default search action
41st STOC 2009: Bethesda, MD, USA
- Michael Mitzenmacher:
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009. ACM 2009, ISBN 978-1-60558-506-2 - Avi Wigderson:
The work of Leslie Valiant. 1-2
Codes
- Sanjeev Arora, Constantinos Daskalakis, David Steurer:
Message passing algorithms and improved LP decoding. 3-12 - Parikshit Gopalan, Venkatesan Guruswami, Prasad Raghavendra:
List decoding tensor products and interleaved codes. 13-22 - Venkatesan Guruswami:
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes. 23-32 - Qi Cheng, Daqing Wan:
A deterministic reduction for the gap minimum distance problem: [extended abstract]. 33-38 - Klim Efremenko:
3-query locally decodable codes of subexponential length. 39-44
Complexity I
- Linda Sellie:
Exact learning of random DNF over the uniform distribution. 45-54 - László Babai, Robert Beals, Ákos Seress:
Polynomial-time theory of matrix groups. 55-64 - Eli Ben-Sasson, Swastik Kopparty:
Affine dispersers from subspace polynomials. 65-74 - Constantinos Daskalakis, Christos H. Papadimitriou:
On oblivious PTAS's for nash equilibrium. 75-84 - Eli Gafni:
The extended BG-simulation and the characterization of t-resiliency. 85-92
Algorithms and data structures
- Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro:
An efficient algorithm for partial order production. 93-100 - Aaron Bernstein, David R. Karger:
A nearly optimal oracle for avoiding failed vertices and edges. 101-110 - Leonid Barenboim, Michael Elkin:
Distributed (delta+1)-coloring in linear (in delta) time. 111-120 - Tobias Friedrich, Thomas Sauerwald:
Near-perfect load balancing by randomized rounding. 121-130
Property testing
- Russell Impagliazzo, Valentine Kabanets, Avi Wigderson:
New direct-product testers and 2-query PCPs. 131-140 - Oded Goldreich, Dana Ron:
On proximity oblivious testing. 141-150 - Eric Blais:
Testing juntas nearly optimally. 151-158 - Asaf Shapira:
Green's conjecture and testing linear-invariant properties. 159-166 - Shafi Goldwasser:
Athena lecture: Controlling Access to Programs? 167-168
Crypto I
- Craig Gentry:
Fully homomorphic encryption using ideal lattices. 169-178 - Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam:
A unified framework for concurrent security: universal composability from stand-alone non-malleability. 179-188 - Huijia Lin, Rafael Pass:
Non-malleability amplification. 189-198
Approx algorithms I
- Alexandr Andoni, Krzysztof Onak:
Approximating edit distance in near-linear time. 199-204 - Kenneth L. Clarkson, David P. Woodruff:
Numerical linear algebra in the streaming model. 205-214 - Nam H. Nguyen, Thong T. Do, Trac D. Tran:
A fast and efficient algorithm for low-rank approximation of a matrix. 215-224 - Yuichi Yoshida, Masaki Yamamoto, Hiro Ito:
An improved constant-time approximation algorithm for maximum matchings. 225-234
Graphs cuts and flows
- Reid Andersen, Yuval Peres:
Finding sparse cuts locally using evolving sets. 235-244 - James R. Lee, Anastasios Sidiropoulos:
On the geometry of graphs with a forbidden minor. 245-254 - Joshua D. Batson, Daniel A. Spielman, Nikhil Srivastava:
Twice-ramanujan sparsifiers. 255-262 - Luca Trevisan:
Max cut and the smallest eigenvalue. 263-272 - Erin W. Chambers, Jeff Erickson, Amir Nayyeri:
Homology flows, cohomology cuts. 273-282
Optimization
- Moses Charikar, Konstantin Makarychev, Yury Makarychev:
Integrality gaps for Sherali-Adams relaxations. 283-292 - Claire Mathieu, Alistair Sinclair:
Sherali-adams relaxations of the matching polytope. 293-302 - Madhur Tulsiani:
CSP gaps and reductions in the lasserre hierarchy. 303-312 - Marek Karpinski, Warren Schudy:
Linear time approximation schemes for the Gale-Berlekamp game and related minimization problems. 313-322 - Jon Lee, Vahab S. Mirrokni, Viswanath Nagarajan, Maxim Sviridenko:
Non-monotone submodular maximization under matroid and knapsack constraints. 323-332
Award papers
- Chris Peikert:
Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. 333-342 - Robin A. Moser:
A constructive proof of the Lovász local lemma. 343-350
Privacy
- Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan:
