Sciweavers

2434 search results - page 286 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
120
Voted
STOC
1998
ACM
121views Algorithms» more  STOC 1998»
15 years 8 months ago
Non-Interactive and Non-Malleable Commitment
A commitment protocol is a fundamental cryptographic primitive used as a basic buildingblock throughoutmodern cryptography. In STOC 1991, Dolev Dwork and Naor showed that in many ...
Giovanni Di Crescenzo, Yuval Ishai, Rafail Ostrovs...
ALDT
2009
Springer
126views Algorithms» more  ALDT 2009»
15 years 8 months ago
On Low-Envy Truthful Allocations
We study the problem of allocating a set of indivisible items to players having additive utility functions over the items. We consider allocations in which no player envies the bun...
Ioannis Caragiannis, Christos Kaklamanis, Panagiot...
ICANN
2007
Springer
15 years 7 months ago
Resilient Approximation of Kernel Classifiers
Abstract. Trained support vector machines (SVMs) have a slow runtime classification speed if the classification problem is noisy and the sample data set is large. Approximating the...
Thorsten Suttorp, Christian Igel
150
Voted
SODA
2004
ACM
124views Algorithms» more  SODA 2004»
15 years 5 months ago
Family trees: an ordered dictionary with optimal congestion, locality, degree, and search time
We consider the problem of storing an ordered dictionary data structure over a distributed set of nodes. In contrast to traditional sequential data structures, distributed data st...
Kevin C. Zatloukal, Nicholas J. A. Harvey
AAAI
1996
15 years 5 months ago
Evolution-Based Discovery of Hierarchical Behaviors
Procedural representations of control policies have two advantages when facing the scale-up problem in learning tasks. First they are implicit, with potential for inductive genera...
Justinian P. Rosca, Dana H. Ballard