communication protocols for deciding edit distance Proceedings of the 20th Annual European conference on Algorithms, (648-658)
- Montoya J Computing with sand Proceedings of the 11th international conference on Unconventional Computation and Natural Computation, (174-185)
- Andoni A and Krauthgamer R (2012). The smoothed complexity of edit distance, ACM Transactions on Algorithms, 8:4, (1-25), Online publication date: 1-Sep-2012.
- Miles E and Viola E Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (68-85)
- Drucker A, Kuhn F and Oshman R The communication complexity of distributed task allocation Proceedings of the 2012 ACM symposium on Principles of distributed computing, (67-76)
- Chen B, Yu H, Zhao Y and Gibbons P The cost of fault tolerance in multi-party communication complexity Proceedings of the 2012 ACM symposium on Principles of distributed computing, (57-66)
- Halldórsson M, Sun X, Szegedy M and Wang C Streaming and communication complexity of clique approximation Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (449-460)
- Ada A, Chattopadhyay A, Fawzi O and Nguyen P The NOF multiparty communication complexity of composed functions Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (13-24)
- Hua N, Lall A, Li B and Xu J Towards optimal error-estimating codes through the lens of Fisher information analysis Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (125-136)
- Hua N, Lall A, Li B and Xu J (2012). Towards optimal error-estimating codes through the lens of Fisher information analysis, ACM SIGMETRICS Performance Evaluation Review, 40:1, (125-136), Online publication date: 7-Jun-2012.
- Service T and Adams J Communication complexity of approximating voting rules Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (593-602)
- Woodruff D and Zhang Q Tight bounds for distributed functional monitoring Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (941-960)
- Kayal N Affine projections of polynomials Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (643-662)
- Sherstov A The multiparty communication complexity of set disjointness Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (525-548)
- Braverman M Interactive information complexity Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (505-524)
- Huynh T and Nordstrom J On the virtue of succinct proofs Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (233-248)
- Fiorini S, Massar S, Pokutta S, Tiwary H and de Wolf R Linear vs. semidefinite extended formulations Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (95-106)
- Faenza Y, Fiorini S, Grappe R and Tiwary H Extended formulations, nonnegative factorizations, and randomized communication protocols Proceedings of the Second international conference on Combinatorial Optimization, (129-140)
- Konrad C and Magniez F Validating XML documents in the streaming model with external memory Proceedings of the 15th International Conference on Database Theory, (34-45)
- Goyal V, Kumar V, Lokam S and Mahmoody M On black-box reductions between predicate encryption schemes Proceedings of the 9th international conference on Theory of Cryptography, (440-457)
- Frischknecht S, Holzer S and Wattenhofer R Networks cannot compute their diameter in sublinear time Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1150-1162)
- Phillips J, Verbin E and Zhang Q Lower bounds for number-in-hand multiparty communication complexity, made easy Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (486-501)
- Cormode G, Garofalakis M, Haas P and Jermaine C (2012). Synopses for Massive Data, Foundations and Trends in Databases, 4:1–3, (1-294), Online publication date: 1-Jan-2012.
- Cojocaru L (2011). Trade-Offs Between Time, Space, Cooperation, and Communication Complexity for CD Grammar Systems, Fundamenta Informaticae, 107:4, (345-378), Online publication date: 1-Dec-2011.
- Comi M, DasGupta B, Schapira M and Srinivasan V On communication protocols that compute almost privately Proceedings of the 4th international conference on Algorithmic game theory, (44-56)
- Kuhn F and Oshman R The complexity of data aggregation in directed networks Proceedings of the 25th international conference on Distributed computing, (416-431)
- Schneider J and Wattenhofer R Trading bit, message, and time complexity of distributed algorithms Proceedings of the 25th international conference on Distributed computing, (51-65)
- Cormode G Continuous distributed monitoring Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing, (1-10)
- Cormode G, Thaler J and Yi K (2011). Verifying computations with streaming interactive proofs, Proceedings of the VLDB Endowment, 5:1, (25-36), Online publication date: 1-Sep-2011.
- Uchizawa K and Takimoto E Lower bounds for linear decision trees via an energy complexity argument Proceedings of the 36th international conference on Mathematical foundations of computer science, (568-579)
- Lovett S and Srinivasan S Correlation bounds for poly-size AC0 circuits with n1-o(1) symmetric gates Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (640-651)
- Chakrabarti A and Kondapally R Everywhere-tight information cost tradeoffs for augmented index Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (448-459)
- Brody J and Woodruff D Streaming algorithms with one-sided estimation Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (436-447)
- Smyth C (2011). Approximate Query Complexity, ACM Transactions on Computation Theory, 3:1, (1-11), Online publication date: 1-Aug-2011.
- Chevaleyre Y, Lang J, Maudet N and Monnot J Compilation and communication protocols for voting rules with a dynamic set of candidates Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge, (153-160)
- Harrow A, Montanaro A and Short A Limitations on quantum dimensionality reduction Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (86-97)
- Zhang S On the power of lower bound methods for one-way quantum communication complexity Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (49-60)
- Montanaro A (2011). A new exponential separation between quantum and classical one-way communication complexity, Quantum Information & Computation, 11:7-8, (574-591), Online publication date: 1-Jul-2011.