Universally utility-maximizing privacy mechanisms. 351-360 - Dan Feldman, Amos Fiat, Haim Kaplan, Kobbi Nissim:
Private coresets. 361-370 - Cynthia Dwork, Jing Lei:
Differential privacy and robust statistics. 371-380 - Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum, Salil P. Vadhan:
On the complexity of differentially private data release: efficient algorithms and hardness results. 381-390
Quantum
- Yi-Kai Liu:
Quantum algorithms using the curvelet transform. 391-400 - Amnon Ta-Shma:
Short seed extractors against quantum storage. 401-408 - Richard Cleve, Daniel Gottesman, Michele Mosca, Rolando D. Somma, David L. Yonge-Mallo:
Efficient discrete-time simulations of continuous-time quantum query algorithms. 409-416 - Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. Vazirani:
The detectability lemma and quantum gap amplification. 417-426
Graphs
- Silvio Lattanzi, D. Sivakumar:
Affiliation networks. 427-434 - Shiri Chechik, Michael Langberg, David Peleg, Liam Roditty:
Fault-tolerant spanners for general graphs. 435-444 - Ken-ichi Kawarabayashi, Bruce A. Reed:
Hadwiger's conjecture is decidable. 445-454 - Virginia Vassilevska, Ryan Williams:
Finding, minimizing, and counting weighted subgraphs. 455-464
Complexity II
- Eyal Kushilevitz, Enav Weinreb:
On the complexity of communication complexity. 465-474 - Emanuele Viola:
Bit-probe lower bounds for succinct data structures. 475-482 - Per Austrin, Johan Håstad:
Randomly supported independence and resistance. 483-492 - Ryan O'Donnell, Yi Wu:
Conditional hardness for satisfiable 3-CSPs. 493-502
Economics
- Jing Chen, Silvio Micali:
A new approach to auctions and resilient mechanism design. 503-512 - Tim Roughgarden:
Intrinsic robustness of the price of anarchy. 513-522 - Eyal Even-Dar, Yishay Mansour, Uri Nadav:
On the convergence of regret minimization dynamics in concave games. 523-532 - Robert Kleinberg, Georgios Piliouras, Éva Tardos:
Multiplicative updates outperform generic no-regret learning in congestion games: extended abstract. 533-542 - MohammadHossein Bateni, Moses Charikar, Venkatesan Guruswami:
MaxMin allocation via degree lower-bounded arborescences. 543-552
Markov chains
- Ravi Montenegro, Prasad Tetali:
How long does it take to catch a wild kangaroo? 553-560 - Ravi Kannan, Hariharan Narayanan:
Random walks on polytopes and an affine interior point method for linear programming. 561-570 - Fabio Martinelli, Alistair Sinclair:
Mixing time for the solid-on-solid model. 571-580 - Allan Sly:
Reconstruction for the Potts model. 581-590 - Martin Dietzfelbinger, Philipp Woelfel:
Tight lower bounds for greedy routing in uniform small world rings. 591-600
Crypto II
- Yevgeniy Dodis, Daniel Wichs:
Non-malleable extractors and symmetric key cryptography from weak secrets. 601-610 - Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee:
Inaccessible entropy. 611-620 - Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett:
On cryptography with auxiliary input. 621-630
Geometry
- Jérémie Chalopin, Daniel Gonçalves:
Every planar graph is the intersection graph of segments in the plane: extended abstract. 631-638 - Boris Aronov, Esther Ezra, Micha Sharir:
Small-size epsilon-nets for axis-parallel rectangles and boxes. 639-648 - Yuval Rabani, Amir Shpilka:
Explicit construction of a small epsilon-net for linear threshold functions. 649-658
Approximation algorithms II
- Anupam Gupta, Amit Kumar:
A constant-factor approximation for stochastic Steiner forest. 659-668 - Yossi Azar, Iftah Gamzu, Xiaoxin Yin:
Multiple intents re-ranking. 669-678 - Jivitej S. Chadha, Naveen Garg, Amit Kumar, V. N. Muralidhara:
A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation. 679-684 - Anupam Gupta, Ravishankar Krishnaswamy, R. Ravi:
Online and stochastic survivable network design. 685-694
Complexity III
- Russell Impagliazzo, Valentine Kabanets, Antonina Kolokolova:
An axiomatic approach to algebrization. 695-704 - Phokion G. Kolaitis, Swastik Kopparty:
Random graphs and the parity quantifier. 705-714 - Jin-yi Cai, Pinyan Lu, Mingji Xia:
Holant problems and counting CSP. 715-724 - Gábor Kun, Mario Szegedy:
A new line of attack on the dichotomy conjecture. 725-734
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.