Sciweavers

526 search results - page 68 / 106
» On circularly symmetric functions
Sort
View
CORR
2011
Springer
268views Education» more  CORR 2011»
14 years 5 months ago
Approximation Algorithms for Submodular Multiway Partition
Abstract— We study algorithms for the SUBMODULAR MULTIWAY PARTITION problem (SUB-MP). An instance of SUB-MP consists of a finite ground set V , a subset S = {s1, s2, . . . , sk}...
Chandra Chekuri, Alina Ene
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 5 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
STOC
2012
ACM
221views Algorithms» more  STOC 2012»
13 years 4 months ago
From query complexity to computational complexity
We consider submodular optimization problems, and provide a general way of translating oracle inapproximability results arising from the symmetry gap technique to computational co...
Shahar Dobzinski, Jan Vondrák
BMCBI
2010
110views more  BMCBI 2010»
15 years 2 months ago
Missing value imputation for epistatic MAPs
Background: Epistatic miniarray profiling (E-MAPs) is a high-throughput approach capable of quantifying aggravating or alleviating genetic interactions between gene pairs. The dat...
Colm Ryan, Derek Greene, Gerard Cagney, Padraig Cu...
ATAL
2009
Springer
15 years 8 months ago
Learning equilibria in repeated congestion games
While the class of congestion games has been thoroughly studied in the multi-agent systems literature, settings with incomplete information have received relatively little attenti...
Moshe Tennenholtz, Aviv Zohar