Sciweavers

SODA
2010
ACM
704views Algorithms» more  SODA 2010»
14 years 2 months ago
A locality-sensitive hash for real vectors
We present a simple and practical algorithm for the c-approximate near neighbor problem (c-NN): given n points P Rd and radius R, build a data structure which, given q Rd , can ...
Tyler Neylon
STOC
2010
ACM
618views Algorithms» more  STOC 2010»
14 years 2 months ago
Differential Privacy Under Continual Observation
We ask the question ? how can websites and data aggregators continually release updated statistics, and meanwhile preserve each individual user's privacy? We propose a differ...
Cynthia Dwork, Moni Naor, Toniann Pitassi and Guy ...
WEA
2010
Springer
545views Algorithms» more  WEA 2010»
13 years 11 months ago
Experiments on Union-Find Algorithms for the Disjoint-Set Data Structure
Abstract. The disjoint-set data structure is used to maintain a collection of non-overlapping sets of elements from a finite universe. Algorithms that operate on this data structu...
Md. Mostofa Ali Patwary, Jean R. S. Blair, Fredrik...
WEA
2010
Springer
476views Algorithms» more  WEA 2010»
13 years 11 months ago
Fast FPT Algorithms for Computing Rooted Agreement Forests: Theory and Experiments
We improve on earlier FPT algorithms for computing a rooted maximum agreement forest (MAF) or a maximum acyclic agreement forest (MAAF) of a pair of phylogenetic trees. Their sizes...
Chris Whidden, Robert G. Beiko, Norbert Zeh
SODA
2010
ACM
426views Algorithms» more  SODA 2010»
14 years 2 months ago
Shape Replication Through Self-Assembly and RNase Enzymes
We introduce the problem of shape replication in the Wang tile self-assembly model. Given an input shape, we consider the problem of designing a self-assembly system which will re...
Zachary Abel, Nadia Benbernou, Mirela Damian, Erik...
Algorithms
Top of PageReset Settings