Sciweavers

5580 search results - page 143 / 1116
» Randomized priority algorithms
Sort
View
STOC
2005
ACM
101views Algorithms» more  STOC 2005»
15 years 3 months ago
The round complexity of two-party random selection
We study the round complexity of two-party protocols for generating a random nbit string such that the output is guaranteed to have bounded bias (according to some measure) even i...
Saurabh Sanghvi, Salil P. Vadhan
ICARCV
2002
IEEE
132views Robotics» more  ICARCV 2002»
15 years 2 months ago
Handling of randomly located moving parts using FPGA-based realtime vision
We will develop a manipulator system that can handle randomly located, moving parts. Vision algorithm to detect the planar motion of a part is implemented on an FPGA-based realtim...
Shinichi Hirai, Tatsuhiko Tsuboi, Masakazu Zakouji...
STOC
1994
ACM
93views Algorithms» more  STOC 1994»
15 years 2 months ago
Scalable expanders: exploiting hierarchical random wiring
Recent work has shown many advantages to randomly wired expander-based networks. Unfortunately, the wiring complexity of such networks becomes physically problematic as they becom...
Eric A. Brewer, Frederic T. Chong, Tom Leighton
APPROX
2008
Springer
91views Algorithms» more  APPROX 2008»
14 years 12 months ago
Improved Separations between Nondeterministic and Randomized Multiparty Communication
We exhibit an explicit function f : {0,1}n {0,1} that can be computed by a nondeterministic number-on-forehead protocol communicating O(logn) bits, but that requires n(1) bits of...
Matei David, Toniann Pitassi, Emanuele Viola
SODA
2001
ACM
138views Algorithms» more  SODA 2001»
14 years 11 months ago
The diameter of random massive graphs
Many massive graphs (such as the WWW graph and Call graphs) share certain universal characteristics which can be described by so-called the "power law". Here we determin...
Linyuan Lu