- Clifford R, Jalsenius M, Porat E and Sach B Space lower bounds for online pattern matching Proceedings of the 22nd annual conference on Combinatorial pattern matching, (184-196)
- Soto J and Telha C Jump number of two-directional orthogonal ray graphs Proceedings of the 15th international conference on Integer programming and combinatoral optimization, (389-403)
- Muthukrishnan S Theory of data stream computing Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (317-319)
- Nanongkai D, Das Sarma A and Pandurangan G A tight unconditional lower bound on distributed randomwalk computation Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (257-266)
- Fawzi O, Hayden P and Sen P From low-distortion norm embeddings to explicit uncertainty relations and efficient information locking Proceedings of the forty-third annual ACM symposium on Theory of computing, (773-782)
- Woodruff D Near-optimal private approximation protocols via a black box transformation Proceedings of the forty-third annual ACM symposium on Theory of computing, (735-744)
- Das Sarma A, Holzer S, Kor L, Korman A, Nanongkai D, Pandurangan G, Peleg D and Wattenhofer R Distributed verification and hardness of distributed approximation Proceedings of the forty-third annual ACM symposium on Theory of computing, (363-372)
- Braverman M and Rao A Towards coding for maximum errors in interactive communication Proceedings of the forty-third annual ACM symposium on Theory of computing, (159-166)
- Chakrabarti A and Regev O An optimal lower bound on the communication complexity of gap-hamming-distance Proceedings of the forty-third annual ACM symposium on Theory of computing, (51-60)
- Sherstov A Strong direct product theorems for quantum communication and query complexity Proceedings of the forty-third annual ACM symposium on Theory of computing, (41-50)
- Regev O and Klartag B Quantum one-way communication can be exponentially stronger than classical communication Proceedings of the forty-third annual ACM symposium on Theory of computing, (31-40)
- Locher T Finding heavy distinct hitters in data streams Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (299-308)
- Beimel A Secret-sharing schemes Proceedings of the Third international conference on Coding and cryptology, (11-46)
- Sołtys K The hardness of median in the synchronized bit communication model Proceedings of the 8th annual conference on Theory and applications of models of computation, (409-415)
- Leung M, Li Y and Zhang S Tight bounds on communication complexity of symmetric XOR functions in one-way and SMP models Proceedings of the 8th annual conference on Theory and applications of models of computation, (403-408)
- Brody J, Matulef K and Wu C Lower bounds for testing computability by small width OBDDs Proceedings of the 8th annual conference on Theory and applications of models of computation, (320-331)
- Das Sarma A, Lipton R and Nanongkai D (2011). Best-order streaming model, Theoretical Computer Science, 412:23, (2544-2555), Online publication date: 20-May-2011.
- Kaplan M and Laplante S (2011). Kolmogorov complexity and combinatorial methods in communication complexity, Theoretical Computer Science, 412:23, (2524-2535), Online publication date: 20-May-2011.
- Bollig B (2011). On the OBDD complexity of the most significant bit of integer multiplication, Theoretical Computer Science, 412:18, (1686-1695), Online publication date: 1-Apr-2011.
- Métivier Y, Robson J, Saheb-Djahromi N and Zemmari A (2011). An optimal bit complexity randomized distributed MIS algorithm, Distributed Computing, 23:5-6, (331-340), Online publication date: 1-Apr-2011.
- Bollig B (2011). Larger lower bounds on the OBDD complexity of integer multiplication, Information and Computation, 209:3, (333-343), Online publication date: 1-Mar-2011.
- Kayal N Efficient algorithms for some special cases of the polynomial equivalence problem Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1409-1421)
- Jayram T and Woodruff D Optimal bounds for Johnson-Lindenstrauss transforms and streaming problems with sub-constant error Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1-10)
- Bollig B and Gillé M Randomized OBDDs for the most significant bit of multiplication need exponential size Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (135-145)
- Zelke M (2011). Intractability of min- and max-cut in streaming graphs, Information Processing Letters, 111:3, (145-150), Online publication date: 1-Jan-2011.
- Yin Y (2010). Cell-Probe Proofs, ACM Transactions on Computation Theory, 2:1, (1-17), Online publication date: 1-Nov-2010.
- Grigorieva E, Herings P, Müller R and Vermeulen D (2010). On the Fastest Vickrey Algorithm, Algorithmica, 58:3, (566-590), Online publication date: 1-Nov-2010.
- Chattopadhyay A and Pitassi T (2010). The story of set disjointness, ACM SIGACT News, 41:3, (59-85), Online publication date: 3-Sep-2010.
- Brody J, Chakrabarti A, Regev O, Vidick T and De Wolf R Better gap-hamming lower bounds via better round elimination Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (476-489)
- Ablayev F and Ablayeva S (2010). A Communication Approach to the Superposition Problem, Fundamenta Informaticae, 104:3, (185-200), Online publication date: 1-Aug-2010.
