scientific article

From MaRDI portal
Revision as of 11:12, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3272460

zbMath0095.00506MaRDI QIDQ3272460

H. Dr. Freudenthal

Publication date: 1960


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (48)

The ritual origin of countingMassive online teaching to bounded learnersLearning mixtures of spherical gaussiansLow-weight halfspaces for sparse boolean vectorsLearnability of DNF with representation-specific queriesCan theories be tested?Making evolution rigorousOn the convergence of the Hegselmann-Krause systemIs privacy compatible with truthfulness?Differentially private data analysis of social networks via restricted sensitivityCharacterizing the sample complexity of private learnersBarriers in cryptography with weak, correlated and leaky sourcesOn the possibilities and limitations of pseudodeterministic algorithmsEvasiveness through a circuit lensThe garden-hose modelSpace-bounded communication complexityTowards an optimal query efficient PCP?A characterization of approximation resistance for even k-partite CSPsOn the optimality of semidefinite relaxations for average-case and generalized constraint satisfactionOn the power of many one-bit proversApproaching utopiaLearning and incentives in user-generated contentWelfare maximization and the supermodular degreeReachability in graph timelinesRuntime guarantees for regression problemsAn energy complexity model for algorithmsStreaming computations with a loquacious proverAdversary lower bound for the k-sum problemStronger methods of making quantum interactive proofs perfectly completeActive self-assembly of algorithmic shapes and patterns in polylogarithmic timeAn equational approach to secure multi-party computationPublicly verifiable proofs of sequential workOn the power of nonuniformity in proofs of securityFast reductions from RAMs to delegatable succinct constraint satisfaction problemsResource-based corruptions and the combinatorics of hidden diversityTime hierarchies for sampling distributionsProperties and applications of boolean function compositionPseudo-partitions, transversality and localityCompeting provers protocols for circuit evaluationCatch them if you canInstance-sensitive robustness guarantees for sequencing with unknown packing and covering constraintsRobust optimization in the presence of uncertaintySorting noisy data with partial informationNew affine-invariant codes from liftingH-wise independenceSparse extractor families for all the entropyOn the power of conditional samples in distribution testingSemantic networks




This page was built for publication: