Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 41, Issue 52012 Special Section on the Forty-Third Annual ACM Symposium on Theory of Computing (STOC 2011)
Publisher:
  • Society for Industrial and Applied Mathematics
  • 3600 University City Science Center Philadelphia, PA
  • United States
ISSN:0097-5397
Reflects downloads up to 14 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
An $O(\log^2{k})$-Approximation Algorithm for the $k$-Vertex Connected Spanning Subgraph Problem

We present an $O(\log^2{k})$-approximation algorithm for the problem of finding a $k$-vertex connected spanning subgraph of minimum cost, where $n$ is the number of vertices in an input graph, and $k$ is a connectivity requirement. Our algorithm is the first ...

research-article
Improved Approximation Algorithms for Bipartite Correlation Clustering

In this work we study the problem of bipartite correlation clustering (BCC), a natural bipartite counterpart of the well-studied correlation clustering (CC) problem [N. Bansal, A. Blum, and S. Chawla, Machine Learning, 56 (2004), pp. 89--113], also referred ...

research-article
Strong Direct Product Theorems for Quantum Communication and Query Complexity

A strong direct product theorem (SDPT) states that solving $n$ instances of a problem requires $\Omega(n)$ times the resources for a single instance, even to achieve success probability $2^{-\epsilon n}$ for a small enough constant $\epsilon>0.$ We prove that ...

research-article
Considering Suppressed Packets Improves Buffer Management in Quality of Service Switches

The following buffer management problem arises in network switches providing different levels of services: At the beginning of each time step, one packet can be sent, and afterward an arbitrary number of new packets arrive. Packets that are not sent can be ...

research-article
Efficient Noninteractive Proof Systems for Bilinear Groups

Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the theory of cryptography. However, lack of efficiency has prevented them from being used in practice. One of the roots of this ...

research-article
Special Section on the Forty-Third Annual ACM Symposium on Theory of Computing (STOC 2011)

This section of SIAM Journal on Computing contains extended versions of selected papers from the 43rd ACM Symposium on Theory of Computing (STOC), held June 6--8, 2011, in San Jose, California, as part of the fifth Federated Computing Research Conference (...

    research-article
    Distributed Verification and Hardness of Distributed Approximation

    We study the verification problem in distributed networks, stated as follows. Let $H$ be a subgraph of a network $G$ where each vertex of $G$ knows which edges incident on it are in $H$. We would like to verify whether $H$ has some properties, e.g., if it ...

    research-article
    Pareto Optimal Solutions for Smoothed Analysts

    Consider an optimization problem with $n$ binary variables and $d+1$ linear objective functions. Each valid solution $x \in \{0,1\}^n$ gives rise to an objective vector in $\R^{d+1}$, and one often wants to enumerate the Pareto optima among them. In the ...

    research-article
    Blackbox Identity Testing for Bounded Top-Fanin Depth-3 Circuits: The Field Doesn't Matter

    Let $C$ be a depth-3 circuit with $n$ variables, degree $d$, and top-fanin $k$ (called ${\Sigma\Pi\Sigma}(k,d,n)$ circuits) over base field ${\mathbb{F}}$. It is a major open problem to design a deterministic polynomial time blackbox algorithm that tests ...

    research-article
    An Optimal Lower Bound on the Communication Complexity of Gap-Hamming-Distance

    We prove an optimal $\Omega(n)$ lower bound on the randomized communication complexity of the much-studied gap-hamming-distance problem. As a consequence, we obtain essentially optimal multipass space lower bounds in the data stream model for a number of ...

    research-article
    Santa Claus Schedules Jobs on Unrelated Machines

    One of the classic results in scheduling theory is the $2$-approximation algorithm by Lenstra, Shmoys, and Tardos for the problem of scheduling jobs to minimize makespan on unrelated machines; i.e., job $j$ requires time $p_{ij}$ if processed on machine $i$. ...

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.