- Jain R, Klauck H and Zhang S Depth-independent lower bounds on the communication complexity of read-once Boolean formulas Proceedings of the 16th annual international conference on Computing and combinatorics, (54-59)
- Rudra A and Uurtamo S Data stream algorithms for codeword testing Proceedings of the 37th international colloquium conference on Automata, languages and programming, (629-640)
- Lee T and Zhang S Composition theorems in communication complexity Proceedings of the 37th international colloquium conference on Automata, languages and programming, (475-489)
- Beimel A, Daniel S, Kushilevitz E and Weinreb E Choosing, agreeing, and eliminating in communication complexity Proceedings of the 37th international colloquium conference on Automata, languages and programming, (451-462)
- Aspnes J, Blais E, Demirbas M, O'Donnell R, Rudra A and Uurtamo S k+ decision trees Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities, (74-88)
- Hromkovič J Algorithmics – is there hope for a unified theory? Proceedings of the 5th international conference on Computer Science: theory and Applications, (181-194)
- Feigenbaum J, Jaggard A and Schapira M Approximate privacy Proceedings of the 11th ACM conference on Electronic commerce, (167-178)
- Kushilevitz E Communication complexity Proceedings of the 17th international conference on Structural Information and Communication Complexity, (1-1)
- Jayram T Information complexity Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (159-168)
- Braverman V and Ostrovsky R Zero-one frequency laws Proceedings of the forty-second ACM symposium on Theory of computing, (281-290)
- Beame P, Huynh T and Pitassi T Hardness amplification in proof complexity Proceedings of the forty-second ACM symposium on Theory of computing, (87-96)
- Klauck H A strong direct product theorem for disjointness Proceedings of the forty-second ACM symposium on Theory of computing, (77-86)
- Barak B, Braverman M, Chen X and Rao A How to compress interactive communication Proceedings of the forty-second ACM symposium on Theory of computing, (67-76)
- Zhang Z and Shi Y (2010). On the parity complexity measures of Boolean functions, Theoretical Computer Science, 411:26-28, (2612-2618), Online publication date: 1-Jun-2010.
- Tarui J (2010). Smallest formulas for the parity of 2 k variables are essentially unique, Theoretical Computer Science, 411:26-28, (2623-2627), Online publication date: 1-Jun-2010.
- Korman A, Kutten S and Peleg D (2010). Proof labeling schemes, Distributed Computing, 22:4, (215-233), Online publication date: 1-May-2010.
- Bollig B A larger lower bound on the OBDD complexity of the most significant bit of multiplication Proceedings of the 9th Latin American conference on Theoretical Informatics, (255-266)
- Li C and Dai H Towards efficient designs for in-network computing with noisy wireless channels Proceedings of the 29th conference on Information communications, (2008-2015)
- Agarwal P and Sharathkumar R Streaming algorithms for extent problems in high dimensions Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1481-1489)
- Do Ba K, Indyk P, Price E and Woodruff D Lower bounds for sparse recovery Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1190-1197)
- Kane D, Nelson J and Woodruff D On the exact space complexity of sketching and streaming small norms Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1161-1178)
- Buchfuhrer D, Dughmi S, Fu H, Kleinberg R, Mossel E, Papadimitriou C, Schapira M, Singer Y and Umans C Inapproximability for VCG-based combinatorial auctions Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (518-536)
- Harsha P, Jain R, McAllester D and Radhakrishnan J (2010). The communication complexity of correlation, IEEE Transactions on Information Theory, 56:1, (438-449), Online publication date: 1-Jan-2010.
- Dhulipala A, Fragouli C and Orlitsky A (2010). Silence-based communication, IEEE Transactions on Information Theory, 56:1, (350-366), Online publication date: 1-Jan-2010.
- Zhang S On the Tightness of the Buhrman-Cleve-Wigderson Simulation Proceedings of the 20th International Symposium on Algorithms and Computation, (434-440)
- Demetrescu C, Finocchi I and Ribichini A (2009). Trading off space for passes in graph streaming problems, ACM Transactions on Algorithms, 6:1, (1-17), Online publication date: 1-Dec-2009.
- Schweikardt N (2009). Machine models for query processing, ACM SIGMOD Record, 38:2, (18-28), Online publication date: 26-Oct-2009.
- David M, Pitassi T and Viola E (2009). Improved Separations between Nondeterministic and Randomized Multiparty Communication, ACM Transactions on Computation Theory, 1:2, (1-20), Online publication date: 1-Sep-2009.
- Yi K, Li F, Cormode G, Hadjieleftheriou M, Kollios G and Srivastava D (2009). Small synopses for group-by query verification on outsourced data streams, ACM Transactions on Database Systems, 34:3, (1-42), Online publication date: 1-Aug-2009.
- Hromkovi J, Petersen H and Schnitger G (2009). On the limits of the communication complexity technique for proving lower bounds on the size of minimal NFA's, Theoretical Computer Science, 410:30-32, (2972-2981), Online publication date: 1-Aug-2009.
- Wunderlich H (2009). On cover-structure graphs, Discrete Applied Mathematics, 157:15, (3289-3299), Online publication date: 1-Aug-2009.
- Chevaleyre Y, Lang J, Maudet N and Ravilly-Abadie G Compiling the votes of a subelectorate Proceedings of the 21st International Joint Conference on Artificial Intelligence, (97-102)
- Cormode G, Golab L, Flip K, McGregor A, Srivastava D and Zhang X Estimating the confidence of conditional functional dependencies Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (469-482)
- Jain R and Zhang S (2009). New bounds on classical and quantum one-way communication complexity, Theoretical Computer Science, 410:26, (2463-2477), Online publication date: 1-Jun-2009.
- Wu T, Cameron P and Riis S (2009). On the guessing number of shift graphs, Journal of Discrete Algorithms, 7:2, (220-226), Online publication date: 1-Jun-2009.
