scientific article; zbMATH DE number 819814

From MaRDI portal
Revision as of 03:46, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4856179

zbMath0849.68039MaRDI QIDQ4856179

Prabhakar Raghavan

Publication date: 23 November 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Estimation of singular values of very large matrices using random samplingRandom walks with ``back buttonsOn the complexity of pattern matching for highly compressed two-dimensional texts.Diffusion without false rumors: On propagating updates in a Byzantine environment.Towards optimal lower bounds for clique and chromatic number.On finding common neighborhoods in massive graphs.When can you fold a map?Approximate constrained bipartite edge coloringThe Missing Difference problem, and its applications to counter mode encryptionIs Shapley cost sharing optimal?Localization of VC classes: beyond local Rademacher complexitiesExact learning of juntas from membership queriesRandomized nonlinear projections uncover high-dimensional structureMultiple (truncated) differential cryptanalysis: explicit upper bounds on data complexityRigorous upper bounds on data complexities of block cipher cryptanalysisSome results on the strength of relaxations of multilinear functionsA polynomial time approximation scheme for embedding a directed hypergraph on a weighted ringPhylogenetic mixtures: concentration of measure in the large-tree limitStrengthening hash families and compressive sensingInformation gathering in ad-hoc radio networks with tree topologyIndexing moving pointsWhen distributed computation is communication expensiveAnalysis of a randomized rendezvous algorithmNews from the online traveling repairman.Distributed broadcast in radio networks of unknown topology.Optimal aggregation algorithms for middleware.Poly-symmetry in processor-sharing systemsOn stability of fuzzy formal concepts over randomized one-sided formal contextTriggering cascades on undirected connected graphsBlack-box search by unbiased variationOn reversible cascades in scale-free and Erdős-Rényi random graphsComparing the strength of query types in property testing: the case of \(k\)-colorabilityAlignment-free phylogenetic reconstruction: Sample complexity via a branching process analysisFixed-parameter evolutionary algorithms and the vertex cover problemGame-theoretic discussion of quantum state estimation and cloningUncovering the riffled independence structure of ranked dataRandomized registers and iterative algorithmsEfficient adaptive collect using randomizationSublinear-time algorithms for counting star subgraphs via edge samplingOptimal deterministic broadcasting in known topology radio networksSummarizing numeric spatial data streams by trend cluster discoveryOn the number of driver nodes for controlling a Boolean network when the targets are restricted to attractorsConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Hardness of approximation for non-overlapping local alignments.Distinguishing string selection problems.Sublinear time motif discovery from multiple sequencesOn the choice of the update strength in estimation-of-distribution algorithms and ant colony optimizationCommunication and location discovery in geometric ring networksOnline estimation of discrete, continuous, and conditional joint densities using classifier chainsOn the smoothness of paging algorithmsConvergence theorems for operators sequences on functionals of discrete-time normal martingalesThe \((1+1)\) elitist black-box complexity of LeadingOnesQuantum walks: a comprehensive reviewAn approximation algorithm for the traveling tournament problemFun-Sort -- or the chaos of unordered binary searchEfficiency test of pseudorandom number generators using random walksUncertain convex programs: randomized solutions and confidence levelsNew bounds for randomized busingThe analysis of evolutionary algorithms on sorting and shortest paths problemsComputing the optimal partition of variables in multi-homogeneous homotopy methodsOn the analysis of a simple evolutionary algorithm on quadratic pseudo-Boolean functionsBalanced vertex-orderings of graphsA probabilistic model of computing with wordsCore instances for testing: a case studyImproved attacks on knapsack problem with their variants and a knapsack type ID-schemeSocial integration in two-sided matching marketsOn cutting a few vertices from a graphA space lower bound for \(st\)-connectivity on node-named JAGsRandom walks on a finite graph with congestion pointsOn the complexity of the discrete logarithm and Diffie-Hellman problemsPopularity based random graph models leading to a scale-free degree sequenceQuantum analog computingA discipline of evolutionary programmingOn the complexity of multi-dimensional interval routing schemesInteractive and probabilistic proof-checkingRandomized algorithms over finite fields for the exact parity base problem.Polynomial-time counting and sampling of two-rowed contingency tablesDynamic programming algorithms for RNA secondary structure prediction with pseudoknotsClique is hard to approximate within \(n^{1-\epsilon}\)Measure and probability for concurrency theoristsEfficient searching with linear constraintsRandomized local elections.How to analyse evolutionary algorithms.Optimization with randomized search heuristics -- the (A)NFL theorem, realistic scenarios, and difficult functions.On computing the diameter of a point set in high dimensional Euclidean space.On the Hamming distance of constraint satisfaction problems.Randomized path coloring on binary trees.Probabilistic quorum systemsDistributed probabilistic polling and applications to proportionate agreementThe nonapproximability of OBDD minimizationOn asymptotically optimal methods of prediction and adaptive coding for Markov sourcesOn approximating planar metrics by tree metrics.Small generic hardcore subsets for the discrete logarithm: short secret DL-keys.Algorithms, nymphs, and shepherdsOn the analysis of the \((1+1)\) evolutionary algorithmA 3-approximation algorithm for the \(k\)-level uncapacitated facility location problemCompetitive on-line scheduling of continuous-media streamsApproximate congruence in nearly linear timeFinding similar regions in many sequencesA simple greedy algorithm for finding functional relations: Efficient implementation and average case analysis







This page was built for publication: