Sciweavers

STOC
2006
ACM
120views Algorithms» more  STOC 2006»
14 years 5 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
STOC
2006
ACM
158views Algorithms» more  STOC 2006»
14 years 5 months ago
The effect of collusion in congestion games
Ara Hayrapetyan, Éva Tardos, Tom Wexler
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
14 years 5 months ago
Explicit capacity-achieving list-decodable codes
For every 0 < R < 1 and > 0, we present an explicit construction of error-correcting codes of rate R that can be list decoded in polynomial time up to a fraction (1 - R ...
Venkatesan Guruswami, Atri Rudra
STOC
2006
ACM
59views Algorithms» more  STOC 2006»
14 years 5 months ago
Reducibility among equilibrium problems
In this paper, we improve a recent result of Daskalakis, Goldberg and Papadimitriou on PPAD-completeness of 4-Nash, showing that 3-Nash is PPAD-complete.
Paul W. Goldberg, Christos H. Papadimitriou
STOC
2006
ACM
149views Algorithms» more  STOC 2006»
14 years 5 months ago
Bounded-error quantum state identification and exponential separations in communication complexity
We consider the problem of bounded-error quantum state identification: given either state 0 or state 1, we are required to output `0', `1' or `?' ("don't ...
Dmitry Gavinsky, Julia Kempe, Oded Regev, Ronald d...
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
14 years 5 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...
STOC
2006
ACM
170views Algorithms» more  STOC 2006»
14 years 5 months ago
Hardness of approximate two-level logic minimization and PAC learning with membership queries
Producing a small DNF expression consistent with given data is a classical problem in computer science that occurs in a number of forms and has numerous applications. We consider ...
Vitaly Feldman
STOC
2006
ACM
106views Algorithms» more  STOC 2006»
14 years 5 months ago
Finding small balanced separators
Let G be an n-vertex graph that has a vertex separator of size k that partitions the graph into connected components of size smaller
Uriel Feige, Mohammad Mahdian
STOC
2006
ACM
131views Algorithms» more  STOC 2006»
14 years 5 months ago
On maximizing welfare when utility functions are subadditive
We consider the problem of maximizing welfare when allocating m items to n players with subadditive utility functions. Our main result is a way of rounding any fractional solution...
Uriel Feige