- Impagliazzo R, Kabanets V and Kolokolova A An axiomatic approach to algebrization Proceedings of the forty-first annual ACM symposium on Theory of computing, (695-704)
- Kushilevitz E and Weinreb E On the complexity of communication complexity Proceedings of the forty-first annual ACM symposium on Theory of computing, (465-474)
- Clarkson K and Woodruff D Numerical linear algebra in the streaming model Proceedings of the forty-first annual ACM symposium on Theory of computing, (205-214)
- Yves M, Robson J, Nasser S and Zemmari A An optimal bit complexity randomized distributed MIS algorithm (extended abstract) Proceedings of the 16th international conference on Structural Information and Communication Complexity, (323-337)
- Kaplan M and Laplante S Kolmogorov Complexity and Combinatorial Methods in Communication Complexity Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (261-270)
- Das Sarma A, Lipton R and Nanongkai D Best-Order Streaming Model Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (178-191)
- Woodruff D The average-case complexity of counting distinct elements Proceedings of the 12th International Conference on Database Theory, (284-295)
- Guha S Tight results for clustering and summarizing data streams Proceedings of the 12th International Conference on Database Theory, (268-275)
- Linial N and Shraibman A (2009). Learning complexity vs communication complexity, Combinatorics, Probability and Computing, 18:1-2, (227-245), Online publication date: 1-Mar-2009.
- Viola E (2009). Guest Column, ACM SIGACT News, 40:1, (27-44), Online publication date: 28-Feb-2009.
- Gopalan P and Radhakrishnan J Finding duplicates in a data stream Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (402-411)
- Hromkovič J and Schnitger G (2009). Lower bounds on the size of sweeping automata, Journal of Automata, Languages and Combinatorics, 14:1, (23-31), Online publication date: 1-Jan-2009.
- Lokam S (2009). Complexity Lower Bounds using Linear Algebra, Foundations and Trends® in Theoretical Computer Science, 4:1–2, (1-155), Online publication date: 1-Jan-2009.
- Ada A On the Non-deterministic Communication Complexity of Regular Languages Proceedings of the 12th international conference on Developments in Language Theory, (96-107)
- Hromkovič J and Schnitger G On the Hardness of Determining Small NFA's and of Proving Lower Bounds on Their Sizes Proceedings of the 12th international conference on Developments in Language Theory, (34-55)
- Broadbent A and Tapp A (2008). Can quantum mechanics help distributed computing?, ACM SIGACT News, 39:3, (67-76), Online publication date: 1-Sep-2008.
- David M, Pitassi T and Viola E Improved Separations between Nondeterministic and Randomized Multiparty Communication Proceedings of the 11th international workshop, APPROX 2008, and 12th international workshop, RANDOM 2008 on Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques, (371-384)
- Kuhn F, Locher T and Schmid S Distributed computation of the mode Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (15-24)
- Babaioff M, Blumrosen L, Naor M and Schapira M Informational overhead of incentive compatibility Proceedings of the 9th ACM conference on Electronic commerce, (88-97)
- Lahaie S and Parkes D On the communication requirements of verifying the VCG outcome Proceedings of the 9th ACM conference on Electronic commerce, (78-87)
- Lee T and Mittal R Product Theorems Via Semidefinite Programming Proceedings of the 35th international colloquium on Automata, Languages and Programming - Volume Part I, (674-685)
- Tani S, Nakanishi M and Yamashita S Multi-party Quantum Communication Complexity with Routed Messages Proceedings of the 14th annual international conference on Computing and Combinatorics, (180-190)
- Tarui J Smallest Formulas for Parity of 2k Variables Are Essentially Unique Proceedings of the 14th annual international conference on Computing and Combinatorics, (92-99)
- Venkatesan N, Agarwal T and Kumar P On the Average Case Communication Complexity for Detection in Sensor Networks Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems, (176-189)
- Barkol O, Ishai Y and Weinreb E Communication in the presence of replication Proceedings of the fortieth annual ACM symposium on Theory of computing, (661-670)
- Chakrabarti A, Cormode G and McGregor A Robust lower bounds for communication and stream computation Proceedings of the fortieth annual ACM symposium on Theory of computing, (641-650)
- Feldman V Evolvability from learning algorithms Proceedings of the fortieth annual ACM symposium on Theory of computing, (619-628)
- Jain R, Klauck H and Nayak A Direct product theorems for classical communication complexity via subdistribution bounds Proceedings of the fortieth annual ACM symposium on Theory of computing, (599-608)
- Gavinsky D Classical interaction cannot replace a quantum message Proceedings of the fortieth annual ACM symposium on Theory of computing, (95-102)
- Sherstov A The pattern matrix method for lower bounds on quantum communication Proceedings of the fortieth annual ACM symposium on Theory of computing, (85-94)
- Bollig B On the OBDD complexity of the most significant bit of integer multiplication Proceedings of the 5th international conference on Theory and applications of models of computation, (306-317)
- Katz J and Lindell A Aggregate message authentication codes Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, (155-169)
- Azimian K and Szegedy M Parallel repetition of the odd cycle game Proceedings of the 8th Latin American conference on Theoretical informatics, (676-686)
- Gruber H and Johannsen J Optimal lower bounds on regular expression size using communication complexity Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (273-286)
- Kilian J, Madeira A, Strauss M and Zheng X Fast private norm estimation and heavy hitters Proceedings of the 5th conference on Theory of cryptography, (176-193)
- Dinitz Y, Moran S and Rajsbaum S (2008). Bit complexity of breaking and achieving symmetry in chains and rings, Journal of the ACM, 55:1, (1-28), Online publication date: 1-Feb-2008.
