Sciweavers

SODA
2010
ACM
704views Algorithms» more  SODA 2010»
14 years 3 months ago
A locality-sensitive hash for real vectors
We present a simple and practical algorithm for the c-approximate near neighbor problem (c-NN): given n points P Rd and radius R, build a data structure which, given q Rd , can ...
Tyler Neylon
STOC
2010
ACM
618views Algorithms» more  STOC 2010»
14 years 3 months ago
Differential Privacy Under Continual Observation
We ask the question ? how can websites and data aggregators continually release updated statistics, and meanwhile preserve each individual user's privacy? We propose a differ...
Cynthia Dwork, Moni Naor, Toniann Pitassi and Guy ...
WEA
2010
Springer
545views Algorithms» more  WEA 2010»
14 years 1 months ago
Experiments on Union-Find Algorithms for the Disjoint-Set Data Structure
Abstract. The disjoint-set data structure is used to maintain a collection of non-overlapping sets of elements from a finite universe. Algorithms that operate on this data structu...
Md. Mostofa Ali Patwary, Jean R. S. Blair, Fredrik...
WEA
2010
Springer
476views Algorithms» more  WEA 2010»
14 years 1 months ago
Fast FPT Algorithms for Computing Rooted Agreement Forests: Theory and Experiments
We improve on earlier FPT algorithms for computing a rooted maximum agreement forest (MAF) or a maximum acyclic agreement forest (MAAF) of a pair of phylogenetic trees. Their sizes...
Chris Whidden, Robert G. Beiko, Norbert Zeh
SODA
2010
ACM
426views Algorithms» more  SODA 2010»
14 years 3 months ago
Shape Replication Through Self-Assembly and RNase Enzymes
We introduce the problem of shape replication in the Wang tile self-assembly model. Given an input shape, we consider the problem of designing a self-assembly system which will re...
Zachary Abel, Nadia Benbernou, Mirela Damian, Erik...
Algorithms
Top of PageReset Settings