Chi-Jen Lu

From MaRDI portal
(Redirected from Person:334812)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multiagent learning for competitive opinion optimization
Theoretical Computer Science
2024-10-07Paper
Budget-constrained cost-covering job assignment for a total contribution-maximizing platform
Lecture Notes in Computer Science
2023-12-22Paper
On the Algorithmic Power of Spiking Neural Networks
(available as arXiv preprint)
2022-07-18Paper
An alternating algorithm for finding linear Arrow-Debreu market equilibria
Theory of Computing Systems
2022-02-14Paper
How good is a two-party election game?
Theoretical Computer Science
2021-06-08Paper
The communication complexity of graphical games on grid graphs2020-06-18Paper
Bounds on the price of anarchy for a more general class of directed graphs in opinion formation games
Operations Research Letters
2019-01-15Paper
Deterministic Extractors for Independent-Symbol Sources
IEEE Transactions on Information Theory
2017-07-27Paper
Extracting Computational Entropy and Learning Noisy Linear Functions
IEEE Transactions on Information Theory
2017-07-12Paper
Online learning in Markov decision processes with continuous actions
Lecture Notes in Computer Science
2016-11-30Paper
Generalized mirror descents in congestion games
Artificial Intelligence
2016-11-01Paper
A communication-efficient private matching scheme in client-server model
Information Sciences
2016-07-11Paper
scientific article; zbMATH DE number 6297735 (Why is no real title available?)2014-05-22Paper
Making profit in a prediction market
Lecture Notes in Computer Science
2012-09-25Paper
Complexity of hard-core set proofs
Computational Complexity
2012-09-21Paper
Tree decomposition for large-scale SVM problems
Journal of Machine Learning Research (JMLR)
2012-07-13Paper
Making online decisions with bounded memory
Lecture Notes in Computer Science
2011-10-19Paper
Adaptive prototype learning algorithms: theoretical and experimental studies2011-10-12Paper
Computational Randomness from Generalized Hardcore Sets
Fundamentals of Computation Theory
2011-08-19Paper
ON THE HARDNESS AGAINST CONSTANT-DEPTH LINEAR-SIZE CIRCUITS
Discrete Mathematics, Algorithms and Applications
2011-03-25Paper
Efficient string-commitment from weak bit-commitment
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Extractors
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
2010-08-16Paper
On the hardness against constant-depth linear-size circuits
Lecture Notes in Computer Science
2010-07-20Paper
Communication requirements for stable marriages
Lecture Notes in Computer Science
2010-05-28Paper
Extracting Computational Entropy and Learning Noisy Linear Functions
Lecture Notes in Computer Science
2009-07-23Paper
On the Security Loss in Cryptographic Reductions
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Efficient algorithms for two generalized 2-median problems and the group median problem on trees
Theoretical Computer Science
2009-03-17Paper
Deterministic Extractors for Independent-Symbol Sources
Automata, Languages and Programming
2009-03-12Paper
On the Complexity of Hardness Amplification
IEEE Transactions on Information Theory
2009-02-24Paper
Extracting Randomness from Multiple Independent Sources
IEEE Transactions on Information Theory
2008-12-21Paper
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
Post-Quantum Cryptography
2008-11-11Paper
Impossibility Results on Weakly Black-Box Hardness Amplification
Fundamentals of Computation Theory
2008-02-26Paper
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
On the Complexity of Hard-Core Set Constructions
Automata, Languages and Programming
2007-11-28Paper
Improved hardness amplification in NP
Theoretical Computer Science
2007-02-26Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
The impossibility of basing one-way permutations on central cryptographic primitives
Journal of Cryptology
2006-08-14Paper
Oblivious polynomial evaluation and oblivious neural learning
Theoretical Computer Science
2005-09-22Paper
Deterministic Hypergraph Coloring and Its Applications
SIAM Journal on Discrete Mathematics
2005-02-28Paper
Encryption against storage-bounded adversaries from on-line strong extractors
Journal of Cryptology
2004-09-22Paper
scientific article; zbMATH DE number 2080255 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081038 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081076 (Why is no real title available?)2004-08-04Paper
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942425 (Why is no real title available?)2003-06-30Paper
Improved pseudorandom generators for combinatorial rectangles
Combinatorica
2003-05-18Paper
New algorithmic aspects of the local lemma with applications to routing and partitioning
SIAM Journal on Computing
2002-04-23Paper
A note on iterating an \(\alpha\)-ary Gray code
SIAM Journal on Discrete Mathematics
2001-06-21Paper
scientific article; zbMATH DE number 1305459 (Why is no real title available?)2000-02-14Paper
scientific article; zbMATH DE number 1301963 (Why is no real title available?)1999-06-16Paper
scientific article; zbMATH DE number 1222830 (Why is no real title available?)1999-03-30Paper


Research outcomes over time


This page was built for person: Chi-Jen Lu