- Ergun F and Jowhari H On distance to monotonicity and longest increasing subsequence of a data stream Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (730-736)
- Harvey N Matroid intersection, pointer chasing, and Young's seminormal representation of S Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (542-549)
- Petersen H Element distinctness and sorting on one-tape off-line turing machines Proceedings of the 34th conference on Current trends in theory and practice of computer science, (406-417)
- Bollig B, Range N and Wegener I Exact OBDD bounds for some fundamental functions Proceedings of the 34th conference on Current trends in theory and practice of computer science, (174-185)
- Bille P, Pagh A and Pagh R Fast evaluation of union-intersection expressions Proceedings of the 18th international conference on Algorithms and computation, (739-750)
- Iwama K, Nishimura H, Raymond R and Yamashita S Unbounded-error classical and quantum communication complexity Proceedings of the 18th international conference on Algorithms and computation, (100-111)
- Bille P, Pagh A and Pagh R Fast Evaluation of Union-Intersection Expressions Algorithms and Computation, (739-750)
- Kumar R and Sivakumar D Communication lower bounds via the chromatic number Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (228-240)
- Kumar R and Sivakumar D Communication Lower Bounds Via the Chromatic Number FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (228-240)
- Dinitz Y and Solomon N (2007). Two absolute bounds for distributed bit complexity, Theoretical Computer Science, 384:2-3, (168-183), Online publication date: 1-Oct-2007.
- Kumar R and Panigrahy R On Finding Frequent Elements in a Data Stream Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (584-595)
- Cormode G, Tirthapura S and Xu B Time-decaying sketches for sensor data aggregation Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (215-224)
- Laplante S, Lassaigne R, Magniez F, Peyronnet S and de Rougemont M (2007). Probabilistic abstraction for model checking, ACM Transactions on Computational Logic, 8:4, (20-es), Online publication date: 1-Aug-2007.
- Hromkovi J and Schnitger G (2007). Comparing the size of NFAs with and without ε-transitions, Theoretical Computer Science, 380:1-2, (100-114), Online publication date: 20-Jul-2007.
- Grohe M, Koch C and Schweikardt N (2007). Tight lower bounds for query processing on streaming and external memory data, Theoretical Computer Science, 380:1-2, (199-217), Online publication date: 20-Jul-2007.
- Chu M, Kannan S and McGregor A Checking and spot-checking the correctness of priority queues Proceedings of the 34th international conference on Automata, Languages and Programming, (728-739)
- Guha S and McGregor A Lower bounds for quantile estimation in random-order and multi-pass streaming Proceedings of the 34th international conference on Automata, Languages and Programming, (704-715)
- Beame P, David M, Pitassi T and Woelfel P Separating deterministic from nondeterministic nof multiparty communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (134-145)
- Montanaro A and Winter A A lower bound on entanglement-assisted quantum communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (122-133)
- Iwama K, Nishimura H, Raymond R and Yamashita S Unbounded-error one-way classical and quantum communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (110-121)
- Schweikardt N Machine models and lower bounds for query processing Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (41-52)
- Linial N and Shraibman A Lower bounds in communication complexity based on factorization norms Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (699-708)
- Hoyer P, Lee T and Spalek R Negative weights make adversaries stronger Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (526-535)
- Gavinsky D, Kempe J, Kerenidis I, Raz R and de Wolf R Exponential separations for one-way quantum communication complexity, with applications to cryptography Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (516-525)
- Hart S and Mansour Y The communication complexity of uncoupled nash equilibrium procedures Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (345-353)
- Dobzinski S and Nisan N Limitations of VCG-based mechanisms Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (338-344)
- Sherstov A Separating AC0 from depth-2 majority circuits Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (294-301)
- Kojevnikov A Improved lower bounds for tree-like resolution over linear inequalities Proceedings of the 10th international conference on Theory and applications of satisfiability testing, (70-79)
- Kerenidis I Quantum multiparty communication complexity and circuit lower bounds Proceedings of the 4th international conference on Theory and applications of models of computation, (306-317)
- Tarui J Finding a duplicate and a missing item in a stream Proceedings of the 4th international conference on Theory and applications of models of computation, (128-135)
- Fogaras D and Racz B (2007). Practical Algorithms and Lower Bounds for Similarity Search in Massive Graphs, IEEE Transactions on Knowledge and Data Engineering, 19:5, (585-598), Online publication date: 1-May-2007.
- Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
- Chattopadhyay A, Krebs A, Koucky M, Szegedy M, Tesson P and Thérien D Languages with bounded multiparty communication complexity Proceedings of the 24th annual conference on Theoretical aspects of computer science, (500-511)
- Lee T A new rank technique for formula size lower bounds Proceedings of the 24th annual conference on Theoretical aspects of computer science, (145-156)
- Chevaleyre Y, Endriss U, Lang J and Maudet N A Short Introduction to Computational Social Choice Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (51-69)
- Sun X and Woodruff D The communication and streaming complexity of computing the longest common and increasing subsequences Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (336-345)
- Sandholm T, Conitzer V and Boutilier C Automated design of multistage mechanisms Proceedings of the 20th international joint conference on Artifical intelligence, (1500-1506)
- Blumrosen L, Nisan N and Segal I (2007). Auctions with severely bounded communication, Journal of Artificial Intelligence Research, 28:1, (233-266), Online publication date: 1-Jan-2007.
- Ambainis A, Gasarch W, Srinivasan A and Utis A Lower bounds on the deterministic and quantum communication complexities of hamming-distance problems Proceedings of the 17th international conference on Algorithms and Computation, (628-637)
- Bond M and McKinley K (2006). Bell, ACM SIGPLAN Notices, 41:11, (61-72), Online publication date: 1-Nov-2006.
- Bond M and McKinley K Bell Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (61-72)
- Bond M and McKinley K (2006). Bell, ACM SIGARCH Computer Architecture News, 34:5, (61-72), Online publication date: 20-Oct-2006.
- Bond M and McKinley K (2006). Bell, ACM SIGOPS Operating Systems Review, 40:5, (61-72), Online publication date: 20-Oct-2006.
- Lautemann C, Tesson P and Thérien D An algebraic point of view on the crane beach property Proceedings of the 20th international conference on Computer Science Logic, (426-440)
- Gronemeier A NOF-multiparty information complexity bounds for pointer jumping Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (459-470)
- Agarwal D, McGregor A, Phillips J, Venkatasubramanian S and Zhu Z Spatial scan statistics Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (24-33)
- Le Gall F Exponential separation of quantum and classical online space complexity Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, (67-73)
- Feigenbaum J, Ishai Y, Malkin T, Nissim K, Strauss M and Wright R (2006). Secure multiparty computation of approximations, ACM Transactions on Algorithms, 2:3, (435-472), Online publication date: 1-Jul-2006.
- Lall A, Sekar V, Ogihara M, Xu J and Zhang H Data streaming algorithms for estimating entropy of network traffic Proceedings of the joint international conference on Measurement and modeling of computer systems, (145-156)
- Lall A, Sekar V, Ogihara M, Xu J and Zhang H (2006). Data streaming algorithms for estimating entropy of network traffic, ACM SIGMETRICS Performance Evaluation Review, 34:1, (145-156), Online publication date: 26-Jun-2006.
- Sarlós T, Benczúr A, Csalogány K, Fogaras D and Rácz B To randomize or not to randomize Proceedings of the 15th international conference on World Wide Web, (297-306)
- Gavinsky D, Kempe J, Regev O and de Wolf R Bounded-error quantum state identification and exponential separations in communication complexity Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (594-603)
- Procaccia A and Rosenschein J The communication complexity of coalition formation among autonomous agents Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (505-512)
- Brosenne H, Homeister M and Waack S (2006). Nondeterministic ordered binary decision diagrams with repeated tests and various modes of acceptance, Information Processing Letters, 98:1, (6-10), Online publication date: 15-Apr-2006.
- Neven F and Van de Craen D Optimizing monitoring queries over distributed data Proceedings of the 10th international conference on Advances in Database Technology, (829-846)
- Doerr B (2006). Non-independent randomized rounding and coloring, Discrete Applied Mathematics, 154:4, (650-659), Online publication date: 15-Mar-2006.
- Bhatnagar N, Gopalan P and Lipton R (2006). Symmetric polynomials over Zm and simultaneous communication protocols, Journal of Computer and System Sciences, 72:2, (252-285), Online publication date: 1-Mar-2006.
- Chakrabarti A, Do Ba K and Muthukrishnan S Estimating entropy and entropy norm on data streams Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (196-205)
- Drineas P, Mahoney M and Muthukrishnan S Sampling algorithms for l2 regression and applications Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1127-1136)
- Demetrescu C, Finocchi I and Ribichini A Trading off space for passes in graph streaming problems Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (714-723)
- Adler M, Demaine E, Harvey N and Pǎtraşcu M Lower bounds for asymmetric communication channels and distributed source coding Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (251-260)
- Nayak A and Salzman J (2006). Limits on the ability of quantum states to convey classical messages, Journal of the ACM, 53:1, (184-206), Online publication date: 1-Jan-2006.
- Jakoby A and Liśkiewicz M Revealing additional information in two-party computations Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (121-135)
- Kaushik R, Naughton J, Ramakrishnan R and Chakravarthy V (2005). Synopses for query optimization, ACM Transactions on Database Systems, 30:4, (1102-1127), Online publication date: 1-Dec-2005.
- Ablayev F The complexity of classical and quantum branching programs Proceedings of the Third international conference on StochasticAlgorithms: foundations and applications, (190-201)
- Cormode G, Muthukrishnan S and Rozenbaum I Summarizing and mining inverse distributions on data streams via dynamic inverse sampling Proceedings of the 31st international conference on Very large data bases, (25-36)
- Grohe M, Koch C and Schweikardt N The complexity of querying external memory and streaming data Proceedings of the 15th international conference on Fundamentals of Computation Theory, (1-16)
- Muthukrishnan S (2005). Data streams, Foundations and Trends® in Theoretical Computer Science, 1:2, (117-236), Online publication date: 1-Aug-2005.
- Ford J and Gál A Hadamard tensors and lower bounds on multiparty communication complexity Proceedings of the 32nd international conference on Automata, Languages and Programming, (1163-1175)
- Grohe M, Koch C and Schweikardt N Tight lower bounds for query processing on streaming and external memory data Proceedings of the 32nd international conference on Automata, Languages and Programming, (1076-1088)
- Hromkovič J and Schnitger G NFAs with and without ε-transitions Proceedings of the 32nd international conference on Automata, Languages and Programming, (385-396)
- Ablayev F and Gainutdinova A Complexity of quantum uniform and nonuniform automata Proceedings of the 9th international conference on Developments in Language Theory, (78-87)
- Adler M and Rubenstein D (2005). Pricing multicasting in more flexible network models, ACM Transactions on Algorithms, 1:1, (48-73), Online publication date: 1-Jul-2005.
- Endriss U and Maudet N (2005). On the Communication Complexity of Multilateral Trading, Autonomous Agents and Multi-Agent Systems, 11:1, (91-107), Online publication date: 1-Jul-2005.
- Ganguly S, Garofalakis M, Kumar A and Rastogi R Join-distinct aggregate estimation over update streams Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (259-270)
- Bar-Yossef Z, Fontoura M and Josifovski V Buffering in query evaluation over XML streams Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (216-227)
- Fadel R and Segal I The communication cost of selfishness Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge, (165-176)
- Nisan N and Segal I Exponential communication inefficiency of demand queries Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge, (158-164)
- Conitzer V and Sandholm T Communication complexity of common voting rules Proceedings of the 6th ACM conference on Electronic commerce, (78-87)
- Blumrosen L and Nisan N On the computational power of iterative auctions Proceedings of the 6th ACM conference on Electronic commerce, (29-43)
- Dinitz Y and Solomon N Two absolute bounds for distributed bit complexity Proceedings of the 12th international conference on Structural Information and Communication Complexity, (115-126)
- Aaronson S The complexity of agreement Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (634-643)
- Shi Y Tensor norms and the classical communication complexity of nonlocal quantum measurement Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (460-467)
- Koucký M, Pudlák P and Thérien D Bounded-depth circuits Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (257-265)
- Sauerhoff M and Sieling D (2005). Quantum branching programs and space-bounded nonuniform quantum complexity, Theoretical Computer Science, 334:1-3, (177-225), Online publication date: 11-Apr-2005.
- Cormode G and Muthukrishnan S (2005). What's hot and what's not: tracking most frequent items dynamically, ACM Transactions on Database Systems, 30:1, (249-278), Online publication date: 1-Mar-2005.
- Frikken K and Atallah M Achieving fairness in private contract negotiation Proceedings of the 9th international conference on Financial Cryptography and Data Security, (270-284)
- Buhrman H, Newman I, Röhrig H and de Wolf R Robust polynomials and quantum algorithms Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (593-604)
- Feigenbaum J, Kannan S, McGregor A, Suri S and Zhang J Graph distances in the streaming model Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (745-754)
- Afrati F On approximation algorithms for data mining applications Efficient Approximation and Online Algorithms, (1-29)
- Klauck H Quantum and classical communication-space tradeoffs from rectangle bounds Proceedings of the 24th international conference on Foundations of Software Technology and Theoretical Computer Science, (384-395)
- Elkin M (2004). Distributed approximation, ACM SIGACT News, 35:4, (40-57), Online publication date: 1-Dec-2004.
- Levchenko K, Paturi R and Varghese G On the difficulty of scalably detecting network attacks Proceedings of the 11th ACM conference on Computer and communications security, (12-20)
- Damm C, Krause M, Meinel C and Waack S (2004). On relations between counting communication complexity classes, Journal of Computer and System Sciences, 69:2, (259-280), Online publication date: 1-Sep-2004.
- Patt-Shamir B A note on efficient aggregate queries in sensor networks Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (283-289)
- Conitzer V and Sandholm T Communication complexity as a lower bound for learning in games Proceedings of the twenty-first international conference on Machine learning
- Ďuriš P (2004). Multiparty communication complexity and very hard functions, Information and Computation, 192:1, (1-14), Online publication date: 1-Jul-2004.
- Kaushik R, Ramakrishnan R and Chakaravarthy V Synopses for query optimization Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (201-209)
- Bar-Yossef Z, Fontoura M and Josifovski V On the memory requirements of XPath evaluation over XML streams Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (177-188)
- Elkin M Unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (331-340)
- Bar-Yossef Z, Jayram T and Kerenidis I Exponential separation of quantum and classical one-way communication complexity Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (128-137)
- Suel T, Noel P and Trendafilov D Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks Proceedings of the 20th International Conference on Data Engineering
- Ambainis A and Shi Y (2004). Distributed construction of quantum fingerprints, Quantum Information & Computation, 4:2, (146-151), Online publication date: 1-Mar-2004.
- Jain R, Radhakrishnan J and Sen P A direct sum theorem in communication complexity via message compression Proceedings of the 30th international conference on Automata, languages and programming, (300-315)
- Hromkovič J and Schnitger G Pushdown automata and multicounter machines, a comparison of computation modes Proceedings of the 30th international conference on Automata, languages and programming, (66-80)
- Ganguly S, Garofalakis M and Rastogi R Processing set expressions over continuous update streams Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (265-276)
- Jayram T, Kumar R and Sivakumar D Two applications of information complexity Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (673-682)
- Yao A On the power of quantum fingerprinting Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (77-81)
- Bollig B (2003). A very simple function that requires exponential size nondeterministic graph-driven read-once branching programs, Information Processing Letters, 86:3, (143-148), Online publication date: 16-May-2003.
- Beame P, Saks M, Sun X and Vee E (2003). Time-space trade-off lower bounds for randomized computation of decision problems, Journal of the ACM, 50:2, (154-195), Online publication date: 1-Mar-2003.
- Bolling B, Sauerhoff M and Wegener I (2002). On the nonapproximability of boolean Function by OBDDs and read-k-times Branching Programs, Information and Computation, 178:1, (263-278), Online publication date: 10-Oct-2002.
- de Wolf R (2002). Quantum communication and complexity, Theoretical Computer Science, 287:1, (337-353), Online publication date: 25-Sep-2002.
- Adorna H On the separation between k-party and (k - 1)-party nondeterministic message complexities Proceedings of the 6th international conference on Developments in language theory, (152-161)
- Gibbons P and Tirthapura S Distributed streams algorithms for sliding windows Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures, (63-72)
- Vomlel J Exploiting functional dependence in bayesian network inference Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (528-535)
- Babcock B, Babu S, Datar M, Motwani R and Widom J Models and issues in data stream systems Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-16)
- Nayak A and Salzman J On communication over an entanglement-assisted quantum channel Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (698-704)
- Ajtai M, Jayram T, Kumar R and Sivakumar D Approximate counting of inversions in a data stream Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (370-379)
- Saks M and Sun X Space lower bounds for distance approximation in the data stream model Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (360-369)
- Bar-Yossef Z, Kumar R and Sivakumar D Reductions in streaming algorithms, with an application to counting triangles in graphs Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, (623-632)
- (2001). The Communication Complexity of Enumeration, Elimination, and Selection, Journal of Computer and System Sciences, 63:2, (148-185), Online publication date: 1-Sep-2001.
- Naor M and Nissim K Communication preserving protocols for secure function evaluation Proceedings of the thirty-third annual ACM symposium on Theory of computing, (590-599)
- Gibbons P and Tirthapura S Estimating simple functions on the union of data streams Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures, (281-291)
- Klauck H On quantum and probabilistic communication Proceedings of the thirty-second annual ACM symposium on Theory of computing, (644-651)
- Feigenbaum J, Papadimitriou C and Shenker S Sharing the cost of muliticast transmissions (preliminary version) Proceedings of the thirty-second annual ACM symposium on Theory of computing, (218-227)
- Cormode G, Paterson M, Sahinalp S and Vishkin U Communication complexity of document exchange Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (197-206)
- Feigenbaum J, Kannan S, Strauss M and Viswanathan M Testing and spot-checking of data streams (extended abstract) Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (165-174)
- Feigenbaum J, Kannan S, Strauss M and Viswanathan M An Approximate L1-Difference Algorithm for Massive Data Streams Proceedings of the 40th Annual Symposium on Foundations of Computer Science
- Buhrman H, Cleve R, de Wolf R and Zalka C Bounds for Small-Error and Zero-Error Quantum Algorithms Proceedings of the 40th Annual Symposium on Foundations of Computer Science
- Jurdzinski T, Kutyłowski M and Lorys K Multi-party finite computations Proceedings of the 5th annual international conference on Computing and combinatorics, (318-329)
- Agbaria A, Ben-Asher Y and Newman I Communication-processor tradeoffs in limited resources PRAM Proceedings of the eleventh annual ACM symposium on Parallel algorithms and architectures, (74-82)
- Raz R Exponential separation of quantum and classical communication complexity Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (358-367)
- Borodin A, Ostrovsky R and Rabani Y Lower bounds for high dimensional nearest neighbor search and related problems Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (312-321)
- Chakrabarti A, Chazelle B, Gum B and Lvov A A lower bound on the complexity of approximate nearest-neighbor searching on the Hamming cube Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (305-311)
- Dinitz Y, Moran S and Rajsbaum S Bit complexity of breaking and achieving symmetry in chains and rings (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (265-274)
- Goldreich O, Ron D and Sudan M Chinese remaindering with errors Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (225-234)
- Beimel A, Ishai Y, Kushilevitz E and Malkin T One-way functions are essential for single-server private information retrieval Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (89-98)
- Sauerhoff M On the size of randomized OBDDs and read-once branching programs for k-stable functions Proceedings of the 16th annual conference on Theoretical aspects of computer science, (488-499)
- Thathachar J On separating the read-k-times branching program hierarchy Proceedings of the thirtieth annual ACM symposium on Theory of computing, (653-662)
- Kushilevitz E, Ostrovsky R and Rabani Y Efficient search for approximate nearest neighbor in high dimensional spaces Proceedings of the thirtieth annual ACM symposium on Theory of computing, (614-623)
- Gál A A characterization of span program size and improved lower bounds for monotone span programs Proceedings of the thirtieth annual ACM symposium on Theory of computing, (429-437)
- Dietzfelbinger M The linear-array problem in communication complexity resolved Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, (373-382)
- Newman I and Szegedy M Public vs. private coin flips in one round communication games (extended abstract) Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, (561-570)
- Chakravorty J and Mahajan A Structural results for two-user interactive communication 2016 IEEE International Symposium on Information Theory (ISIT), (145-149)
- Pokutta S Information theory and polyhedral combinatorics 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1119-1126)
- Ramamoorthy S and Sinha M On the communication complexity of greater-than 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (442-444)
Index Terms
- Communication complexity
Recommendations
Broadcast Extensions with Optimal Communication and Round Complexity
PODC '16: Proceedings of the 2016 ACM Symposium on Principles of Distributed ComputingThe problem of broadcast and Byzantine Agreement are of interest to both distributed computing and cryptography community. Often these primitives require prohibitive communication and round complexity. Broadcast extensions have been introduced to ...
Amortized Communication Complexity
In this work we study the direct-sum problem with respect to communication complexity: Consider a relation $f$ defined over $\{0,1\}^{n} \times \{0,1\}^{n}$. Can the communication complexity of simultaneously computing $f$ on $\cal l$ instances $(x_1,...